@Preamble{
"\input bibnames.sty"
# "\input path.sty"
# "\ifx \undefined \bioname \def \bioname#1{{{\em #1\/}}} \fi"
# "\ifx \undefined \k \let \k = \c \fi"
}
@String{ack-nhfb = "Nelson H. F. Beebe,
University of Utah,
Department of Mathematics, 110 LCB,
155 S 1400 E RM 233,
Salt Lake City, UT 84112-0090, USA,
Tel: +1 801 581 5254,
e-mail: \path|beebe@math.utah.edu|,
\path|beebe@acm.org|,
\path|beebe@computer.org| (Internet),
URL: \path|https://www.math.utah.edu/~beebe/|"}
@String{j-IEEE-TRANS-NETWORKING = "IEEE\slash ACM Transactions on Networking"}
@Article{Abbott:1993:LAP,
author = "Mark B. Abbott and Larry L. Peterson",
title = "A language-based approach to protocol implementation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "4--19",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p4-abbott/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; languages;
performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.3.2} Software, PROGRAMMING LANGUAGES, Language
Classifications, Specialized application languages.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Rangan:1993:CAA,
author = "P. Venkat Rangan and Harrick M. Vin and Srinivas
Ramanathan",
title = "Communication architectures and algorithms for media
mixing in multimedia conferences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "20--30",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p20-rangan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement;
performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf H.5.1}
Information Systems, INFORMATION INTERFACES AND
PRESENTATION, Multimedia Information Systems. {\bf
C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
APPLICATIONS, Communications Applications, Computer
conferencing, teleconferencing, and videoconferencing.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Message sending. {\bf D.4.4} Software,
OPERATING SYSTEMS, Communications Management, Network
communication.",
}
@Article{Ramaswami:1993:ALE,
author = "V. Ramaswami and Jonathan L. Wang",
title = "Analysis of the link error monitoring protocols in the
common channel signaling network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "31--47",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p31-ramaswami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement;
performance",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network monitoring. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Wang:1993:FDM,
author = "Clark Wang and Mischa Schwartz",
title = "Fault detection with multiple observers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "48--55",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p48-wang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management",
subject = "{\bf C.1.3} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Other Architecture Styles. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations, Network management.",
}
@Article{Estrin:1993:PRE,
author = "Deborah Estrin and Martha Steenstrup and Gene Tsudik",
title = "A protocol for route establishment and packet
forwarding across multidomain {Internets}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "56--70",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p56-estrin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.",
}
@Article{Garrett:1993:JSC,
author = "Mark W. Garrett and Martin Vetterli",
title = "Joint source\slash channel coding of statistically
multiplexed real-time services on packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "71--80",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p71-garrett/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.3}
Computer Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS, Signal processing systems.",
}
@Article{Humblet:1993:BTA,
author = "Pierre Humblet and Amit Bhargava and Michael G.
Hluchyj",
title = "Ballot theorems applied to the transient analysis of
{nD/D/1} queues",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "81--95",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p81-humblet/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf D.4.8}
Software, OPERATING SYSTEMS, Performance, Queueing
theory.",
}
@Article{Sharon:1993:SSS,
author = "Oran Sharon and Adrian Segall",
title = "A simple scheme for slot reuse without latency for a
dual bus configuration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "96--104",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p96-sharon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Access schemes. {\bf B.4.3} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
(Subsystems), Topology.",
}
@Article{Chung:1993:CAB,
author = "Shun-Ping Chung and Arik Kashper and Keith W. Ross",
title = "Computing approximate blocking probabilities for large
loss networks with state-dependent routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "105--115",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p105-chung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; measurement; performance",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Access schemes. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks.",
}
@Article{Miller:1993:GMC,
author = "Raymond E. Miller and Sanjoy Paul",
title = "On the generation of minimal-length conformance tests
for communication protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "116--129",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p116-miller/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; reliability; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf B.4.5} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Reliability, Testing, and
Fault-Tolerance**, Test generation**. {\bf F.1.1}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Models of Computation, Automata. {\bf F.3.1} Theory of
Computation, LOGICS AND MEANINGS OF PROGRAMS,
Specifying and Verifying and Reasoning about Programs,
Specification techniques.",
}
@Article{Garcia-Lunes-Aceves:1993:LRU,
author = "J. J. Garcia-Lunes-Aceves",
title = "Loop-free routing using diffusing computations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "130--141",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p130-garcia-lunes-aceves/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Path and circuit problems.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Computations on discrete structures. {\bf F.2.2} Theory
of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.2.4} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems.",
}
@Article{Chen:1993:SFP,
author = "David X. Chen and Jon W. Mark",
title = "{SCOQ}: a fast packet switch with shared concentration
and output queueing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "1",
pages = "142--151",
month = feb,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-1/p142-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks.",
}
@Article{Zhong:1993:CNS,
author = "Wen De Zhong and Jaidev Kaniyil and Y. Onozato",
title = "A copy network with shared buffers for large-scale
multicast {ATM} switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "157--165",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p157-de_zhong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Ramanathan:1993:SAM,
author = "Subramanian Ramanathan and Errol L. Lloyd",
title = "Scheduling algorithms for multihop radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "166--177",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p166-ramanathan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement;
performance",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Woodside:1993:ASA,
author = "C. Murray Woodside and R. Greg Franks",
title = "Alternative software architectures for parallel
protocol execution with synchronous {IPC}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "178--186",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p178-woodside/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; standardization",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf F.1.2} Theory of Computation, COMPUTATION
BY ABSTRACT DEVICES, Modes of Computation, Parallelism
and concurrency. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, General,
Open Systems Interconnection reference model (OSI).",
}
@Article{Orda:1993:MDR,
author = "Ariel Orda and Raphael Rom and Moshe Sidi",
title = "Minimum delay routing in stochastic networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "187--198",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p187-orda/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Papadopoulos:1993:EES,
author = "Christos Papadopoulos and Gurudatta M. Parulkar",
title = "Experimental evaluation of {SUNOS IPC} and {TCP\slash
IP} protocol implementation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "199--216",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p199-papadopoulos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; measurement; performance;
standardization",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf G.m} Mathematics of
Computing, MISCELLANEOUS, Queueing theory**.",
}
@Article{Kristol:1993:PAG,
author = "David M. Kristol and David Lee and Arun N. Netravali
and Krishan Sabnani",
title = "A polynomial algorithm for gateway generation from
formal specifications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "217--229",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p217-kristol/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; standardization",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol architecture. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology. {\bf F.1.1}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Models of Computation, Automata. {\bf F.1.3} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES,
Complexity Measures and Classes.",
}
@Article{Wang:1993:EEC,
author = "Qinglin Wang and Victor S. Frost",
title = "Efficient estimation of cell blocking probability for
{ATM} systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "230--235",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p230-wang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, ISDN (Integrated
Services Digital Network). {\bf I.6.8} Computing
Methodologies, SIMULATION AND MODELING, Types of
Simulation, Monte Carlo.",
}
@Article{Leung:1993:CMT,
author = "Kin K. Leung and Raymond W. Yeung and Bhaskar
Sengupta",
title = "A credit manager for traffic regulation in high-speed
networks: a queueing analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "236--245",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p236-leung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; measurement; performance;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations, Network management. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Modeling techniques.",
}
@Article{Ramanathan:1993:AFT,
author = "Srinivas Ramanathan and P. Venkat Rangan",
title = "Adaptive feedback techniques for synchronized
multimedia retrieval over integrated networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "246--260",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p246-ramanathan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "management; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf H.3.3} Information Systems, INFORMATION STORAGE
AND RETRIEVAL, Information Search and Retrieval,
Retrieval models. {\bf H.5.1} Information Systems,
INFORMATION INTERFACES AND PRESENTATION, Multimedia
Information Systems.",
}
@Article{Gibbens:1993:DRM,
author = "Richard J. Gibbens and Frank P. Kelly and Stephen R.
E. Turner",
title = "Dynamic routing in multiparented networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "2",
pages = "261--270",
month = apr,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-2/p261-gibbens/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; reliability",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Bagheri:1993:SBM,
author = "Mehran Bagheri and Dennis T. Kong and Wayne S. Holden
and Fernando C. Irizarry and Derek D. Mahoney",
title = "An {STS-N} byte-interleaving multiplexer\slash
scrambler and demultiplexer\slash descrambler
architecture and its experimental {OC-48}
implementation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "282--285",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p282-bagheri/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf H.5.2}
Information Systems, INFORMATION INTERFACES AND
PRESENTATION, User Interfaces. {\bf C.3} Computer
Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS, Signal processing systems.
{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Kompella:1993:MRM,
author = "Vachaspathi P. Kompella and Joseph C. Pasquale and
George C. Polyzos",
title = "Multicast routing for multimedia communication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "286--292",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p286-kompella/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf G.1.6} Mathematics of Computing,
NUMERICAL ANALYSIS, Optimization. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf H.5.1} Information Systems,
INFORMATION INTERFACES AND PRESENTATION, Multimedia
Information Systems.",
}
@Article{Devetsikiotis:1993:SOD,
author = "Michael Devetsikiotis and J. Keith Townsend",
title = "Statistical optimization of dynamic importance
sampling parameters for efficient simulation of
communication networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "293--305",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p293-devetsikiotis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design",
subject = "{\bf G.1.6} Mathematics of Computing, NUMERICAL
ANALYSIS, Optimization. {\bf G.3} Mathematics of
Computing, PROBABILITY AND STATISTICS. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Kessler:1993:CFR,
author = "Ilan Kessler and Arvind Krishna",
title = "On the cost of fairness in ring networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "306--313",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p306-kessler/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Token rings. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.",
}
@Article{Pattavina:1993:AIO,
author = "Achille Pattavina and Giacomo Bruzzi",
title = "Analysis of input and output queueing for nonblocking
{ATM} switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "314--328",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p314-pattavina/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.1.3} Mathematics of Computing,
NUMERICAL ANALYSIS, Numerical Linear Algebra,
Eigenvalues and eigenvectors (direct and iterative
methods).",
}
@Article{Elwalid:1993:EBG,
author = "Anwar I. Elwalid and Debasis Mitra",
title = "Effective bandwidth of general {Markovian} traffic
sources and admission control of high speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "329--343",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p329-elwalid/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.3} Mathematics of Computing,
PROBABILITY AND STATISTICS. {\bf G.1.3} Mathematics of
Computing, NUMERICAL ANALYSIS, Numerical Linear
Algebra, Eigenvalues and eigenvectors (direct and
iterative methods). {\bf H.5.1} Information Systems,
INFORMATION INTERFACES AND PRESENTATION, Multimedia
Information Systems, Video (e.g., tape, disk, DVI).",
}
@Article{Parekh:1993:GPS,
author = "Abhay K. Parekh and Robert G. Gallager",
title = "A generalized processor sharing approach to flow
control in integrated services networks: the
single-node case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "344--357",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p344-parekh/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Design studies.",
}
@Article{Ural:1993:OLT,
author = "Hasan Ural and Keqin Zhu",
title = "Optimal length test sequence generation using
distinguishing sequences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "358--371",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p358-ural/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.1.6} Mathematics of Computing, NUMERICAL
ANALYSIS, Optimization. {\bf F.1.1} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
Computation, Automata. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Yaron:1993:PSC,
author = "Opher Yaron and Moshe Sidi",
title = "Performance and stability of communication networks
via robust exponential bounds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "372--385",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p372-yaron/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Modeling techniques. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Packet-switching
networks. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Abu-Amara:1993:FTM,
author = "Hosame Abu-Amara",
title = "A fast topology maintenance algorithm for
high-bandwidth networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "3",
pages = "386--394",
month = jun,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-3/p386-abu-amara/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout.",
}
@Article{Floyd:1993:RED,
author = "Sally Floyd and Van Jacobson",
title = "Random early detection gateways for congestion
avoidance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "397--413",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p397-floyd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.3} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Operations. {\bf F.2.2} Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Nonnumerical Algorithms and Problems, Sequencing and
scheduling.",
}
@Article{Liang:1993:NMN,
author = "Luping Liang and Gerald W. Neufeld and Samuel T.
Chanson",
title = "A name model for nested group communication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "414--423",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p414-liang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.2.2} Mathematics of Computing,
DISCRETE MATHEMATICS, Graph Theory, Network problems.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf H.4.3} Information Systems, INFORMATION
SYSTEMS APPLICATIONS, Communications Applications.",
}
@Article{Kesidis:1993:EBM,
author = "George Kesidis and Jean Walrand and Cheng-Shang
Chang",
title = "Effective bandwidths for multiclass {Markov} fluids
and other {ATM} sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "424--428",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p424-kesidis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes.",
}
@Article{Partridge:1993:FU,
author = "Craig Partridge and Stephen Pink",
title = "A faster {UDP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "429--440",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p429-partridge/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement;
performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.0} Software, OPERATING SYSTEMS, General, UNIX.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf D.4.8} Software, OPERATING SYSTEMS,
Performance, Measurements.",
}
@Article{Pieris:1993:LLB,
author = "Gerard R. Pieris and Galen H. Sasaki",
title = "A linear lightwave {Benes} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "441--445",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p441-pieris/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.1.2} Computer Systems Organization,
PROCESSOR ARCHITECTURES, Multiple Data Stream
Architectures (Multiprocessors), Interconnection
architectures. {\bf F.2.2} Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Nonnumerical Algorithms and Problems, Routing and
layout.",
}
@Article{Skelly:1993:HMV,
author = "Paul Skelly and Mischa Schwartz and Sudhir Dixit",
title = "A histogram-based model for video traffic behavior in
an {ATM} multiplexer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "446--459",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p446-skelly/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf H.5.1} Information Systems,
INFORMATION INTERFACES AND PRESENTATION, Multimedia
Information Systems, Video (e.g., tape, disk, DVI).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Performance attributes.",
}
@Article{Girard:1993:DAR,
author = "Andr{\'e} Girard and Bernard Liau",
title = "Dimensioning of adaptively routed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "460--468",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p460-girard/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems.",
}
@Article{Cidon:1993:CEH,
author = "Israel Cidon and Inder S. Gopal and Adrian Segall",
title = "Connection establishment in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "469--481",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p469-cidon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Bianchi:1993:IQA,
author = "Giuseppe Bianchi and Jonathan S. Turner",
title = "Improved queueing analysis of shared buffer switching
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "482--490",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p482-bianchi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Performance attributes. {\bf C.3} Computer
Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf D.4.8} Software, OPERATING
SYSTEMS, Performance, Queueing theory. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design,
Circuit-switching networks.",
}
@Article{Rumsewicz:1993:AES,
author = "Michael P. Rumsewicz",
title = "Analysis of the effects of {SS7} message discard
schemes on call completion rates during overload",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "4",
pages = "491--502",
month = aug,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-4/p491-rumsewicz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Performance attributes. {\bf C.3} Computer
Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout.",
}
@Article{Ghanbari:1993:PCV,
author = "Mohammad Ghanbari and Charles J. Hughes",
title = "Packing coded video signals into {ATM} cells",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "505--509",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p505-ghanbari/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; theory",
subject = "{\bf I.4.2} Computing Methodologies, IMAGE PROCESSING
AND COMPUTER VISION, Compression (Coding). {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design,
Packet-switching networks. {\bf E.4} Data, CODING AND
INFORMATION THEORY.",
}
@Article{Orda:1993:CRM,
author = "Ariel Orda and Raphael Rom and Nahum Shimkin",
title = "Competitive routing in multiuser communication
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "510--521",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p510-orda/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network management. {\bf C.2.3} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Operations, Network monitoring. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Li:1993:QRIa,
author = "San-qi Li and Chia-Lin Hwang",
title = "Queue response to input correlation functions:
discrete spectral analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "522--533",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p522-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Marsan:1993:TWA,
author = "M. Ajmone Marsan and Andrea Bianco and Emilio Leonardi
and Fabio Neri",
title = "Topologies for wavelength-routing all-optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "534--546",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p534-marsan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.2.m} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Miscellaneous. {\bf C.1.2} Computer Systems
Organization, PROCESSOR ARCHITECTURES, Multiple Data
Stream Architectures (Multiprocessors), Interconnection
architectures.",
}
@Article{Low:1993:NAS,
author = "Steven H. Low and Pravin P. Varaiya",
title = "A new approach to service provisioning in {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "547--553",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p547-low/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network monitoring.",
}
@Article{Thekkath:1993:INP,
author = "Chandramohan A. Thekkath and Thu D. Nguyen and Evelyn
Moy and Edward D. Lazowska",
title = "Implementing network protocols at user level",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "554--565",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p554-thekkath/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; security",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Coppo:1993:OCD,
author = "Paolo Coppo and Matteo D'Ambrosio and Riccardo Melen",
title = "Optimal cost\slash performance design of {ATM}
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "566--575",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p566-coppo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Performance attributes. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design.",
}
@Article{Landry:1993:QSP,
author = "Randall Landry and Ioannis Stavrakakis",
title = "Queueing study of a $3$-priority policy with distinct
service strategies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "576--589",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p576-landry/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
General.",
}
@Article{Sidhu:1993:THP,
author = "Deepinder P. Sidhu and Howard Motteler and Raghu
Vallurupalli",
title = "On testing hierarchies for protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "590--599",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p590-sidhu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; measurement; reliability; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Abbott:1993:INT,
author = "Mark B. Abbott and Larry L. Peterson",
title = "Increasing network throughput by integrating protocol
layers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "5",
pages = "600--610",
month = oct,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-5/p600-abbott/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; security; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection (e.g., firewalls). {\bf E.3} Data, DATA
ENCRYPTION.",
}
@Article{Cocchi:1993:PCN,
author = "Ron Cocchi and Scott Shenker and Deborah Estrin and
Lixia Zhang",
title = "Pricing in computer networks: motivation, formulation,
and example",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "614--627",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p614-cocchi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; economics; management; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Performance attributes. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology. {\bf K.6.2} Computing Milieux, MANAGEMENT OF
COMPUTING AND INFORMATION SYSTEMS, Installation
Management, Pricing and resource allocation.",
}
@Article{Baiocchi:1993:EAA,
author = "Andrea Baiocchi and Nicola Bl{\'e}fari-Melazzi",
title = "An error-controlled approximate analysis of a
stochastic fluid flow model applied to an {ATM}
multiplexer with heterogeneous {On-Off} sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "628--637",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p628-baiocchi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Modeling techniques. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design.",
}
@Article{Chen:1993:ACM,
author = "Xing Chen and Jeremiah F. Hayes",
title = "Access control in multicast packet switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "638--649",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p638-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.5}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Local and Wide-Area Networks, Access schemes.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Kaiserswerth:1993:PPE,
author = "Matthias Kaiserswerth",
title = "The {Parallel Protocol Engine}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "650--663",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p650-kaiserswerth/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol architecture. {\bf C.1.2} Computer Systems
Organization, PROCESSOR ARCHITECTURES, Multiple Data
Stream Architectures (Multiprocessors). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{vanDoorn:1993:BPL,
author = "Erik A. van Doorn and Frans J. M. Panken",
title = "Blocking probabilities in a loss system with arrivals
in geometrically distributed batches and heterogeneous
service requirements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "664--667",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p664-van_doorn/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Modeling techniques. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design. {\bf C.2.5} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Local and Wide-Area Networks, Access schemes.",
}
@Article{Hu:1993:DCA,
author = "Limin Hu",
title = "Distributed code assignments for {CDMA Packet Radio
Network}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "668--677",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p668-hu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Li:1993:QRIb,
author = "San-qi Li and Chia-Lin Hwang",
title = "Queue response to input correlation functions:
continuous spectral analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "678--692",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p678-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Benmohamed:1993:FCC,
author = "Lotfi Benmohamed and Semyon M. Meerkov",
title = "Feedback control of congestion in packet switching
networks: the case of a single congested node",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "693--708",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p693-benmohamed/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.3} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Operations. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{Lee:1993:QAT,
author = "Duan-Shin Lee and Bhaskar Sengupta",
title = "Queueing analysis of a threshold based priority scheme
for {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "709--717",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p709-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Georgiadis:1993:TPF,
author = "Leonidas Georgiadis and Roch Gu{\'e}rin and Israel
Cidon",
title = "Throughput properties of fair policies in ring
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "718--728",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p718-georgiadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Token rings. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.",
}
@Article{Lin:1993:LSS,
author = "Frank Y. S. Lin",
title = "Link set sizing for networks supporting {SMDS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "729--739",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p729-lin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks.",
}
@Article{LaPorta:1993:PAM,
author = "Thomas F. {La Porta} and Mischa Schwartz",
title = "Performance analysis of {MSP}: feature-rich high-speed
transport protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "1",
number = "6",
pages = "740--753",
month = dec,
year = "1993",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1993-1-6/p740-la_porta/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Open Systems
Interconnection reference model (OSI).",
}
@Article{Leland:1994:SNE,
author = "Will E. Leland and Murad S. Taqqu and Walter Willinger
and Daniel V. Wilson",
title = "On the self-similar nature of {Ethernet} traffic
(extended version)",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "1--15",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p1-leland/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Ethernet. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks.",
}
@Article{McAuley:1994:WSC,
author = "A. J. McAuley",
title = "Weighted sum codes for error detection and their
comparison with existing codes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "16--22",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Farkas:1995:CWS}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p16-mcauley/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; reliability",
subject = "{\bf B.4.5} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Reliability, Testing, and
Fault-Tolerance**, Error-checking**. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.0} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
General, Data communications.",
}
@Article{Chlamtac:1994:MTS,
author = "Imrich Chlamtac and Andr{\'a}s Farag{\'o}",
title = "Making transmission schedules immune to topology
changes in multi-hop packet radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "23--29",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p23-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; reliability; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Tsai:1994:PAT,
author = "Zsehong Tsai and Wen-der Wang and Chien-Hwa Chiou and
Jin-Fu Chang and Lung-Sing Liang",
title = "Performance analysis of two echo control designs in
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "30--39",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p30-tsai/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Performance attributes.",
}
@Article{Wu:1994:PPS,
author = "Tsong-Ho Wu",
title = "A passive protected self-healing mesh network
architecture and applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "40--52",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p40-wu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; economics; performance; reliability; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Reliability, availability, and serviceability.",
}
@Article{Sheng:1994:SAP,
author = "Hong-Dah Sheng and San-Qi Li",
title = "Spectral analysis of packet loss rate at a statistical
multiplexer for multimedia services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "53--65",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p53-sheng/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf H.5.1}
Information Systems, INFORMATION INTERFACES AND
PRESENTATION, Multimedia Information Systems. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
D.4.8} Software, OPERATING SYSTEMS, Performance,
Queueing theory.",
}
@Article{Tel:1994:SAN,
author = "Gerard Tel and Ephraim Korach and Shmuel Zaks",
title = "Synchronizing {ABD} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "66--69",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p66-tel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Sequencing and scheduling. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Sivarajan:1994:LNB,
author = "Kumar N. Sivarajan and Rajiv Ramaswami",
title = "Lightwave networks based on {de Bruijn} graphs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "70--79",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p70-sivarajan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Simmons:1994:DED,
author = "Jane M. Simmons and Robert G. Gallager",
title = "Design of error detection scheme for class {C} service
in {ATM}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "80--88",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p80-simmons/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf B.4.5} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Reliability, Testing, and
Fault-Tolerance**, Error-checking**. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design. {\bf C.2.0}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, General, Data communications. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols.",
}
@Article{Sharon:1994:ESR,
author = "Oran Sharon and Adrian Segall",
title = "On the efficiency of slot reuse in the {Dual Bus}
configuration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "1",
pages = "89--100",
month = feb,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-1/p89-sharon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Buses. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Access schemes. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology.",
}
@Article{Pieris:1994:STW,
author = "Gerard R. Pieris and Galen H. Sasaki",
title = "Scheduling transmissions in {WDM} broadcast-and-select
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "105--110",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p105-pieris/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Escobar:1994:FSP,
author = "Julio Escobar and Craig Partridge and Debra Deutsch",
title = "Flow synchronization protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "111--121",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p111-escobar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; performance; standardization;
theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Floyd:1994:SPR,
author = "Sally Floyd and Van Jacobson",
title = "The synchronization of periodic routing messages",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "122--136",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p122-floyd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf F.1.2} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
Computation, Probabilistic computation.",
}
@Article{Parekh:1994:GPS,
author = "Abhay K. Parekh and Robert G. Gallagher",
title = "A generalized processor sharing approach to flow
control in integrated services networks: the multiple
node case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "137--150",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p137-parekh/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf G.m} Mathematics of
Computing, MISCELLANEOUS, Queueing theory**.",
}
@Article{Marsan:1994:LEP,
author = "Marco Ajmone Marsan and Andrea Bianco and Luigi
Ciminiera and Riccardo Sisto and Adriano Valenzano",
title = "A {LOTOS} extension for the performance analysis of
distributed systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "151--165",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p151-marsan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "languages; measurement; performance; verification",
subject = "{\bf D.2.1} Software, SOFTWARE ENGINEERING,
Requirements/Specifications, Lotos. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf F.1.2} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Modes of Computation, Probabilistic
computation.",
}
@Article{Chang:1994:ACP,
author = "Chung-Ju Chang and Tian-Tsair Su and Yueh-Yiing
Chiang",
title = "Analysis of a cutoff priority cellular radio system
with finite queueing and reneging\slash dropping",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "166--175",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p166-chang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations. {\bf F.1.2} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation. {\bf C.3} Computer Systems
Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
SYSTEMS.",
}
@Article{Lucantoni:1994:MPE,
author = "David M. Lucantoni and Marcel F. Neuts and Amy R.
Reibman",
title = "Methods for performance evaluation of {VBR} video
traffic models",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "176--180",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p176-lucantoni/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf F.1.2} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Modes of Computation, Probabilistic
computation.",
}
@Article{Omundsen:1994:PMA,
author = "Daniel S. Omundsen and A. Roger Kaye and Samy A.
Mahmoud",
title = "A pipelined, multiprocessor architecture for a
connectionless server for broadband {ISDN}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "181--192",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p181-omundsen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.1.2} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Multiple Data Stream Architectures
(Multiprocessors), Pipeline processors**. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Hart:1994:ARC,
author = "George W. Hart and Samir G. Kelekar",
title = "Automated repair of complex systems by fault
compensation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "193--205",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p193-hart/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; languages; performance;
reliability; theory; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf F.4.3} Theory
of Computation, MATHEMATICAL LOGIC AND FORMAL
LANGUAGES, Formal Languages, Classes defined by
grammars or automata.",
}
@Article{Hong:1994:AAT,
author = "Seung Ho Hong",
title = "Approximate analysis of timer-controlled priority
scheme in the single-service token-passing systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "2",
pages = "206--215",
month = apr,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-2/p206-hong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design. {\bf F.1.2} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
Computation, Probabilistic computation.",
}
@Article{Ganz:1994:EAV,
author = "Aura Ganz and Xudong Wang",
title = "Efficient algorithm for virtual topology design in
multihop lightwave networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "217--225",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p217-ganz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf G.1.6} Mathematics
of Computing, NUMERICAL ANALYSIS, Optimization.",
}
@Article{Gopal:1994:NTP,
author = "Inder Gopal and Roch Gu{\'e}rin",
title = "Network transparency: the {plaNET} approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "226--239",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p226-gopal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; standardization",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design,
Circuit-switching networks.",
}
@Article{Cidon:1994:PBP,
author = "Israel Cidon and Roch Gu{\'e}rin and Asad Khamisy",
title = "On protective buffer policies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "240--246",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p240-cidon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Barcaccia:1994:PTO,
author = "Piera Barcaccia and Maurizio A. Bonuccelli",
title = "Polynomial time optimal algorithms for time slot
assignment of variable bandwidth systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "247--251",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p247-barcaccia/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.1.6} Mathematics of Computing,
NUMERICAL ANALYSIS, Optimization. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Dimitrijevic:1994:RMN,
author = "Dragomir D. Dimitrijevic and Basil Maglaris and Robert
R. Boorstyn",
title = "Routing in multidomain networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "252--262",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p252-dimitrijevic/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.1.2} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Multiple Data Stream Architectures
(Multiprocessors), Interconnection architectures.",
}
@Article{Cohen:1994:SSN,
author = "Reuven Cohen",
title = "{``Session} swapping'': a new approach for optimal
bandwidth sharing of ring circuit switched channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "263--268",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p263-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.5} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Local and Wide-Area Networks.",
}
@Article{Sharon:1994:SSR,
author = "Oran Sharon and Adrian Segall",
title = "Schemes for slot reuse in {CRMA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "269--278",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p269-sharon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Access schemes.",
}
@Article{Todd:1994:TGN,
author = "Terence D. Todd",
title = "The token grid network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "279--287",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p279-todd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Byun:1994:DAA,
author = "Jae W. Byun and Tony T. Lee",
title = "The design and analysis of an {ATM} multicast switch
with adaptive traffic controller",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "288--298",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p288-byun/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.3}
Computer Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS.",
}
@Article{Varvarigos:1994:PHR,
author = "Emmanouel A. Varvarigos and Dimitri P. Bertsekas",
title = "Performance of hypercube routing schemes with or
without buffering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "3",
pages = "299--311",
month = jun,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-3/p299-varvarigos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network communications.",
}
@Article{Paxson:1994:EDA,
author = "Vern Paxson",
title = "Empirically derived analytic models of wide-area {TCP}
connections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "316--336",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p316-paxson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{R:1994:CSF,
author = "Allen R. and J. r. Bonde and Sumit Ghosh",
title = "A comparative study of fuzzy versus ``fixed''
thresholds for robust queue management in
cell-switching networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "337--344",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p337-bonde/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Design studies.",
}
@Article{To:1994:MIE,
author = "Philip P. To and Tak-Shing P. Yum and Yiu-Wing Leung",
title = "Multistar implementation of expandable shufflenets",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "345--351",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p345-to/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks.",
}
@Article{Zitterbart:1994:HPT,
author = "Martina Zitterbart and Ahmed N. Tantawy and Dimitrios
N. Serpanos",
title = "A high performance transparent bridge",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "352--362",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p352-zitterbart/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Distributed networks. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Network topology. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Peha:1994:AFT,
author = "Jon M. Peha and Fouad A. Tobagi",
title = "Analyzing the fault tolerance of double-loop
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "363--373",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p363-peha/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Tassiulas:1994:OBC,
author = "Leandros Tassiulas and Yao Chung Hung and Shivendra S.
Panwar",
title = "Optimal buffer control during congestion in an {ATM}
network node",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "374--386",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p374-tassiulas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf B.3.2}
Hardware, MEMORY STRUCTURES, Design Styles, Cache
memories.",
}
@Article{Rosenberg:1994:HFS,
author = "Catherine Rosenberg and Bruno Lagu{\"e}",
title = "A heuristic framework for source policing in {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "387--397",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p387-rosenberg/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology.",
}
@Article{Gianatti:1994:PAA,
author = "Stefano Gianatti and Achille Pattavina",
title = "Performance analysis of {ATM Banyan} networks with
shared queueing --- part {I}: random offered traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "398--410",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p398-gianatti/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.1.2}
Computer Systems Organization, PROCESSOR ARCHITECTURES,
Multiple Data Stream Architectures (Multiprocessors),
Interconnection architectures. {\bf B.3.2} Hardware,
MEMORY STRUCTURES, Design Styles, Cache memories. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Pattavina:1994:PAA,
author = "Achille Pattavina and Stefano Gianatti",
title = "Performance analysis of {ATM Banyan} networks with
shared queueing --- part {II}: correlated\slash
unbalanced offered traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "4",
pages = "411--424",
month = aug,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-4/p411-pattavina/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.1.2}
Computer Systems Organization, PROCESSOR ARCHITECTURES,
Multiple Data Stream Architectures (Multiprocessors),
Interconnection architectures. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Schwartz:1994:AIG,
author = "Michael F. Schwartz and Calton Pu",
title = "Applying an information gathering architecture to
{Netfind}: a white pages tool for a changing and
growing {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "426--439",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p426-schwartz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; measurement; performance",
subject = "{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
APPLICATIONS, Communications Applications, Internet.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Internet. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations. {\bf H.3.3} Information Systems,
INFORMATION STORAGE AND RETRIEVAL, Information Search
and Retrieval.",
}
@Article{Amer:1994:PTS,
author = "Paul D. Amer and Christophe Chassot and Thomas J.
Connolly and Michel Diaz and Phillip Conrad",
title = "Partial-order transport service for multimedia and
other applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "440--456",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p440-amer/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; reliability;
standardization",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf H.5.1} Information Systems, INFORMATION INTERFACES
AND PRESENTATION, Multimedia Information Systems. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Miller:1994:SAP,
author = "Raymond E. Miller and Sanjoy Paul",
title = "Structural analysis of protocol specifications and
generation of maximal fault coverage conformance test
sequences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "457--470",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p457-miller/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; reliability; standardization;
verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol verification. {\bf F.1.1} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Models of
Computation, Automata. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{LaMaire:1994:TRS,
author = "Richard O. LaMaire and Dimitrios N. Serpanos",
title = "Two-dimensional round-robin schedulers for packet
switches with multiple input queues",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "471--482",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p471-lamaire/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**.",
}
@Article{Lundy:1994:SAS,
author = "Gilbert M. Lundy and H. Alphan Tipici",
title = "Specification and analysis of the {SNR} high-speed
transport protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "483--496",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p483-lundy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; documentation; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol verification. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf F.3.1} Theory
of Computation, LOGICS AND MEANINGS OF PROGRAMS,
Specifying and Verifying and Reasoning about
Programs.",
}
@Article{Lee:1994:DSF,
author = "Tsern-Huei Lee and Jin-Jye Chou",
title = "Diagnosis of single faults in bitonic sorters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "497--507",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p497-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; reliability; verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sorting and searching. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf B.4.5} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Reliability,
Testing, and Fault-Tolerance**.",
}
@Article{Abdelaziz:1994:SOT,
author = "Mohamed Abdelaziz and Ioannis Stavrakakis",
title = "Some optimal traffic regulation schemes for {ATM}
networks: a {Markov} decision approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "508--519",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p508-abdelaziz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf F.1.2} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Modes of Computation, Probabilistic
computation. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf G.m} Mathematics of
Computing, MISCELLANEOUS, Queueing theory**.",
}
@Article{Logothetis:1994:RAD,
author = "Dimitris Logothetis and Kishor S. Trivedi",
title = "Reliability analysis of the double counter-rotating
ring with concentrator attachments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "520--532",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p520-logothetis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; reliability",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.2.m} Mathematics of Computing,
DISCRETE MATHEMATICS, Miscellaneous. {\bf C.2.5}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Local and Wide-Area Networks, Token rings.",
}
@Article{Luciani:1994:AMP,
author = "James V. Luciani and C. Y. Roger Chen",
title = "An analytical model for partially blocking
finite-buffered switching networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "533--540",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p533-luciani/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf H.5.1} Information Systems, INFORMATION INTERFACES
AND PRESENTATION, Multimedia Information Systems. {\bf
G.m} Mathematics of Computing, MISCELLANEOUS, Queueing
theory**.",
}
@Article{Cohen:1994:SML,
author = "Reuven Cohen and Yoram Ofek",
title = "Self-termination mechanism for label swapping
routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "5",
pages = "541--545",
month = oct,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-5/p541-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Leung:1994:MMV,
author = "Yiu-Wing Leung and Tak-Shing Yum",
title = "A modular multirate video distribution system: design
and dimensioning",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "549--557",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p549-leung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Distributed
networks.",
}
@Article{Mitra:1994:ECU,
author = "Debasis Mitra and John A. Morrison",
title = "{Erlang} capacity and uniform approximations for
shared unbuffered resources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "558--570",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p558-mitra/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Modeling techniques.",
}
@Article{Kim:1994:DPM,
author = "Hyong S. Kim",
title = "Design and performance of {Multinet} switch: a
multistage {ATM} switch architecture with partially
shared buffers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "571--580",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p571-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf B.3.2}
Hardware, MEMORY STRUCTURES, Design Styles, Cache
memories. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory.",
}
@Article{Chlamtac:1994:OSV,
author = "Imrich Chlamtac and Andr{\'a}s Farag{\'o} and Tao
Zhang",
title = "Optimizing the system of virtual paths",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "581--587",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p581-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf B.4.0}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
General. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Huang:1994:SPD,
author = "Chun-Chong Huang and Alberto Leon-Garcia",
title = "Separation principle of dynamic transmission and
enqueueing priorities for real- and nonreal-time
traffic in {ATM} multiplexers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "588--601",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p588-huang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.m}
Computer Systems Organization, MISCELLANEOUS. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital
Network).",
}
@Article{Sharony:1994:UMS,
author = "Jacob Sharony",
title = "The universality of multidimensional switching
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "2",
number = "6",
pages = "602--612",
month = dec,
year = "1994",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1994-2-6/p602-sharony/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, ISDN
(Integrated Services Digital Network). {\bf B.4.0}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
General. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Rumsewicz:1995:CSC,
author = "Michael P. Rumsewicz and Donald E. Smith",
title = "A comparison of {SS7} congestion control options
during mass call-in situations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "1--9",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p1-rumsewicz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
standardization; theory",
subject = "{\bf K.1} Computing Milieux, THE COMPUTER INDUSTRY,
Standards. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Li:1995:LCA,
author = "San-Qi Li and Song Chong and Chia-Lin Hwang",
title = "Link capacity allocation and network control by
filtered input rate in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "10--25",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p10-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory",
subject = "{\bf H.5.1} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, Multimedia Information
Systems. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**.",
}
@Article{Lee:1995:BAR,
author = "Wei-Tsong Lee and Ling-Yang Kung",
title = "Binary addressing and routing schemes in the
{Manhattan} street network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "26--30",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p26-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout.",
}
@Article{Bird:1995:KFL,
author = "Ray Bird and Inder Gopal and Amir Herzberg and Phil
Janson and Shay Kutten and Refik Molva and Moti Yung",
title = "The {KryptoKnight} family of light-weight protocols
for authentication and key distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "31--41",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p31-bird/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; security; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection (e.g., firewalls). {\bf K.6.5} Computing
Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
SYSTEMS, Security and Protection, Authentication. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.6} Software, OPERATING SYSTEMS, Security and
Protection, Authentication.",
}
@Article{Levine:1995:AST,
author = "Judah Levine",
title = "An algorithm to synchronize the time of a computer to
universal time",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "42--50",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p42-levine/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; measurement;
performance; theory",
subject = "{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Synchronization. {\bf C.2.0} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
General. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.
{\bf B.4.2} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Input/Output Devices, Channels and
controllers.",
}
@Article{Gutekunst:1995:DPG,
author = "Thomas Gutekunst and Daniel Bauer and Germano Caronni
and Bernhard Plattner and Hasan",
title = "A distributed and policy-free general-purpose shared
window system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "51--62",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p51-gutekunst/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory",
subject = "{\bf H.5.2} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, User Interfaces, Windowing
systems. {\bf D.2.2} Software, SOFTWARE ENGINEERING,
Design Tools and Techniques, X-Window. {\bf C.2.0}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, General, Data communications.",
}
@Article{Wong:1995:DAN,
author = "P. C. Wong and M. S. Yeung",
title = "Design and analysis of a novel fast packet switch:
pipeline {Banyan}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "63--69",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p63-wong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.1.2}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Modes of Computation, Parallelism and concurrency. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Lee:1995:NDN,
author = "Jeong Gyu Lee and Byeong Gi Lee",
title = "A new distribution network based on controlled
switching elements and its applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "70--81",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p70-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**.",
}
@Article{Liu:1995:BRP,
author = "Zhen Liu and Don Towsley",
title = "Burst reduction properties of rate-control throttles:
downstream queue behavior",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "82--90",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p82-liu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability; theory;
verification",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, General,
Data communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Ward:1995:DLC,
author = "Christopher Ward and Cheong H. Choi and Thomas F.
Hain",
title = "A data link control protocol for {LEO} satellite
networks providing a reliable datagram service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "1",
pages = "91--103",
month = feb,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-1/p91-ward/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
reliability; standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf J.2} Computer Applications, PHYSICAL SCIENCES AND
ENGINEERING, Aerospace. {\bf I.6.3} Computing
Methodologies, SIMULATION AND MODELING, Applications.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Barker:1995:AUI,
author = "Paul Barker",
title = "An analysis of user input to an {X.500} white pages
directory service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "112--125",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p112-barker/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; human factors",
subject = "{\bf H.3.3} Information Systems, INFORMATION STORAGE
AND RETRIEVAL, Information Search and Retrieval, Query
formulation. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf F.2.2} Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Nonnumerical Algorithms and Problems.",
}
@Article{Chao:1995:DAL,
author = "H. Jonathan Chao and Byeong-Seog Choe",
title = "Design and analysis of a large-scale multicast output
buffered {ATM} switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "126--138",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p126-chao/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.5.4}
Computer Systems Organization, COMPUTER SYSTEM
IMPLEMENTATION, VLSI Systems.",
}
@Article{Lee:1995:CAS,
author = "Hyong W. Lee and Jon W. Mark",
title = "Capacity allocation in statistical multiplexing of
{ATM} sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "139--151",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p139-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf G.3} Mathematics of Computing,
PROBABILITY AND STATISTICS. {\bf G.1.2} Mathematics of
Computing, NUMERICAL ANALYSIS, Approximation. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Chen:1995:STS,
author = "Wen-Huei Chen and Hasan Ural",
title = "Synchronizable test sequences based on multiple {UIO}
sequences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "152--157",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p152-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol verification. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Levine:1995:PMA,
author = "David A. Levine and Ian F. Akyildiz",
title = "{PROTON}: a media access control protocol for optical
networks with star topology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "158--168",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p158-levine/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.2.5} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Local and Wide-Area Networks.",
}
@Article{Ofek:1995:MPA,
author = "Yoram Ofek and Moti Yung",
title = "{METANET}: principles of an arbitrary topology {LAN}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "169--180",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p169-ofek/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Min:1995:NAB,
author = "P. S. Min and H. Saidi and M. V. Hegde",
title = "A nonblocking architecture for broadband multichannel
switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "181--198",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p181-min/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks. {\bf C.2.0}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, General, Data communications. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, ISDN
(Integrated Services Digital Network).",
}
@Article{Lee:1995:CLA,
author = "Myung J. Lee and David S. Ahn",
title = "Cell loss analysis and design trade-offs of
nonblocking {ATM} switches with nonuniform traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "199--210",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p199-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Circuit-switching networks.",
}
@Article{Rouskas:1995:AOT,
author = "George N. Rouskas and Mostafa H. Ammar",
title = "Analysis and optimization of transmission schedules
for single-hop {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "211--221",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p211-rouskas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Design studies.",
}
@Article{Farkas:1995:CWS,
author = "Peter Farka{\u{s}}",
title = "Comments on {``Weighted sum codes for error detection
and their comparison with existing codes''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "2",
pages = "222--223",
month = apr,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{McAuley:1994:WSC}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-2/p222-farkas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf E.4} Data, CODING AND INFORMATION THEORY, Error
control codes.",
}
@Article{Paxson:1995:WAT,
author = "Vern Paxson and Sally Floyd",
title = "Wide area traffic: the failure of {Poisson} modeling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "226--244",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p226-paxson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Modeling techniques. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf G.m} Mathematics of
Computing, MISCELLANEOUS, Queueing theory**.",
}
@Article{Mills:1995:IAS,
author = "David L. Mills",
title = "Improved algorithms for synchronizing computer network
clocks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "245--254",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p245-mills/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf D.4.1} Software, OPERATING SYSTEMS,
Process Management, Synchronization.",
}
@Article{Shankar:1995:MTP,
author = "A. Udaya Shankar and David Lee",
title = "Minimum-latency transport protocols with
modulo-{$N$}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "255--268",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Olah:1996:CMT}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p255-shankar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Pankaj:1995:WRA,
author = "Rajesh K. Pankaj and Robert G. Gallager",
title = "Wavelength requirements of all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "269--280",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p269-pankaj/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
G.2.1} Mathematics of Computing, DISCRETE MATHEMATICS,
Combinatorics, Permutations and combinations. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Network problems. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Network topology.",
}
@Article{Zhang:1995:HWA,
author = "Zhensheng Zhang and Anthony S. Acampora",
title = "A heuristic wavelength assignment algorithm for
multihop {WDM} networks with wavelength routing and
wavelength re-use",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "281--288",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p281-zhang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf I.2.8} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Problem Solving, Control Methods, and
Search, Heuristic methods. {\bf G.2.1} Mathematics of
Computing, DISCRETE MATHEMATICS, Combinatorics. {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Network problems.",
}
@Article{Saidi:1995:NSP,
author = "H. Saidi and P. S. Min and M. V. Hegde",
title = "A new structural property of statistical data forks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "289--298",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p289-saidi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf B.4.2}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
Input/Output Devices, Channels and controllers. {\bf
G.2.1} Mathematics of Computing, DISCRETE MATHEMATICS,
Combinatorics, Permutations and combinations. {\bf G.3}
Mathematics of Computing, PROBABILITY AND STATISTICS.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf F.1.2} Theory of Computation, COMPUTATION
BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation.",
}
@Article{Cao:1995:PMA,
author = "Xi-Ren Cao and Don Towsley",
title = "A performance model for {ATM} switches with general
packet length distributions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "299--309",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p299-cao/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf F.1.2} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
Computation, Probabilistic computation. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Computations on discrete structures.",
}
@Article{McMillan:1995:DAC,
author = "David McMillan",
title = "Delay analysis of a cellular mobile priority queueing
system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "310--319",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p310-mcmillan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.0}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, General, Data communications. {\bf F.1.2}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Modes of Computation, Probabilistic computation.",
}
@Article{Cohen:1995:NLS,
author = "Reuven Cohen and Yoram Ofek and Adrian Segall",
title = "A new label-based source routing for multi-ring
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "320--328",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p320-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; standardization;
theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Token rings. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory, Network
problems. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Reibman:1995:TDV,
author = "Amy R. Reibman and Arthur W. Berger",
title = "Traffic descriptors for {VBR} video teleconferencing
over {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "329--339",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p329-reibman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
APPLICATIONS, Communications Applications, Computer
conferencing, teleconferencing, and videoconferencing.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Hamdaoui:1995:STT,
author = "Moncef Hamdaoui and Parameswaran Ramanathan",
title = "Selection of timed token protocol parameters to
guarantee message deadlines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "340--351",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p340-hamdaoui/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems. {\bf D.4.1} Software,
OPERATING SYSTEMS, Process Management,
Synchronization.",
}
@Article{Lea:1995:BQS,
author = "Chin-Tau Lea and Anwar Alyatama",
title = "Bandwidth quantization and states reduction in the
broadband {ISDN}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "3",
pages = "352--360",
month = jun,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-3/p352-lea/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf I.4.1} Computing Methodologies, IMAGE PROCESSING
AND COMPUTER VISION, Digitization and Image Capture,
Quantization. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf F.1.2} Theory of
Computation, COMPUTATION BY ABSTRACT DEVICES, Modes of
Computation, Probabilistic computation.",
}
@Article{Floyd:1995:LRM,
author = "Sally Floyd and Van Jacobson",
title = "Link-sharing and resource management models for packet
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "365--386",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p365-floyd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; performance",
subject = "{\bf H.3.5} Information Systems, INFORMATION STORAGE
AND RETRIEVAL, Online Information Services, Data
sharing. {\bf I.6.7} Computing Methodologies,
SIMULATION AND MODELING, Simulation Support Systems,
Environments. {\bf F.2.2} Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Nonnumerical Algorithms and Problems, Sequencing and
scheduling. {\bf D.4.1} Software, OPERATING SYSTEMS,
Process Management, Scheduling. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Packet-switching
networks.",
}
@Article{Zegura:1995:EBP,
author = "Ellen Witte Zegura",
title = "Evaluating blocking probability in generalized
connectors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "387--398",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p387-zegura/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; theory; verification",
subject = "{\bf I.6.1} Computing Methodologies, SIMULATION AND
MODELING, Simulation Theory, Model classification. {\bf
C.1.2} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Multiple Data Stream Architectures
(Multiprocessors), Connection machines. {\bf C.1.2}
Computer Systems Organization, PROCESSOR ARCHITECTURES,
Multiple Data Stream Architectures (Multiprocessors),
Interconnection architectures. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Computations on discrete structures. {\bf I.6.6}
Computing Methodologies, SIMULATION AND MODELING,
Simulation Output Analysis.",
}
@Article{Figueira:1995:UBD,
author = "Norival R. Figueira and Joseph Pasquale",
title = "An upper bound on delay for the {VirtualClock} service
discipline",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "399--408",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p399-figueira/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; theory",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
F.4.1} Theory of Computation, MATHEMATICAL LOGIC AND
FORMAL LANGUAGES, Mathematical Logic, Proof theory.
{\bf F.2.0} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, General.",
}
@Article{Moldeklev:1995:HLA,
author = "Kjersti Moldeklev and Per Gunningberg",
title = "How a large {ATM MTU} causes deadlocks in {TCP} data
transfers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "409--422",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p409-moldeklev/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; performance; theory",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Deadlocks. {\bf D.4.4} Software, OPERATING
SYSTEMS, Communications Management, Buffering. {\bf
B.4.3} Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
Interconnections (Subsystems), Asynchronous/synchronous
operation. {\bf B.4.1} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Data Communications Devices.",
}
@Article{Konstantopoulos:1995:OFC,
author = "Takis Konstantopoulos and Venkat Anantharam",
title = "Optimal flow control schemes that regulate the
burstiness of traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "423--432",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p423-konstantopoulos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network management. {\bf B.4.3} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
(Subsystems), Asynchronous/synchronous operation. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Computations on discrete
structures.",
}
@Article{Li:1995:ANP,
author = "Guang-Liang Li and Patrick W. Dowd",
title = "An analysis of network performance degradation induced
by workload fluctuations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "433--440",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p433-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "management; performance; theory",
subject = "{\bf B.4.4} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Performance Analysis and Design Aids**,
Worst-case analysis**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf F.4.1} Theory of Computation,
MATHEMATICAL LOGIC AND FORMAL LANGUAGES, Mathematical
Logic, Model theory.",
}
@Article{Bertossi:1995:CAH,
author = "Alan A. Bertossi and Maurizio A. Bonuccelli",
title = "Code assignment for hidden terminal interference
avoidance in multihop packet radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "441--449",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p441-bertossi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; theory; verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf G.2.2} Mathematics of Computing,
DISCRETE MATHEMATICS, Graph Theory, Network problems.
{\bf I.6.6} Computing Methodologies, SIMULATION AND
MODELING, Simulation Output Analysis. {\bf F.4.1}
Theory of Computation, MATHEMATICAL LOGIC AND FORMAL
LANGUAGES, Mathematical Logic, Proof theory. {\bf
I.2.8} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Problem Solving, Control Methods, and
Search, Heuristic methods. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.",
}
@Article{Kim:1995:TTS,
author = "Kyeong Soo Kim and Byeong Gi Lee",
title = "Three-level traffic shaper and its application to
source clock frequency recovery for {VBR} services in
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "450--458",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p450-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory",
subject = "{\bf I.2.10} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Vision and Scene Understanding, Modeling
and recovery of physical attributes. {\bf B.4.3}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
Interconnections (Subsystems), Asynchronous/synchronous
operation. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication.",
}
@Article{Bala:1995:RLL,
author = "Krishna Bala and Thomas E. Stern and David Simchi-Levi
and Kavita Bala",
title = "Routing in a linear lightwave network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "459--469",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p459-bala/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory",
subject = "{\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems),
Topology. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
F.4.1} Theory of Computation, MATHEMATICAL LOGIC AND
FORMAL LANGUAGES, Mathematical Logic, Recursive
function theory. {\bf B.4.0} Hardware, INPUT/OUTPUT AND
DATA COMMUNICATIONS, General. {\bf G.1.3} Mathematics
of Computing, NUMERICAL ANALYSIS, Numerical Linear
Algebra, Sparse, structured, and very large systems
(direct and iterative methods).",
}
@Article{Iness:1995:GGS,
author = "Jason Iness and Subrata Banerjee and Biswanath
Mukherjee",
title = "{GEMNET}: a generalized, shuffle-exchange-based,
regular, scalable, modular, multihop, {WDM} lightwave
network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "470--476",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p470-iness/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; performance; theory",
subject = "{\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems),
Topology. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol architecture. {\bf D.4.1} Software, OPERATING
SYSTEMS, Process Management, Scheduling. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf G.2.2} Mathematics
of Computing, DISCRETE MATHEMATICS, Graph Theory. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Jia:1995:SVM,
author = "Feiling Jia and Biswanath Mukherjee and Jason Iness",
title = "Scheduling variable-length messages in a single-hop
multichannel local lightwave network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "4",
pages = "477--488",
month = aug,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-4/p477-jia/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; performance; theory",
subject = "{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Scheduling. {\bf I.6.1} Computing
Methodologies, SIMULATION AND MODELING, Simulation
Theory, Systems theory.",
}
@Article{Ramaswami:1995:RWA,
author = "Rajiv Ramaswami and Kumar N. Sivarajan",
title = "Routing and wavelength assignment in all-optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "489--500",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p489-ramaswami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout.",
}
@Article{Gupta:1995:RPR,
author = "Amit Gupta and Domenico Ferrari",
title = "Resource partitioning for real-time communication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "501--508",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p501-gupta/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.3}
Computer Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS, Real-time and embedded
systems.",
}
@Article{Bannister:1995:PMD,
author = "Joseph Bannister and Flaminio Borgonovo and Luigi
Fratta and Mario Gerla",
title = "A performance model of deflection routing in
multibuffer networks with nonuniform traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "509--520",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p509-bannister/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf D.4.8} Software, OPERATING SYSTEMS, Performance,
Modeling and prediction.",
}
@Article{Merchant:1995:ACS,
author = "Arif Merchant and Bhaskar Sengupta",
title = "Assignment of cells to switches in {PCS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "521--526",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p521-merchant/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.1.6} Mathematics of Computing,
NUMERICAL ANALYSIS, Optimization, Integer
programming.",
}
@Article{Padmanabhan:1995:EAF,
author = "Krishnan Padmanabhan",
title = "An efficient architecture for fault-tolerant {ATM}
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "527--537",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p527-padmanabhan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf D.4.5} Software, OPERATING SYSTEMS,
Reliability, Fault-tolerance.",
}
@Article{Smith:1995:ERC,
author = "Donald E. Smith",
title = "Ensuring robust call throughput and fairness for {SCP}
overload controls",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "538--548",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p538-smith/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.",
}
@Article{Chan:1995:PSM,
author = "Ming H. Chan and John P. Princen",
title = "Prioritized statistical multiplexing of {PCM}
sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "549--559",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p549-chan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS.",
}
@Article{Silva:1995:PSS,
author = "Edmundo de Souza e. Silva and H. Richard Gail and
Richard R. Muntz",
title = "Polling systems with server timeouts and their
application to token passing networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "560--575",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p560-de_souza_e_silva/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**.",
}
@Article{Tassiulas:1995:PMS,
author = "Leandros Tassiulas and Jinoo Joung",
title = "Performance measures and scheduling policies in ring
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "576--584",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p576-tassiulas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory; verification",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Token rings. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations.",
}
@Article{Choudhury:1995:IAC,
author = "Gagan L. Choudhury and Kin K. Leung and Ward Whitt",
title = "An inversion algorithm to compute blocking
probabilities in loss networks with state-dependent
rates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "585--601",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p585-choudhury/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; theory; verification",
subject = "{\bf G.3} Mathematics of Computing, PROBABILITY AND
STATISTICS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**.",
}
@Article{Borst:1995:USL,
author = "Sem C. Borst and Onno J. Boxma and Hanoch Levy",
title = "The use of service limits for efficient operation of
multistation single-medium communication systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "602--612",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p602-borst/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory; verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Lee:1995:SCA,
author = "Whay Chiou Lee and Pierre A. Humblet",
title = "Space-time characteristics of {ALOHA} protocols in
high-speed bidirectional bus networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "5",
pages = "613--622",
month = oct,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-5/p613-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Hwang:1995:OPD,
author = "Ren-Hung Hwang and James F. Kurose and Don Towsley",
title = "On-call processing delay in high speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "628--639",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p628-hwang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Feldmeier:1995:FSI,
author = "David C. Feldmeier",
title = "Fast software implementation of error detection
codes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "640--651",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p640-feldmeier/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
reliability; standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf E.4} Data, CODING AND INFORMATION
THEORY, Error control codes. {\bf C.2.0} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
General. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Chao:1995:AQM,
author = "H. Jonathan Chao and Necdet Uzun",
title = "An {ATM} queue manager handling multiple delay and
loss priorities",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "652--659",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p652-chao/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement;
performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, ISDN (Integrated Services
Digital Network). {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network management.",
}
@Article{Wu:1995:BAS,
author = "Guo-Liang Wu and Jon W. Mark",
title = "A buffer allocation scheme for {ATM} networks:
complete sharing based on virtual partition",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "660--670",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p660-wu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf F.1.2} Theory of Computation, COMPUTATION
BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation.",
}
@Article{Kanakia:1995:ACC,
author = "Hemant Kanakia and Partho P. Mishra and Amy R.
Reibman",
title = "An adaptive congestion control scheme for real time
packet video transport",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "671--682",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p671-kanakia/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory",
subject = "{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Packet-switching
networks. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Xie:1995:DGV,
author = "Geoffrey G. Xie and Simon S. Lam",
title = "Delay guarantee of virtual clock server",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "683--689",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p683-xie/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf C.2.0} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
General. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks.",
}
@Article{Shi:1995:HSR,
author = "Jianxu Shi and John P. Fonseka",
title = "Hierarchical self-healing rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "690--697",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p690-shi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Token rings. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout.",
}
@Article{Madhow:1995:OWR,
author = "Upamanyu Madhow and Michael L. Honig and Kenneth
Steiglitz",
title = "Optimization of wireless resources for personal
communications mobility tracking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "698--707",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p698-madhow/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf I.2.8}
Computing Methodologies, ARTIFICIAL INTELLIGENCE,
Problem Solving, Control Methods, and Search, Dynamic
programming.",
}
@Article{Chen:1995:NMP,
author = "C. Y. Roger Chen and Shuo-Hsien Hsiao and Abdulaziz S.
Almazyad",
title = "A new model for the performance evaluation of
synchronous circuit switched multistage interconnection
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "708--715",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p708-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.1.2} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Multiple Data Stream Architectures
(Multiprocessors), Interconnection architectures. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Circuit-switching
networks.",
}
@Article{Ghosal:1995:PAP,
author = "Dipak Ghosal and T. V. Lakshman and Yennun Huang",
title = "Parallel architectures for processing high speed
network signaling protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "716--728",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p716-ghosal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory",
subject = "{\bf F.1.2} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Modes of Computation, Parallelism and
concurrency. {\bf C.1.3} Computer Systems Organization,
PROCESSOR ARCHITECTURES, Other Architecture Styles.
{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Zhang:1995:OSB,
author = "Sijing Zhang and Alan Burns",
title = "An optimal synchronous bandwidth allocation scheme for
guaranteeing synchronous message deadlines with the
timed-token {MAC} protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "729--741",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p729-zhang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems. {\bf C.2.5} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Local and Wide-Area Networks, Token rings. {\bf B.4.3}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
Interconnections (Subsystems), Asynchronous/synchronous
operation.",
}
@Article{Jeong:1995:DPE,
author = "Dong Guen Jeong and Chong-Ho Choi and Wha Sook Jeon",
title = "Design and performance evaluation of a new medium
access control protocol for local wireless data
communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "742--752",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p742-jeong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Katzela:1995:SFI,
author = "Irene Katzela and Mischa Schwartz",
title = "Schemes for fault identification in communication
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "753--764",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p753-katzela/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability; theory; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
communications. {\bf G.2.0} Mathematics of Computing,
DISCRETE MATHEMATICS, General. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis.",
}
@Article{Pollini:1995:ERI,
author = "Gregory P. Pollini and Kathleen S. Meier-Hellstern",
title = "Efficient routing of information between
interconnected cellular mobile switching centers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "765--774",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p765-pollini/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Path and circuit problems. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Herzberg:1995:HAS,
author = "Meir Herzberg and Stephen J. Bye and Anthony Utano",
title = "The hop-limit approach for spare-capacity assignment
in survivable networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "775--784",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p775-herzberg/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.1.6} Mathematics of Computing,
NUMERICAL ANALYSIS, Optimization, Linear programming.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Sidhu:1995:MGB,
author = "Ikhlaq Sidhu and Scott Jordan",
title = "Multiplexing gains in bit stream multiplexors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "785--797",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p785-sidhu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.1.2} Mathematics of Computing,
NUMERICAL ANALYSIS, Approximation.",
}
@Article{Smith:1995:SPR,
author = "Donald E. Smith and H. Jonathan Chao",
title = "Sizing a packet reassembly buffer at a host computer
in an {ATM} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "798--808",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p798-smith/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Medhi:1995:MMC,
author = "D. Medhi",
title = "Multi-hour, multi-traffic class network design for
virtual path-based dynamically reconfigurable wide-area
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "809--818",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p809-medhi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Path and circuit problems.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
I.2.8} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Problem Solving, Control Methods, and
Search, Heuristic methods.",
}
@Article{Shenker:1995:MGW,
author = "Scott J. Shenker",
title = "Making greed work in networks: a game-theoretic
analysis of switch service disciplines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "819--831",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p819-shenker/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory;
verification",
subject = "{\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**.",
}
@Article{DAmbrosio:1995:ELB,
author = "Matteo D'Ambrosio and Riccardo Melen",
title = "Evaluating the limit behavior of the {ATM} traffic
within a network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "832--841",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p832-d_ambrosio/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**.",
}
@Article{Rubin:1995:AMQ,
author = "Izhak Rubin and James Chien-Hsing Wu",
title = "Analysis of an {M\slash G\slash 1\slash N} queue with
vacations and its iterative application to {FDDI}
timed-token rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "842--856",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p842-rubin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Token rings. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
F.1.2} Theory of Computation, COMPUTATION BY ABSTRACT
DEVICES, Modes of Computation, Probabilistic
computation. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks.",
}
@Article{Min:1995:NCN,
author = "Paul S. Min and Manjunath V. Hegde and Hossein Saidi
and Alex Chandra",
title = "Nonblocking copy networks in multi-channel switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "857--871",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p857-min/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf F.1.2} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Modes of Computation, Probabilistic
computation. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**.",
}
@Article{Chen:1995:QAP,
author = "C. Y. Roger Chen and Georges A. Makhoul and Dikran S.
Meliksetian",
title = "A queueing analysis of the performance of {DQDB}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "3",
number = "6",
pages = "872--881",
month = dec,
year = "1995",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1995-3-6/p872-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Banerjea:1996:TRP,
author = "Anindo Banerjea and Domenico Ferrari and Bruce A. Mah
and Mark Moran and Dinesh C. Verma and Hui Zhang",
title = "The {Tenet} real-time protocol suite: design,
implementation, and experiences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "1--10",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p1-banerjea/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems.",
}
@Article{Cruz:1996:CAA,
author = "R. L. Cruz and Jung-Tsung Tsai",
title = "{COD}: alternative architectures for high speed packet
switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "11--21",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p11-cruz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks.",
}
@Article{Murakami:1996:VPR,
author = "Kazutaka Murakami and Hyong S. Kim",
title = "Virtual path routing for survivable {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "22--39",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p22-murakami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout.",
}
@Article{Heyman:1996:SMV,
author = "Daniel P. Heyman and T. V. Lakshman",
title = "Source models for {VBR} broadcast-video traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "40--48",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p40-heyman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf I.6.4} Computing Methodologies,
SIMULATION AND MODELING, Model Validation and
Analysis.",
}
@Article{Hung:1996:BSW,
author = "Anthony Hung and George Kesidis",
title = "Bandwidth scheduling for wide-area {ATM} networks
using virtual finishing times",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "49--54",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p49-hung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.",
}
@Article{Leue:1996:POI,
author = "Stefan Leue and Philippe A. Oechslin",
title = "On parallelizing and optimizing the implementation of
communication protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "55--70",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p55-leue/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.3.3} Software, PROGRAMMING LANGUAGES, Language
Constructs and Features. {\bf D.2.2} Software, SOFTWARE
ENGINEERING, Design Tools and Techniques,
Computer-aided software engineering (CASE). {\bf F.3.1}
Theory of Computation, LOGICS AND MEANINGS OF PROGRAMS,
Specifying and Verifying and Reasoning about Programs,
Specification techniques.",
}
@Article{Picker:1996:ESF,
author = "Dan Picker and Ronald D. Fellman and Paul M. Chau",
title = "An extension to the {SCI} flow control protocol for
increased network efficiency",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "71--85",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p71-picker/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; standardization;
theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf K.1} Computing Milieux, THE COMPUTER INDUSTRY,
Standards.",
}
@Article{Doeringer:1996:RLP,
author = "Willibald Doeringer and G{\"u}nter Karjoth and Mehdi
Nassehi",
title = "Routing on longest-matching prefixes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "86--97",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See corrections \cite{Doeringer:1997:CRL}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p86-doeringer/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; theory;
verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
G.2.0} Mathematics of Computing, DISCRETE MATHEMATICS,
General.",
}
@Article{Lee:1996:WFC,
author = "Daniel Chonghwan Lee",
title = "Worst-case fraction of {CBR} teletraffic unpunctual
due to statistical multiplexing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "98--105",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p98-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{Koppelman:1996:CBN,
author = "David M. Koppelman",
title = "Congested {Banyan} network analysis using
congested-queue states and neighboring-queue effects",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "106--111",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p106-koppelman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Modeling techniques.",
}
@Article{Rosberg:1996:CMA,
author = "Zvi Rosberg",
title = "Cell multiplexing in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "112--122",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p112-rosberg/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Dziong:1996:FCA,
author = "Zbigniew Dziong and Lorne G. Mason",
title = "Fair-efficient call admission control policies for
broadband networks --- a game theoretic framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "1",
pages = "123--136",
month = feb,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-1/p123-dziong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.",
}
@Article{Chandranmenon:1996:TPH,
author = "Girish P. Chandranmenon and George Varghese",
title = "Trading packet headers for packet processing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "141--152",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p141-chandranmenon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf B.4.4}
Hardware, INPUT/OUTPUT AND DATA COMMUNICATIONS,
Performance Analysis and Design Aids**, Formal
models**. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Deering:1996:PAW,
author = "Stephen Deering and Deborah L. Estrin and Dino
Farinacci and Van Jacobson and Ching-Gung Liu and
Liming Wei",
title = "The {PIM} architecture for wide-area multicast
routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "153--162",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p153-deering/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.4} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems.",
}
@Article{Jiang:1996:PCB,
author = "Hua Jiang and Stephen S. Rappaport",
title = "Prioritized channel borrowing without locking: a
channel sharing strategy for cellular communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "163--172",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p163-jiang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Access schemes. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Design studies.",
}
@Article{Zarros:1996:ISR,
author = "Panagiotis N. Zarros and Myung J. Lee and Tarek N.
Saadawi",
title = "Interparticipant synchronization in real-time
multimedia conferencing using feedback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "173--180",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p173-zarros/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf H.4.3}
Information Systems, INFORMATION SYSTEMS APPLICATIONS,
Communications Applications, Computer conferencing,
teleconferencing, and videoconferencing. {\bf D.4.4}
Software, OPERATING SYSTEMS, Communications Management.
{\bf H.5.1} Information Systems, INFORMATION INTERFACES
AND PRESENTATION, Multimedia Information Systems.",
}
@Article{Bauer:1996:DAM,
author = "Fred Bauer and Anujan Varma",
title = "Distributed algorithms for multicast path setup in
data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "181--191",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p181-bauer/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Computations on discrete structures. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Trees. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory, Path and
circuit problems.",
}
@Article{Liu:1996:GFR,
author = "Hong Liu and Raymond E. Miller",
title = "Generalized fair reachability analysis for cyclic
protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "192--204",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p192-liu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory; verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Computations on discrete
structures. {\bf F.1.1} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
Automata. {\bf G.2.2} Mathematics of Computing,
DISCRETE MATHEMATICS, Graph Theory, Path and circuit
problems. {\bf F.3.1} Theory of Computation, LOGICS AND
MEANINGS OF PROGRAMS, Specifying and Verifying and
Reasoning about Programs.",
}
@Article{Tassiulas:1996:WPS,
author = "Leandros Tassiulas and Leonidas Georgiadis",
title = "Any work-conserving policy stabilizes the ring with
spatial re-use",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "205--208",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p205-tassiulas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; standardization; theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Token rings. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network management. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Packet-switching
networks.",
}
@Article{Erramilli:1996:EQA,
author = "Ashok Erramilli and Onuttom Narayan and Walter
Willinger",
title = "Experimental queueing analysis with long-range
dependent packet traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "209--223",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p209-erramilli/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; management; measurement;
performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Modeling techniques.",
}
@Article{Mishra:1996:HRC,
author = "Partho Pratim Mishra and Hemant Kanakia and Satish K.
Tripathi",
title = "On hop-by-hop rate-based congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "224--239",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p224-mishra/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance; theory",
subject = "{\bf D.4.8} Software, OPERATING SYSTEMS, Performance,
Operational analysis. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, General.
{\bf I.5.1} Computing Methodologies, PATTERN
RECOGNITION, Models.",
}
@Article{Zho:1996:IMC,
author = "Hongbo Zho and Victor S. Frost",
title = "In-service monitoring for cell loss quality of service
violations in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "240--248",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p240-zho/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance; theory",
subject = "{\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems),
Asynchronous/synchronous operation. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations, Network monitoring. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Buffering. {\bf I.6.7} Computing
Methodologies, SIMULATION AND MODELING, Simulation
Support Systems, Environments.",
}
@Article{Gaiti:1996:PMI,
author = "Dominique Ga{\"\i}ti and Guy Pujolle",
title = "Performance management issues in {ATM} networks:
traffic and congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "249--257",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p249-gaiti/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf B.4.3} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
(Subsystems), Asynchronous/synchronous operation. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Network problems. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Jacob:1996:DPS,
author = "Lillykutty Jacob and Anurag Kumar",
title = "Delay performance of some scheduling strategies in an
input queuing {ATM} switch with multiclass bursty
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "258--271",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p258-jacob/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Scheduling. {\bf B.4.3} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Interconnections
(Subsystems), Asynchronous/synchronous operation. {\bf
I.6.3} Computing Methodologies, SIMULATION AND
MODELING, Applications.",
}
@Article{Clementi:1996:HAO,
author = "Andrea E. F. Clementi and Miriam {Di Ianni}",
title = "On the hardness of approximating optimum schedule
problems in store and forward networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "272--280",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p272-clementi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; management; theory",
subject = "{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Scheduling. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Store and forward networks.
{\bf G.1.2} Mathematics of Computing, NUMERICAL
ANALYSIS, Approximation. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory, Network
problems.",
}
@Article{Liotopoulos:1996:SNO,
author = "Fotios K. Liotopoulos and Suresh Chalasani",
title = "Semi-rearrangeably nonblocking operation of {Clos}
networks in the multirate environment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "281--291",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p281-liotopoulos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory; verification",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks.",
}
@Article{Altman:1996:BPM,
author = "Eitan Altman and Daniel Kofman",
title = "Bounds for performance measures of token rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "2",
pages = "292--299",
month = apr,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-2/p292-altman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management",
subject = "{\bf F.2.0} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems),
Asynchronous/synchronous operation.",
}
@Article{Heyman:1996:WIL,
author = "Daniel P. Heyman and T. V. Lakshman",
title = "What are the implications of long-range dependence for
{VBR}-video traffic engineering?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "301--317",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p301-heyman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; performance;
theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf F.1.2} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation. {\bf G.3} Mathematics of
Computing, PROBABILITY AND STATISTICS, Statistical
computing. {\bf H.4.3} Information Systems, INFORMATION
SYSTEMS APPLICATIONS, Communications Applications,
Computer conferencing, teleconferencing, and
videoconferencing.",
}
@Article{Braun:1996:PEC,
author = "Torsten Braun and Christophe Diot",
title = "Performance evaluation and cache analysis of an {ILP}
protocol implementation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "318--330",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p318-braun/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Performance attributes. {\bf
B.3.3} Hardware, MEMORY STRUCTURES, Performance
Analysis and Design Aids**.",
}
@Article{Kabatepe:1996:FDQ,
author = "Mete Kabatepe and Kenneth S. Vastola",
title = "The fair distributed queue {(FDQ)} protocol for
high-speed metropolitan-area networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "331--339",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p331-kabatepe/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol architecture. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Modeling techniques.",
}
@Article{Turletti:1996:VI,
author = "Thierry Turletti and Christian Huitema",
title = "Videoconferencing on the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "340--351",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p340-turletti/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf H.4.3} Information Systems, INFORMATION SYSTEMS
APPLICATIONS, Communications Applications, Computer
conferencing, teleconferencing, and videoconferencing.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Internet. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf I.4.2} Computing Methodologies, IMAGE PROCESSING
AND COMPUTER VISION, Compression (Coding).",
}
@Article{Wrege:1996:DDB,
author = "Dallas E. Wrege and Edward W. Knightly and Hui Zhang
and J{\"o}rg Liebeherr",
title = "Deterministic delay bounds for {VBR} video in
packet-switching networks: fundamental limits and
practical trade-offs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "352--362",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p352-wrege/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Design studies.",
}
@Article{Cohen:1996:STP,
author = "Reuven Cohen and Baiju V. Patel and Frank Schaffa and
Marc Willebeek-LeMair",
title = "The sink tree paradigm: connectionless traffic support
on {ATM LAN}'s",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "363--374",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p363-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Trees. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology.",
}
@Article{Shreedhar:1996:EFQ,
author = "M. Shreedhar and George Varghese",
title = "Efficient fair queueing using deficit round-robin",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "375--385",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p375-shreedhar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{Wu:1996:CMP,
author = "Guo-Liang Wu and Jon W. Mark",
title = "Computational methods for performance evaluation of a
statistical multiplexer supporting bursty traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "386--397",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p386-wu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Modeling techniques. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Asynchronous Transfer
Mode (ATM).",
}
@Article{Tassiulas:1996:PFL,
author = "Leandros Tassiulas",
title = "Push forward link-level scheduling for network-wide
performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "398--406",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p398-tassiulas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.",
}
@Article{Papadimitriou:1996:LAR,
author = "Georgios I. Papadimitriou and Dimitris G. Maritsas",
title = "Learning automata-based receiver conflict avoidance
algorithms for {WDM} broadcast-and-select star
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "407--412",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p407-papadimitriou/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Network
topology. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Performance attributes. {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling.",
}
@Article{Pejhan:1996:ECU,
author = "Sassan Pejhan and Mischa Schwartz and Dimitris
Anastassiou",
title = "Error control using retransmission schemes in
multicast transport protocols for real-time media",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "413--427",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p413-pejhan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Performance
attributes. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Reliability, availability, and
serviceability.",
}
@Article{Asawa:1996:OSH,
author = "Manjari Asawa and Wayne E. Stark",
title = "Optimal scheduling of handoffs in cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "428--441",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p428-asawa/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf F.1.2}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Modes of Computation, Probabilistic computation. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Modeling techniques. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes. {\bf F.2.0} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, General.",
}
@Article{Birk:1996:EDI,
author = "Yitzhak Birk and Noam Bloch",
title = "The effects of destructive interference and wasted
transmissions on the uniform-traffic capacity of
non-bus-oriented single-hop interconnections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "442--448",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p442-birk/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory",
subject = "{\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems), Fiber
optics. {\bf B.4.3} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Interconnections (Subsystems),
Topology. {\bf F.2.1} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Numerical
Algorithms and Problems, Computations on matrices.",
}
@Article{Catania:1996:CAF,
author = "Vincenzo Catania and Giuseppe Ficili and Sergio
Palazzo and Daniela Panno",
title = "A comparative analysis of fuzzy versus conventional
policing mechanisms for {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "449--459",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p449-catania/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes. {\bf I.2.3} Computing
Methodologies, ARTIFICIAL INTELLIGENCE, Deduction and
Theorem Proving, Uncertainty, ``fuzzy,'' and
probabilistic reasoning.",
}
@Article{Cheng:1996:DFT,
author = "Ray-Guang Cheng and Chung-Ju Chang",
title = "Design of a fuzzy traffic controller for {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "460--469",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p460-cheng/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf G.3}
Mathematics of Computing, PROBABILITY AND STATISTICS,
Probabilistic algorithms (including Monte Carlo). {\bf
I.2.3} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Deduction and Theorem Proving,
Uncertainty, ``fuzzy,'' and probabilistic reasoning.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Performance attributes.",
}
@Article{Swiderski:1996:APA,
author = "Jacek {\'S}widerski",
title = "Approximate performance analysis of real-time traffic
over heavily loaded networks with timed token
protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "3",
pages = "470--478",
month = jun,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-3/p470-swiderski/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.5}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Local and Wide-Area Networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols.",
}
@Article{Georgiadis:1996:ENQ,
author = "Leonidas Georgiadis and Roch Gu{\'e}rin and Vinod
Peris and Kumar N. Sivarajan",
title = "Efficient network {QoS} provisioning based on per node
traffic shaping",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "482--501",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p482-georgiadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory; verification",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management. {\bf G.m} Mathematics of Computing,
MISCELLANEOUS, Queueing theory**. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Ahuja:1996:DIP,
author = "R. Ahuja and S. Keshav and H. Saran",
title = "Design, implementation, and performance measurement of
a native-mode {ATM} transport layer (extended
version)",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "502--515",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p502-ahuja/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Salehi:1996:EAS,
author = "James D. Salehi and James F. Kurose and Don Towsley",
title = "The effectiveness of affinity-based scheduling in
multiprocessor network protocol processing (extended
version)",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "516--530",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p516-salehi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management, Scheduling. {\bf D.4.4} Software, OPERATING
SYSTEMS, Communications Management.",
}
@Article{Mitra:1996:AND,
author = "Debasis Mitra and John A. Morrison and K. G.
Ramakrishnan",
title = "{ATM} network design and optimization: a multirate
loss network framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "531--543",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p531-mitra/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Subramaniam:1996:ANS,
author = "Suresh Subramaniam and Murat Azizo{\u{g}}lu and Arun
K. Somani",
title = "All-optical networks with sparse wavelength
conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "544--557",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p544-subramaniam/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.2.2} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Protocols. {\bf B.4.1} Hardware, INPUT/OUTPUT
AND DATA COMMUNICATIONS, Data Communications Devices.",
}
@Article{Ramanathan:1996:MTG,
author = "S. Ramanathan",
title = "Multicast tree generation in networks with asymmetric
links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "558--568",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p558-ramanathan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; theory",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Charny:1996:TSA,
author = "Anna Charny and K. K. Ramakrishnan and Anthony Lauck",
title = "Time scale analysis scalability issues for explicit
rate allocation in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "569--581",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p569-charny/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication. {\bf F.2.0} Theory
of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, General. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology.",
}
@Article{Zibman:1996:AAM,
author = "Israel Zibman and Carl Woolf and Peter O'Reilly and
Larry Strickland and David Willis and John Visser",
title = "An architectural approach to minimizing feature
interactions in telecommunications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "582--596",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p582-zibman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Marcus:1996:AQA,
author = "William S. Marcus",
title = "An architecture for {QoS} analysis and
experimentation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "597--603",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p597-marcus/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; theory; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.5.0} Computer Systems Organization, COMPUTER SYSTEM
IMPLEMENTATION, General.",
}
@Article{Smith:1996:IGP,
author = "Peter J. Smith and Mansoor Shafi",
title = "The impact of {G.826} on the performance of transport
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "604--614",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p604-smith/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization",
subject = "{\bf B.4.0} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, General. {\bf B.5.0} Hardware,
REGISTER-TRANSFER-LEVEL IMPLEMENTATION, General. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Moghe:1996:ECP,
author = "Pratyush Mogh{\'e} and Izhak Rubin",
title = "Enhanced call: a paradigm for applications with
dynamic client-membership and client-level binding in
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "615--628",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p615-moghe/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "management; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Akyildiz:1996:MLU,
author = "Ian F. Akyildiz and Joseph S. M. Ho and Yi-Bing Lin",
title = "Movement-based location update and selective paging
for {PCS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "629--638",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p629-akyildiz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks.",
}
@Article{Modiano:1996:EAP,
author = "Eytan Modiano and Anthony Ephremides",
title = "Efficient algorithms for performing packet broadcasts
in a mesh network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "639--648",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p639-modiano/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Rubin:1996:PAD,
author = "Izhak Rubin and Ho-Ting Wu",
title = "Performance analysis and design of {CQBT} algorithm
for a ring network with spatial reuse",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "649--659",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p649-rubin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Network communication.",
}
@Article{Olah:1996:CMT,
author = "Andr{\'a}s L. Ol{\'a}h and Sonia M. Heemstra de
Groot",
title = "Comments on {``Minimum-latency transport protocols
with modulo-$N$''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "4",
pages = "660--666",
month = aug,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Shankar:1995:MTP}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-4/p660-olah/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "documentation; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Gong:1996:AEC,
author = "Fengmin Gong and Gurudatta M. Parulkar",
title = "An application-oriented error control scheme for
high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "669--683",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p669-gong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Mukherjee:1996:SPD,
author = "Biswanath Mukherjee and Dhritiman Banerjee and S.
Ramamurthy and Amarnath Mukherjee",
title = "Some principles for designing a wide-area {WDM}
optical network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "684--696",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p684-mukherjee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; measurement;
performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS.",
}
@Article{Lam:1996:LSA,
author = "Simon S. Lam and Simon Chow and David K. Y. Yau",
title = "A lossless smoothing algorithm for compressed video",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "697--708",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p697-lam/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; measurement;
performance; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf I.4.3}
Computing Methodologies, IMAGE PROCESSING AND COMPUTER
VISION, Enhancement, Smoothing. {\bf I.1.2} Computing
Methodologies, SYMBOLIC AND ALGEBRAIC MANIPULATION,
Algorithms, Analysis of algorithms. {\bf I.4.2}
Computing Methodologies, IMAGE PROCESSING AND COMPUTER
VISION, Compression (Coding). {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Ho:1996:LAS,
author = "Joseph S. M. Ho and Ian F. Akyildiz",
title = "Local anchor scheme for reducing signaling costs in
personal communications networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "709--725",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p709-ho/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; human factors; measurement; performance;
theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations.",
}
@Article{Bononi:1996:AEI,
author = "Alberto Bononi and Paul R. Prucnal",
title = "Analytical evaluation of improved access techniques in
deflection routing networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "726--730",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p726-bononi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf F.1.2} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations.",
}
@Article{Schultz:1996:MCR,
author = "Kenneth J. Schultz and P. Glenn Gulak",
title = "Multicast contention resolution with single-cycle
windowing using content addressable {FIFO}'s",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "731--742",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p731-schultz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital
Network).",
}
@Article{Ahn:1996:PNS,
author = "Jong Suk Ahn and Peter B. Danzig",
title = "Packet network simulation: speedup and accuracy versus
timing granularity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "743--757",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p743-ahn/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; measurement;
performance; reliability; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations.",
}
@Article{Lee:1996:DRC,
author = "Tsern-Huei Lee and Kuen-Chu Lai and Shii-Tyng Duann",
title = "Design of a real-time call admission controller for
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "758--765",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p758-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf B.4.2} Hardware, INPUT/OUTPUT AND DATA
COMMUNICATIONS, Input/Output Devices, Channels and
controllers. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf C.3} Computer Systems
Organization, SPECIAL-PURPOSE AND APPLICATION-BASED
SYSTEMS, Real-time and embedded systems. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, ISDN
(Integrated Services Digital Network).",
}
@Article{Elbaum:1996:TDL,
author = "Reuven Elbaum and Moshe Sidi",
title = "Topological design of local-area networks using
genetic algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "766--778",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p766-elbaum/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf I.2.8} Computing Methodologies,
ARTIFICIAL INTELLIGENCE, Problem Solving, Control
Methods, and Search, Heuristic methods. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf I.1.2} Computing Methodologies, SYMBOLIC AND
ALGEBRAIC MANIPULATION, Algorithms, Analysis of
algorithms.",
}
@Article{Narahari:1996:EAE,
author = "Bhagirath Narahari and Sunil Shende and Rahul Simha",
title = "Efficient algorithms for erasure node placement on
slotted dual bus networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "779--784",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p779-narahari/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Agarwal:1996:UAF,
author = "Anjali Agarwal and J. William Atwood",
title = "A unified approach to fault-tolerance in communication
protocols based on recovery procedures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "785--795",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p785-agarwal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Security and
protection (e.g., firewalls).",
}
@Article{Vargas:1996:SPL,
author = "Cesar Vargas and Manjunath V. Hegde and Morteza
Naraghi-Pour and Paul S. Min",
title = "Shadow prices for {LLR} and {ALBA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "5",
pages = "796--807",
month = oct,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-5/p796-vargas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout.",
}
@Article{Low:1996:ACC,
author = "Steven H. Low and Nicholas F. Maxemchuk and Sanjoy
Paul",
title = "Anonymous credit cards and their collusion analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "809--816",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p809-low/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
security; standardization; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, General,
Security and protection (e.g., firewalls). {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols.",
}
@Article{Kay:1996:PRP,
author = "Jonathan Kay and Joseph Pasquale",
title = "Profiling and reducing processing overheads in
{TCP\slash IP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "817--828",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p817-kay/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Williamson:1996:DBA,
author = "Carey L. Williamson",
title = "Dynamic bandwidth allocation using loss-load curves",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "829--839",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p829-williamson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{LaPorta:1996:CSL,
author = "Thomas F. {La Porta} and Malathi Veeraraghavan and
Richard W. Buskens",
title = "Comparison of signaling loads for {PCS} systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "840--856",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p840-la_porta/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols.",
}
@Article{Papavassiliou:1996:JOC,
author = "Symeon Papavassiliou and Leandros Tassiulas",
title = "Joint optimal channel base station and power
assignment for wireless access",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "857--872",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p857-papavassiliou/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Gerstel:1996:LVP,
author = "Ornan Gerstel and Israel Cidon and Shmuel Zaks",
title = "The layout of virtual paths in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "873--884",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p873-gerstel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems. {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Liebeherr:1996:EAC,
author = "J{\"o}rg Liebeherr and Dallas E. Wrege and Domenico
Ferrari",
title = "Exact admission control for networks with a bounded
delay service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "885--901",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p885-liebeherr/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling.",
}
@Article{Abu-Amara:1996:STM,
author = "Hosame Abu-Amara and Brian A. Coan and Shlomi Dolev
and Arkady Kanevsky and Jennifer L. Welch",
title = "Self-stabilizing topology maintenance protocols for
high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "902--912",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p902-abu-amara/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Choi:1996:EST,
author = "Hongsik Choi and Hyeong-Ah Choi and Murat
Azizo{\u{g}}lu",
title = "Efficient scheduling of transmissions in optical
broadcast networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "913--920",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p913-choi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Chung:1996:CCU,
author = "Sung-hark Chung and Hu-gon Kim and Yong-seok Yoon and
Dong-wan Tcha",
title = "Cost-minimizing construction of a unidirectional {SHR}
with diverse protection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "921--928",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p921-chung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, General,
Data communications. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Token rings.",
}
@Article{Kamal:1996:PMP,
author = "Ahmed E. Kamal",
title = "Performance modeling of partial packet discarding
using the end-of-packet indicator in {AAL} type 5",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "929--940",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p929-kamal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols.",
}
@Article{Ramesh:1996:RMA,
author = "Sridhar Ramesh and Catherine Rosenberg and Anurag
Kumar",
title = "Revenue maximization in {ATM} networks using the {CLP}
capability and buffer priority management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "941--950",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p941-ramesh/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.",
}
@Article{Henniger:1996:STB,
author = "Olaf Henniger and Michel Barbeau and Beh{\c{c}}et
Sarikaya",
title = "Specification and testing of the behavior of network
management agents using {SDL-92}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "4",
number = "6",
pages = "951--962",
month = dec,
year = "1996",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1996-4-6/p951-henniger/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Internet. {\bf C.2.2} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Protocols.",
}
@Article{Levine:1997:REC,
author = "David A. Levine and Ian F. Akyildiz and Mahmoud
Naghshineh",
title = "A resource estimation and call admission algorithm for
wireless multimedia networks using the shadow cluster
concept",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "1--12",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p1-levine/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; performance",
subject = "{\bf C.1.3} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Other Architecture Styles, Cellular
architecture. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology.",
}
@Article{I:1997:PMM,
author = "Chih-Lin I. and Gregory P. Pollini and Richard D.
Gitlin",
title = "{PCS} mobility management using the reverse virtual
call setup algorithm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "13--24",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p13-i/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Lin:1997:RLU,
author = "Yi-Bing Lin",
title = "Reducing location update cost in a {PCS} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "25--33",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p25-lin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Modeling techniques.",
}
@Article{Tcha:1997:NLB,
author = "Dong-wan Tcha and Yong-joo Chung and Taek-jin Choi",
title = "A new lower bound for the frequency assignment
problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "34--39",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p34-tcha/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network communications. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management, Message sending.",
}
@Article{Kalmanek:1997:XLE,
author = "Charles R. Kalmanek and Srinivasan Keshav and William
T. Marshall and Samuel P. Morgan and Robert C.
{Restrick III}",
title = "{Xunet 2}: lessons from an early wide-area {ATM}
testbed",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "40--55",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p40-kalmanek/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; management; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.1.3} Computer Systems Organization,
PROCESSOR ARCHITECTURES, Other Architecture Styles.",
}
@Article{Jamin:1997:MAC,
author = "Sugih Jamin and Peter B. Danzig and Scott J. Shenker
and Lixia Zhang",
title = "A measurement-based admission control algorithm for
integrated service packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "56--70",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p56-jamin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Measurement techniques. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design,
Packet-switching networks.",
}
@Article{Willinger:1997:STH,
author = "Walter Willinger and Murad S. Taqqu and Robert Sherman
and Daniel V. Wilson",
title = "Self-similarity through high-variability: statistical
analysis of {Ethernet LAN} traffic at the source
level",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "71--86",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p71-willinger/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Liew:1997:SSB,
author = "Soung C. Liew",
title = "On the stability of shuffle-exchange and bidirectional
shuffle-exchange deflection networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "87--94",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p87-liew/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.5}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Local and Wide-Area Networks. {\bf D.4.4}
Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Li:1997:CTM,
author = "San-qi Li and Chia-lin Hwang",
title = "On the convergence of traffic measurement and queueing
analysis: a statistical-matching and queueing {(SMAQ)}
tool",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "95--110",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p95-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf I.6.4}
Computing Methodologies, SIMULATION AND MODELING, Model
Validation and Analysis. {\bf G.2.2} Mathematics of
Computing, DISCRETE MATHEMATICS, Graph Theory, Network
problems.",
}
@Article{Ofek:1997:ISA,
author = "Yoram Ofek and Khosrow Sohraby and Ho-Ting Wu",
title = "Integration of synchronous and asynchronous traffic on
the {MetaRing} and its performance study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "111--121",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p111-ofek/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design.",
}
@Article{Matragi:1997:JCA,
author = "Wassim Matragi and Khosrow Sohraby and Chatschik
Bisdikian",
title = "Jitter calculus in {ATM} networks: multiple nodes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "122--133",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p122-matragi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; theory;
verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Access schemes. {\bf D.4.8}
Software, OPERATING SYSTEMS, Performance, Simulation.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM).",
}
@Article{Dziong:1997:FBM,
author = "Zbigniew Dziong and Marek Juda and Lorne G. Mason",
title = "A framework for bandwidth management in {ATM} networks
--- aggregate equivalent bandwidth estimation
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "134--147",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p134-dziong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf I.6.6} Computing
Methodologies, SIMULATION AND MODELING, Simulation
Output Analysis. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Asynchronous Transfer Mode
(ATM). {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications.",
}
@Article{Garcia-Luna-Aceves:1997:PAL,
author = "J. J. Garcia-Luna-Aceves and Shree Murthy",
title = "A path-finding algorithm for loop-free routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "148--160",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p148-garcia-luna-aceves/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; theory",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Path and circuit problems.",
}
@Article{Korilis:1997:ANO,
author = "Yannis A. Korilis and Aurel A. Lazar and Ariel Orda",
title = "Achieving network optima using {Stackelberg} routing
strategies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "1",
pages = "161--173",
month = feb,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-1/p161-korilis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; theory",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Routing and layout. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General.",
}
@Article{Todd:1997:MMM,
author = "Terence D. Todd and Ellen L. Hahne",
title = "Multi-access mesh (multimesh) networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "181--189",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p181-todd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance;
reliability; standardization",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.2.2} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Protocols. {\bf C.2.4} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems.",
}
@Article{Cidon:1997:IFA,
author = "Israel Cidon and Leonidas Georgiadis and Roch
Gu{\'e}rin and Yuval Shavitt",
title = "Improved fairness algorithms for rings with spatial
reuse",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "190--204",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p190-cidon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability; theory; verification",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Token rings. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Lam:1997:GPS,
author = "Simon S. Lam and Geoffrey G. Xie",
title = "Group priority scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "205--218",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p205-lam/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
theory; verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.5.3} Computer Systems Organization, COMPUTER
SYSTEM IMPLEMENTATION, Microcomputers. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems.",
}
@Article{Knightly:1997:DAT,
author = "Edward W. Knightly and Hui Zhang",
title = "{D-BIND}: an accurate traffic model for providing
{QoS} guarantees to {VBR} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "219--231",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p219-knightly/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability; theory;
verification",
subject = "{\bf H.5.1} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, Multimedia Information
Systems, Video (e.g., tape, disk, DVI). {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, ISDN
(Integrated Services Digital Network). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Figueira:1997:SCD,
author = "Norival R. Figueira and Joseph Pasquale",
title = "A schedulability condition for deadline-ordered
service disciplines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "232--244",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p232-figueira/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Spinelli:1997:SSW,
author = "John M. Spinelli",
title = "Self-stabilizing sliding window {ARQ} protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "245--254",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p245-spinelli/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Andersin:1997:SSA,
author = "Michael Andersin and Jens Zander and Zvi Rosberg",
title = "Soft and safe admission control in cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "255--265",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p255-andersin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.4} Mathematics of Computing, MATHEMATICAL
SOFTWARE, Algorithm design and analysis.",
}
@Article{Greenberg:1997:CTA,
author = "Albert G. Greenberg and R. Srikant",
title = "Computational techniques for accurate performance
evaluation of multirate, multihop communication
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "266--277",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p266-greenberg/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
reliability; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, ISDN
(Integrated Services Digital Network). {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Ohsaki:1997:PIB,
author = "Hiroyuki Ohsaki and Naoki Wakamiya and Masayuki Murata
and Hideo Miyahara",
title = "Performance of an input\slash output buffered-type
{ATM LAN} switch with back-pressure function",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "278--290",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p278-ohsaki/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf B.4.2} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
Devices.",
}
@Article{Bolla:1997:CMS,
author = "Raffaele Bolla and Franco Davoli",
title = "Control of multirate synchronous streams in hybrid
{TDM} access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "291--304",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p291-bolla/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf J.7} Computer
Applications, COMPUTERS IN OTHER SYSTEMS, Command and
control. {\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General.",
}
@Article{Cohen:1997:CRI,
author = "Joel E. Cohen and Clark Jeffries",
title = "Congestion resulting from increased capacity in
single-server queueing networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "305--310",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p305-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design.",
}
@Article{Willebeek-LeMair:1997:ADM,
author = "Marc Willebeek-LeMair and Perwez Shahabuddin",
title = "Approximating dependability measures of computer
networks: an {FDDI} case study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "2",
pages = "311--327",
month = apr,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-2/p311-willebeek-lemair/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.1.2} Mathematics of Computing,
NUMERICAL ANALYSIS, Approximation. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design.",
}
@Article{Sestini:1997:RCG,
author = "Fabrizio Sestini",
title = "Recursive copy generation for multicast {ATM}
switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "329--335",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p329-sestini/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.",
}
@Article{Lakshman:1997:PTN,
author = "T. V. Lakshman and Upamanyu Madhow",
title = "The performance of {TCP\slash IP} for networks with
high bandwidth-delay products and random loss",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "336--350",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p336-lakshman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability; standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Internet.",
}
@Article{Labourdette:1997:PIP,
author = "Jean-Fran{\c{c}}ois P. Labourdette",
title = "Performance impact of partial reconfiguration on
multihop lightwave networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "351--358",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p351-labourdette/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf B.4.1} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Data
Communications Devices.",
}
@Article{Rouskas:1997:PSB,
author = "George N. Rouskas and Vijay Sivaraman",
title = "Packet scheduling in broadcast {WDM} networks with
arbitrary transceiver tuning latencies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "359--370",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p359-rouskas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.
{\bf I.2.8} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Problem Solving, Control Methods, and
Search, Heuristic methods.",
}
@Article{Bellur:1997:SNA,
author = "Bhargav R. Bellur and Galen H. Sasaki",
title = "A {SAT}-based network access scheme for fairness in
high speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "371--381",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p371-bellur/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks, Token rings.",
}
@Article{Lau:1997:SMB,
author = "Wing-cheong Lau and San-qi Li",
title = "Statistical multiplexing and buffer sharing in
multimedia high-speed networks: a frequency-domain
perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "382--396",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p382-lau/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf H.5.1} Information Systems, INFORMATION INTERFACES
AND PRESENTATION, Multimedia Information Systems. {\bf
C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf F.1.2} Theory of Computation, COMPUTATION
BY ABSTRACT DEVICES, Modes of Computation,
Probabilistic computation.",
}
@Article{Tsybakov:1997:STA,
author = "Boris Tsybakov and Nicoals D. Georganas",
title = "On self-similar traffic in {ATM} queues: definitions,
overflow probability bound, and cell delay
distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "397--409",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p397-tsybakov/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, ISDN (Integrated Services
Digital Network). {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf F.1.2}
Theory of Computation, COMPUTATION BY ABSTRACT DEVICES,
Modes of Computation, Probabilistic computation.",
}
@Article{Sharon:1997:PLS,
author = "Oran Sharon",
title = "A proof for lack of starvation in {DQDB} with and
without slot reuse",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "410--420",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p410-sharon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Stamatelos:1997:RBA,
author = "George M. Stamatelos and Vassilios N. Koukoulidis",
title = "Reservation-based bandwidth allocation in a radio
{ATM} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "420--428",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p420-stamatelos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf H.5.1} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, Multimedia Information
Systems. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks.",
}
@Article{Li:1997:LLF,
author = "San-qi Li and James D. Pruneski",
title = "The linearity of low frequency traffic flow: an
intrinsic {I/O} property in queueing systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "3",
pages = "429--443",
month = jun,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-3/p429-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf G.m} Mathematics of Computing, MISCELLANEOUS,
Queueing theory**. {\bf C.2.4} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems. {\bf C.2.0} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
General.",
}
@Article{Krupczak:1997:IPR,
author = "Bobby Krupczak and Kenneth L. Calvert and Mostafa H.
Ammar",
title = "Increasing the portability and re-usability of
protocol code",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "445--459",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p445-krupczak/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.3.4} Software, PROGRAMMING LANGUAGES,
Processors, Optimization. {\bf G.1.6} Mathematics of
Computing, NUMERICAL ANALYSIS, Optimization.",
}
@Article{Wallach:1997:AAH,
author = "Deborah A. Wallach and Dawson R. Engler and M. Frans
Kaashoek",
title = "{ASHs}: application-specific handlers for
high-performance messaging",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "460--474",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p460-wallach/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols.",
}
@Article{Yau:1997:ARS,
author = "David K. Y. Yau and Simon S. Lam",
title = "Adaptive rate-controlled scheduling for multimedia
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "475--488",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p475-yau/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; theory",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
Network operating systems. {\bf D.4.4} Software,
OPERATING SYSTEMS, Communications Management. {\bf C.3}
Computer Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS.",
}
@Article{LaPorta:1997:DSS,
author = "Thomas F. {La Porta} and Kuo-Wei Herman Chen",
title = "A direct signaling system for flexible access and
deployment of telecommunication services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "489--501",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p489-la_porta/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS. {\bf
C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Tantiprasut:1997:APS,
author = "Duke Tantiprasut and John Neil and Craig Farrell",
title = "{ASN.1} protocol specification for use with arbitrary
encoding schemes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "502--513",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p502-tantiprasut/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; languages; standardization; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
Protocol verification. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.",
}
@Article{Castelluccia:1997:GEP,
author = "Claude Castelluccia and Walid Dabbous and Sean
O'Malley",
title = "Generating efficient protocol code from an abstract
specification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "514--524",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p514-castelluccia/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.3.4} Software, PROGRAMMING LANGUAGES,
Processors.",
}
@Article{Olah:1997:ASV,
author = "Andr{\'a}s L. Ol{\'a}h and Sonia M. Heemstra de
Groot",
title = "Alternative specification and verification of a
periodic state exchange protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "525--529",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p525-olah/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Yener:1997:IAO,
author = "B{\"u}lent Yener and Spyridon Matsoukas and Yoram
Ofek",
title = "Iterative approach to optimizing convergence routing
priorities",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "530--542",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p530-yener/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; theory",
subject = "{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems. {\bf D.3.4} Software,
PROGRAMMING LANGUAGES, Processors, Optimization. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Landry:1997:SDJ,
author = "Randall Landry and Ioannis Stavrakakis",
title = "Study of delay jitter with and without peak rate
enforcement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "543--553",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p543-landry/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Heyman:1997:GSM,
author = "Daniel P. Heyman",
title = "The {GBAR} source model for {VBR} videoconferences",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "554--560",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p554-heyman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; documentation; experimentation; measurement",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management.",
}
@Article{Goyal:1997:GGR,
author = "Pawan Goyal and Harrick M. Vin",
title = "Generalized guaranteed rate scheduling algorithms: a
framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "561--571",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p561-goyal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Reliability,
availability, and serviceability.",
}
@Article{Bensaou:1997:ECL,
author = "Brahim Bensaou and Shirley T. C. Lam and Hon-Wai Chu
and Danny H. K. Tsang",
title = "Estimation of the cell loss ratio in {ATM} networks
with a fuzzy system and application to
measurement-based call admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "572--584",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p572-bensaou/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; documentation; measurement",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Naik:1997:ECU,
author = "Kshirasagar Naik",
title = "Efficient computation of unique input\slash output
sequences in finite-state machines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "585--599",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p585-naik/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; documentation; experimentation;
measurement",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf F.1.1} Theory of Computation, COMPUTATION BY
ABSTRACT DEVICES, Models of Computation.",
}
@Article{Doeringer:1997:CRL,
author = "Willibald Doeringer and G{\"u}nter Karjoth and Mehdi
Nassehi",
title = "Corrections to {``Routing on longest-matching
prefixes''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "4",
pages = "600--600",
month = aug,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Doeringer:1996:RLP}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-4/p600-doeringer/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paxson:1997:ERB,
author = "Vern Paxson",
title = "End-to-end routing behavior in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "601--615",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p601-paxson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "documentation; experimentation; management;
measurement; performance; reliability",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Reliability, availability, and
serviceability. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Internet. {\bf F.2.2} Theory
of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations, Network monitoring.",
}
@Article{Heidemann:1997:MPH,
author = "John Heidemann and Katia Obraczka and Joe Touch",
title = "Modeling the performance of {HTTP} over several
transport protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "616--630",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p616-heidemann/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf I.6.0} Computing Methodologies, SIMULATION AND
MODELING, General. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Arlitt:1997:IWS,
author = "Martin F. Arlitt and Carey L. Williamson",
title = "{Internet Web} servers: workload characterization and
performance implications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "631--645",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p631-arlitt/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; management; measurement;
performance",
subject = "{\bf H.2.4} Information Systems, DATABASE MANAGEMENT,
Systems. {\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.2.4} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS,
Distributed Systems.",
}
@Article{Ho:1997:DHD,
author = "Joseph S. M. Ho and Ian F. Akyildiz",
title = "Dynamic hierarchical database architecture for
location management in {PCS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "646--660",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p646-ho/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; performance; theory",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems,
Distributed databases. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology. {\bf C.1.0}
Computer Systems Organization, PROCESSOR ARCHITECTURES,
General.",
}
@Article{Cobb:1997:FT,
author = "Jorge A. Cobb and Mohamed G. Gouda",
title = "Flow theory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "661--674",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p661-cobb/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; reliability; theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Network problems.",
}
@Article{Bennett:1997:HPF,
author = "Jon C. R. Bennett and Hui Zhang",
title = "Hierarchical packet fair queueing algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "675--689",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p675-bennett/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; management",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Goyal:1997:SFQ,
author = "Pawan Goyal and Harrick M. Vin and Haichen Cheng",
title = "Start-time fair queueing: a scheduling algorithm for
integrated services packet switching networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "690--704",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p690-goyal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf G.m}
Mathematics of Computing, MISCELLANEOUS, Queueing
theory**. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.",
}
@Article{Varvarigos:1997:RVC,
author = "Emmanouel A. Varvarigos and Vishal Sharma",
title = "The ready-to-go virtual circuit protocol: a loss-free
protocol for multigigabit networks using {FIFO}
buffers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "705--718",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p705-varvarigos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Tridandapani:1997:CSM,
author = "Srini B. Tridandapani and Biswanath Mukherjee and Geir
Hallingstad",
title = "Channel sharing in multi-hop {WDM} lightwave networks:
do we need more channels?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "719--727",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p719-tridandapani/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf I.6.4}
Computing Methodologies, SIMULATION AND MODELING, Model
Validation and Analysis. {\bf D.4.8} Software,
OPERATING SYSTEMS, Performance.",
}
@Article{Choudhury:1997:NBM,
author = "Abhijit K. Choudhury and Ellen L. Hahne",
title = "A new buffer management scheme for hierarchical shared
memory switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "5",
pages = "728--738",
month = oct,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-5/p728-choudhury/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf I.6.0} Computing
Methodologies, SIMULATION AND MODELING, General.",
}
@Article{Grossglauser:1997:RSE,
author = "Matthias Grossglauser and Srinivasan Keshav and David
N. C. Tse",
title = "{RCBR}: a simple and efficient service for multiple
time-scale traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "741--755",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p741-grossglauser/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; management; measurement",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf I.6.4} Computing Methodologies,
SIMULATION AND MODELING, Model Validation and Analysis.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Design studies.",
}
@Article{Balakrishnan:1997:CMI,
author = "Hari Balakrishnan and Venkata N. Padmanabhan and
Srinivasan Seshan and Randy H. Katz",
title = "A comparison of mechanisms for improving {TCP}
performance over wireless links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "756--769",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p756-balakrishnan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Wireless communication. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf D.4.8} Software,
OPERATING SYSTEMS, Performance, Modeling and
prediction. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Design studies.",
}
@Article{Zegura:1997:QCG,
author = "Ellen W. Zegura and Kenneth L. Calvert and Michael J.
Donahoo",
title = "A quantitative comparison of graph-based models for
{Internet} topology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "770--783",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p770-zegura/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory. {\bf I.6.0} Computing
Methodologies, SIMULATION AND MODELING, General. {\bf
D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Floyd:1997:RMF,
author = "Sally Floyd and Van Jacobson and Ching-Gung Liu and
Steven McCanne and Lixia Zhang",
title = "A reliable multicast framework for light-weight
sessions and application level framing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "784--803",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p784-floyd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; reliability; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Design studies. {\bf I.6.0}
Computing Methodologies, SIMULATION AND MODELING,
General.",
}
@Article{Chlamtac:1997:TMT,
author = "Imrich Chlamtac and Andr{\'a}s Farag{\'o} and Hongbiao
Zhang",
title = "Time-spread multiple-access {(TSMA)} protocols for
multihop mobile radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "804--812",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p804-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf D.4.0} Software, OPERATING SYSTEMS, General. {\bf
D.3.4} Software, PROGRAMMING LANGUAGES, Processors,
Optimization.",
}
@Article{Weller:1997:SNT,
author = "Timothy Weller and Bruce Hajek",
title = "Scheduling nonuniform traffic in a packet-switching
system with small propagation delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "813--823",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p813-weller/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf F.2.1} Theory
of Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Numerical Algorithms and Problems,
Computations on matrices.",
}
@Article{Varghese:1997:HHT,
author = "George Varghese and Anthony Lauck",
title = "Hashed and hierarchical timing wheels: efficient data
structures for implementing a timer facility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "824--834",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p824-varghese/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability",
subject = "{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Crovella:1997:SWW,
author = "Mark E. Crovella and Azer Bestavros",
title = "Self-similarity in {World Wide Web} traffic: evidence
and possible causes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "835--846",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p835-crovella/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; management; measurement",
subject = "{\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations.",
}
@Article{Herzog:1997:SCM,
author = "Shai Herzog and Scott Shenker and Deborah Estrin",
title = "Sharing the ``cost'' of multicast trees: an axiomatic
analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "847--860",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p847-herzog/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; economics; management; performance;
theory",
subject = "{\bf C.2.6} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Internetworking. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations. {\bf K.6.0} Computing
Milieux, MANAGEMENT OF COMPUTING AND INFORMATION
SYSTEMS, General, Economics.",
}
@Article{Lazar:1997:VPB,
author = "Aurel A. Lazar and Ariel Orda and Dimitrios E.
Pendarakis",
title = "Virtual path bandwidth allocation in multiuser
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "861--871",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p861-lazar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "management; measurement",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf H.2.4} Information Systems, DATABASE MANAGEMENT,
Systems. {\bf D.4.1} Software, OPERATING SYSTEMS,
Process Management.",
}
@Article{Limb:1997:PET,
author = "John O. Limb and Dolors Sala",
title = "A protocol for efficient transfer of data over hybrid
fiber\slash coax systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "872--881",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p872-limb/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Bianchi:1997:RLS,
author = "Giuseppe Bianchi and Riccardo Melen",
title = "The role of local storage in supporting video
retrieval services on {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "882--892",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p882-bianchi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
I.6.7} Computing Methodologies, SIMULATION AND
MODELING, Simulation Support Systems. {\bf D.4.2}
Software, OPERATING SYSTEMS, Storage Management.",
}
@Article{Fang:1997:MPN,
author = "Yuguang Fang and Imrich Chlamtac and Yi-Bing Lin",
title = "Modeling {PCS} networks under general call holding
time and cell residence time distributions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "893--906",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p893-fang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf I.6.4} Computing Methodologies,
SIMULATION AND MODELING, Model Validation and Analysis.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management.",
}
@Article{Bhattacharya:1997:DCA,
author = "Partha P. Bhattacharya and Leonidas Georgiadis and
Arvind Krishna",
title = "Distributed channel allocation for {PCN} with variable
rate traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "907--923",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p907-bhattacharya/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Wireless communication. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.2.3} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Operations.",
}
@Article{Murali:1997:RAL,
author = "Ramaswamy Murali and Brian L. Hughes",
title = "Random access with large propagation delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "924--935",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p924-murali/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; management; measurement",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf D.4.0} Software, OPERATING SYSTEMS,
General.",
}
@Article{Ramaswami:1997:DNC,
author = "Rajiv Ramaswami and Adrian Segall",
title = "Distributed network control for optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "936--943",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p936-ramaswami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; reliability",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols, Routing protocols. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Distributed networks.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Medhi:1997:NDP,
author = "D. Medhi and Sujit Guptan",
title = "Network dimensioning and performance of multiservice,
multirate loss networks with dynamic routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "944--957",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p944-medhi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "documentation; management; performance",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf D.4.4} Software, OPERATING SYSTEMS, Communications
Management. {\bf I.6.7} Computing Methodologies,
SIMULATION AND MODELING, Simulation Support Systems.
{\bf D.4.1} Software, OPERATING SYSTEMS, Process
Management.",
}
@Article{Lombardo:1997:APC,
author = "Alfio Lombardo and Giovanni Schembra",
title = "An analytical paradigm to compare routing strategies
in an {ATM} multimedia environment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "958--969",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p958-lombardo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations.
{\bf I.6.4} Computing Methodologies, SIMULATION AND
MODELING, Model Validation and Analysis. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Izmailov:1997:DAC,
author = "Rauf Izmailov and Duan-Shin Lee and Bhaskar Sengupta",
title = "Design and analysis of a congestion-free overlay on a
high-speed network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "970--980",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p970-izmailov/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; reliability; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf D.4.4} Software, OPERATING SYSTEMS,
Communications Management. {\bf I.6.4} Computing
Methodologies, SIMULATION AND MODELING, Model
Validation and Analysis.",
}
@Article{MacGregor:1997:DPR,
author = "M. H. MacGregor and Wayne D. Grover",
title = "Distributed partial-express routing of broad-band
transport network demands",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "981--988",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p981-macgregor/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf I.6.0} Computing Methodologies, SIMULATION AND
MODELING, General.",
}
@Article{Yener:1997:CDC,
author = "B{\"u}lent Yener and Yoram Ofek and Moti Yung",
title = "Combinatorial design of congestion-free networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "5",
number = "6",
pages = "989--1000",
month = dec,
year = "1997",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1997-5-6/p989-yener/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf I.6.4} Computing Methodologies,
SIMULATION AND MODELING, Model Validation and
Analysis.",
}
@Article{Thaler:1998:UNM,
author = "David G. Thaler and Chinya V. Ravishankar",
title = "Using name-based mappings to increase hit rates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "1--14",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p1-thaler/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf B.3.2} Hardware, MEMORY STRUCTURES, Design
Styles, Cache memories. {\bf C.5.5} Computer Systems
Organization, COMPUTER SYSTEM IMPLEMENTATION, Servers.
{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Internet. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.",
}
@Article{Cohen:1998:THP,
author = "Reuven Cohen and Srinivas Ramanathan",
title = "{TCP} for high performance in hybrid fiber coaxial
broad-band access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "15--29",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p15-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Internet. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Xie:1998:RBT,
author = "Geoffrey G. Xie and Simon S. Lam",
title = "Real-time block transfer under a link-sharing
hierarchy",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "30--41",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p30-xie/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Liew:1998:CAA,
author = "Soung C. Liew and Derek Chi-yin Tse",
title = "A control-theoretic approach to adapting {VBR}
compressed video for transport over a {CBR}
communications channel",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "42--55",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p42-liew/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
reliability; theory",
subject = "{\bf G.0} Mathematics of Computing, GENERAL. {\bf
C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General, Data
communications. {\bf H.5.1} Information Systems,
INFORMATION INTERFACES AND PRESENTATION, Multimedia
Information Systems, Video (e.g., tape, disk, DVI).
{\bf E.4} Data, CODING AND INFORMATION THEORY, Data
compaction and compression. {\bf B.4.2} Hardware,
INPUT/OUTPUT AND DATA COMMUNICATIONS, Input/Output
Devices, Channels and controllers. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS.",
}
@Article{Dixit:1998:TDM,
author = "Sudhir S. Dixit and Sharad Kumar",
title = "Traffic descriptor mapping and traffic control for
frame relay over {ATM} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "56--70",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p56-dixit/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement;
performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Northcote:1998:SCP,
author = "Bruce S. Northcote and Donald E. Smith",
title = "Service control point overload rules to protect
intelligent network services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "71--81",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p71-northcote/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf I.2.1}
Computing Methodologies, ARTIFICIAL INTELLIGENCE,
Applications and Expert Systems. {\bf G.4} Mathematics
of Computing, MATHEMATICAL SOFTWARE, Algorithm design
and analysis. {\bf I.6.3} Computing Methodologies,
SIMULATION AND MODELING, Applications.",
}
@Article{Girard:1998:MFM,
author = "Andre Girard and Brunilde Sans{\'o}",
title = "Multicommodity flow models, failure propagation, and
reliable loss network design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "82--93",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p82-girard/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
reliability; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis.",
}
@Article{Ravindran:1998:CAM,
author = "K. Ravindran and Ting-Jian Gong",
title = "Cost analysis of multicast transport architectures in
multiservice networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "1",
pages = "94--109",
month = feb,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-1/p94-ravindran/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement;
performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf K.6.0} Computing Milieux,
MANAGEMENT OF COMPUTING AND INFORMATION SYSTEMS,
General, Economics. {\bf C.2.3} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Operations.",
}
@Article{Newman:1998:ISU,
author = "Peter Newman and Greg Minshall and Thomas L. Lyon",
title = "{IP} switching --- {ATM} under {IP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "117--129",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p117-newman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols, IP.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks.",
}
@Article{Choudhury:1998:DQL,
author = "Abhijit K. Choudhury and Ellen L. Hahne",
title = "Dynamic queue length thresholds for shared-memory
packet switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "130--140",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p130-choudhury/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Asynchronous
Transfer Mode (ATM). {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Performance
attributes.",
}
@Article{Privalov:1998:PJA,
author = "Aleksandr Privalov and Khosrow Sohraby",
title = "Per-stream jitter analysis in {CBR ATM} multiplexors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "141--149",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p141-privalov/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; standardization",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital Network).
{\bf G.3} Mathematics of Computing, PROBABILITY AND
STATISTICS, Probabilistic algorithms (including Monte
Carlo).",
}
@Article{Fulton:1998:DJF,
author = "Cathy A. Fulton and San-qi Li",
title = "Delay jitter first-order and second-order statistical
functions of general traffic on high-speed multimedia
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "150--163",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p150-fulton/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf G.1.2}
Mathematics of Computing, NUMERICAL ANALYSIS,
Approximation. {\bf I.6.8} Computing Methodologies,
SIMULATION AND MODELING, Types of Simulation, Discrete
event. {\bf G.1.3} Mathematics of Computing, NUMERICAL
ANALYSIS, Numerical Linear Algebra, Eigenvalues and
eigenvectors (direct and iterative methods). {\bf
F.2.1} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Numerical Algorithms and
Problems, Computation of transforms.",
}
@Article{Stiliadis:1998:RSD,
author = "Dimitrios Stiliadis and Anujan Varma",
title = "Rate-proportional servers: a design methodology for
fair queueing algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "164--174",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p164-stiliadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling.",
}
@Article{Stiliadis:1998:EFQ,
author = "Dimitrios Stiliadis and Anujan Varma",
title = "Efficient fair queueing algorithms for packet-switched
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "175--185",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p175-stiliadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling.",
}
@Article{Karasan:1998:EWR,
author = "Ezhan Karasan and Ender Ayanoglu",
title = "Effects of wavelength routing and selection algorithms
on wavelength conversion gain in {WDM} optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "186--196",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p186-karasan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Circuit-switching networks. {\bf G.2.2}
Mathematics of Computing, DISCRETE MATHEMATICS, Graph
Theory, Network problems. {\bf G.3} Mathematics of
Computing, PROBABILITY AND STATISTICS, Probabilistic
algorithms (including Monte Carlo). {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols, Routing protocols.",
}
@Article{Mokhtar:1998:AWR,
author = "Ahmed Mokhtar and Murat Azizo{\u{g}}lu",
title = "Adaptive wavelength routing in all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "197--206",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p197-mokhtar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance",
subject = "{\bf C.2.6} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Internetworking,
Routers. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology. {\bf G.2.2} Mathematics
of Computing, DISCRETE MATHEMATICS, Graph Theory,
Network problems.",
}
@Article{Murakami:1998:OCF,
author = "Kazutaka Murakami and Hyong S. Kim",
title = "Optimal capacity and flow assignment for self-healing
{ATM} networks based on line and end-to-end
restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "207--221",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p207-murakami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Reliability, availability, and serviceability. {\bf
G.2.2} Mathematics of Computing, DISCRETE MATHEMATICS,
Graph Theory, Network problems. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout.",
}
@Article{Anerousis:1998:VPC,
author = "Nikolaos Anerousis and Aurel A. Lazar",
title = "Virtual path control for {ATM} networks with call
level quality of service guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "2",
pages = "222--236",
month = apr,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-2/p222-anerousis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; performance;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf G.2.2} Mathematics
of Computing, DISCRETE MATHEMATICS, Graph Theory,
Network problems. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Network topology.",
}
@Article{Partridge:1998:IR,
author = "Craig Partridge and Philip P. Carvey and Ed Burgess
and Isidro Castineyra and Tom Clarke and Lise Graham
and Michael Hathaway and Phil Herman and Allen King and
Steve Kohalmi and Tracy Ma and John Mcallen and Trevor
Mendez and Walter C. Milliken and Ronald Pettyjohn and
John Rokosz and Joshua Seeger and Michael Sollins and
Steve Storch and Benjamin Tober and Gregory D. Troxel",
title = "A {50-Gb/s IP} router",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "237--248",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p237-partridge/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory",
subject = "{\bf C.2.6} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Internetworking,
Routers. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf C.2.5} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Local and Wide-Area Networks, Internet.",
}
@Article{Ramjee:1998:PEC,
author = "Ramachandran Ramjee and Thomas F. {La Porta} and Jim
Kurose and Don Towsley",
title = "Performance evaluation of connection rerouting schemes
for {ATM}-based wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "249--261",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p249-ramjee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; management;
measurement; performance",
subject = "{\bf C.2.3} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Operations,
Network management. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Asynchronous Transfer Mode
(ATM). {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Wireless communication. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Design
studies.",
}
@Article{Bjorkman:1998:PMM,
author = "Mats Bj{\"o}rkman and Per Gunningberg",
title = "Performance modeling of multiprocessor implementations
of protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "262--273",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p262-bjorkman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "measurement; performance",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.",
}
@Article{Cobb:1998:TSS,
author = "Jorge A. Cobb and Mohamed G. Gouda and Amal El-Nahas",
title = "Time-shift scheduling --- fair scheduling of flows in
high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "274--285",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p274-cobb/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability; standardization;
theory; verification",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems. {\bf C.2.1} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Architecture and Design, Packet-switching
networks.",
}
@Article{Aharoni:1998:RDS,
author = "Ehud Aharoni and Reuven Cohen",
title = "Restricted dynamic {Steiner} trees for scalable
multicast in datagram networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "286--297",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p286-aharoni/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory; verification",
subject = "{\bf G.2.2} Mathematics of Computing, DISCRETE
MATHEMATICS, Graph Theory, Trees. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis. {\bf C.2.2} Computer
Systems Organization, COMPUTER-COMMUNICATION NETWORKS,
Network Protocols.",
}
@Article{Ju:1998:OTS,
author = "Ji-Her Ju and Victor O. K. Li",
title = "An optimal topology-transparent scheduling method in
multihop packet radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "298--306",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p298-ju/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.",
}
@Article{Liew:1998:BNM,
author = "Soung C. Liew and Ming-Hung Ng and Cathy W. Chan",
title = "Blocking and nonblocking multirate {Clos} switching
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "307--318",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p307-liew/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; measurement; performance;
theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf I.2.8} Computing
Methodologies, ARTIFICIAL INTELLIGENCE, Problem
Solving, Control Methods, and Search, Heuristic
methods. {\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General.",
}
@Article{Yeung:1998:NPO,
author = "Kwan Lawrence Yeung and Tak-Shing Peter Yum",
title = "Node placement optimization in {ShuffleNets}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "319--324",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p319-yeung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf G.4} Mathematics of Computing, MATHEMATICAL
SOFTWARE, Algorithm design and analysis. {\bf G.1.6}
Mathematics of Computing, NUMERICAL ANALYSIS,
Optimization. {\bf G.2.0} Mathematics of Computing,
DISCRETE MATHEMATICS, General. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network topology.",
}
@Article{Iraschko:1998:OCP,
author = "Rainer R. Iraschko and M. H. MacGregor and Wayne D.
Grover",
title = "Optimal capacity placement for path restoration in
{STM} or {ATM} mesh-survivable networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "325--336",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p325-iraschko/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; standardization;
theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols.",
}
@Article{Neelakantan:1998:SFM,
author = "B. Neelakantan and S. V. Raghavan",
title = "Scientific foundations to the multilevel method",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "3",
pages = "337--346",
month = jun,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-3/p337-neelakantan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf F.1.1} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Models of Computation,
Automata. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf I.2.8} Computing Methodologies, ARTIFICIAL
INTELLIGENCE, Problem Solving, Control Methods, and
Search, Heuristic methods. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols, Protocol verification.",
}
@Article{Nonnenmacher:1998:PLR,
author = "J{\"o}rg Nonnenmacher and Ernst W. Biersack and Don
Towsley",
title = "Parity-based loss recovery for reliable multicast
transmission",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "349--361",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p349-nonnenmacher/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; reliability;
standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf E.4} Data, CODING AND INFORMATION
THEORY, Error control codes.",
}
@Article{Clark:1998:EAB,
author = "David D. Clark and Wenjia Fang",
title = "Explicit allocation of best-effort packet delivery
service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "362--373",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p362-clark/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.4} Mathematics of Computing, MATHEMATICAL
SOFTWARE, Algorithm design and analysis.",
}
@Article{Gopalakrishnan:1998:EUP,
author = "R. Gopalakrishnan and Gurudatta M. Parulkar",
title = "Efficient user-space protocol implementations with
{QoS} guarantees using real-time upcalls",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "374--388",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p374-gopalakrishnan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; management; measurement; performance;
reliability; standardization; theory",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf F.2.2} Theory of Computation, ANALYSIS OF
ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.
{\bf D.4.0} Software, OPERATING SYSTEMS, General. {\bf
H.5.1} Information Systems, INFORMATION INTERFACES AND
PRESENTATION, Multimedia Information Systems. {\bf C.3}
Computer Systems Organization, SPECIAL-PURPOSE AND
APPLICATION-BASED SYSTEMS, Real-time and embedded
systems.",
}
@Article{Hoschka:1998:CEP,
author = "Philipp Hoschka",
title = "Compact and efficient presentation conversion code",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "389--396",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p389-hoschka/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; experimentation; languages; measurement;
performance; theory",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS. {\bf D.3.4} Software, PROGRAMMING LANGUAGES,
Processors, Compilers. {\bf G.3} Mathematics of
Computing, PROBABILITY AND STATISTICS, Markov
processes. {\bf K.6.2} Computing Milieux, MANAGEMENT OF
COMPUTING AND INFORMATION SYSTEMS, Installation
Management, Benchmarks.",
}
@Article{Salehi:1998:SSV,
author = "James D. Salehi and Shi-Li Zhang and Jim Kurose and
Don Towsley",
title = "Supporting stored video: reducing rate variability and
end-to-end resource requirements through optimal
smoothing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "397--410",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p397-salehi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement;
performance; theory; verification",
subject = "{\bf H.5.1} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, Multimedia Information
Systems, Video (e.g., tape, disk, DVI). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf D.4.0} Software, OPERATING SYSTEMS, General. {\bf
C.5.5} Computer Systems Organization, COMPUTER SYSTEM
IMPLEMENTATION, Servers. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis.",
}
@Article{Shroff:1998:ILC,
author = "Ness B. Shroff and Mischa Schwartz",
title = "Improved loss calculations at an {ATM} multiplexer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "411--421",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p411-shroff/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf G.3}
Mathematics of Computing, PROBABILITY AND STATISTICS,
Markov processes. {\bf G.3} Mathematics of Computing,
PROBABILITY AND STATISTICS, Queueing theory. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF
SYSTEMS.",
}
@Article{Chlamtac:1998:DAE,
author = "Imrich Chlamtac and Hongbiao Zhang and Andr{\'a}s
Farag{\'o} and Andrea Fumagalli",
title = "A deterministic approach to the end-to-end analysis of
packet flows in connection-oriented networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "422--431",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 18:05:33 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p422-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; measurement; performance; theory;
verification",
subject = "{\bf C.1.3} Computer Systems Organization, PROCESSOR
ARCHITECTURES, Other Architecture Styles, Neural nets.
{\bf G.3} Mathematics of Computing, PROBABILITY AND
STATISTICS, Queueing theory. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design,
Packet-switching networks. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Asynchronous Transfer Mode
(ATM).",
xxnote = "See comments \cite{Boudec:2000:CQD}.",
}
@Article{Gerstel:1998:ESC,
author = "Ornan Ori Gerstel and Israel Cidon and Shmuel Zaks",
title = "Efficient support for client\slash server applications
over heterogeneous {ATM} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "432--446",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p432-gerstel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
F.2.2} Theory of Computation, ANALYSIS OF ALGORITHMS
AND PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Routing and layout. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS. {\bf G.4}
Mathematics of Computing, MATHEMATICAL SOFTWARE,
Algorithm design and analysis.",
}
@Article{Berger:1998:EBP,
author = "Arthur W. Berger and Ward Whitt",
title = "Effective bandwidths with priorities",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "447--460",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p447-berger/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.3} Mathematics of Computing, PROBABILITY AND
STATISTICS, Queueing theory. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis.",
}
@Article{Parsa:1998:IAD,
author = "Mehrdad Parsa and Qing Zhu and J. J.
Garcia-Luna-Aceves",
title = "An iterative algorithm for delay-constrained
minimum-cost multicasting",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "461--474",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p461-parsa/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; management; measurement;
performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis. {\bf H.5.1} Information Systems, INFORMATION
INTERFACES AND PRESENTATION, Multimedia Information
Systems. {\bf I.2.8} Computing Methodologies,
ARTIFICIAL INTELLIGENCE, Problem Solving, Control
Methods, and Search, Heuristic methods.",
}
@Article{Huang:1998:SIC,
author = "Nen-Fu Huang and Huey-Ing Liu",
title = "A study of isochronous channel reuse in {DQDB}
metropolitan area networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "475--484",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p475-huang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; experimentation; measurement;
performance; theory",
subject = "{\bf G.1.2} Mathematics of Computing, NUMERICAL
ANALYSIS, Approximation. {\bf G.4} Mathematics of
Computing, MATHEMATICAL SOFTWARE, Algorithm design and
analysis. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf F.1.3} Theory of Computation,
COMPUTATION BY ABSTRACT DEVICES, Complexity Measures
and Classes, Reducibility and completeness. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.2.0} Mathematics of Computing, DISCRETE
MATHEMATICS, General.",
}
@Article{Kumar:1998:CPA,
author = "Anurag Kumar",
title = "Comparative performance analysis of versions of {TCP}
in a local network with a lossy link",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "485--498",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p485-kumar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance;
standardization; theory",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.
{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, Internet.",
}
@Article{Lee:1998:CDT,
author = "Tsern-Huei Lee and Kuen-Chu Lai",
title = "Characterization of delay-sensitive traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "4",
pages = "499--504",
month = aug,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-4/p499-lee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; measurement; performance; theory;
verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS. {\bf G.4} Mathematics of Computing,
MATHEMATICAL SOFTWARE, Algorithm design and analysis.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, ISDN (Integrated Services Digital
Network).",
}
@Article{Mills:1998:AHC,
author = "David L. Mills",
title = "Adaptive hybrid clock discipline algorithm for the
network time protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "505--514",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p505-mills/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance; reliability;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Internet. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes.",
}
@Article{Labovitz:1998:IRI,
author = "Craig Labovitz and G. Robert Malan and Farnam
Jahanian",
title = "{Internet} routing instability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "515--528",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p515-labovitz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Internet. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Routing and layout. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Network communications. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS,
Performance attributes.",
}
@Article{Stone:1998:PCC,
author = "Jonathan Stone and Michael Greenwald and Craig
Partridge and James Hughes",
title = "Performance of checksums and {CRC}'s over real data",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "529--543",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p529-stone/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement; performance;
theory; verification",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Reliability, availability, and
serviceability. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design, Packet-switching networks.
{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP.",
}
@Article{Che:1998:ARM,
author = "Hao Che and San-qi Li and Arthur Lin",
title = "Adaptive resource management for flow-based {IP\slash
ATM} hybrid switching systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "544--557",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p544-che/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Asynchronous
Transfer Mode (ATM). {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols, IP. {\bf I.2.6} Computing Methodologies,
ARTIFICIAL INTELLIGENCE, Learning. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{Firoiu:1998:EAC,
author = "Victor Firoiu and Jim Kurose and Don Towsley",
title = "Efficient admission control of piecewise linear
traffic envelopes at {EDF} schedulers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "558--570",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p558-firoiu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; verification",
subject = "{\bf C.2.0} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, General. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS.
{\bf G.4} Mathematics of Computing, MATHEMATICAL
SOFTWARE, Algorithm design and analysis. {\bf C.2.3}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Operations.",
}
@Article{Mishra:1998:EFC,
author = "Shivakant Mishra and Lei Wu",
title = "An evaluation of flow control in group communication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "571--587",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p571-mishra/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "{\bf C.2.4} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Distributed Systems.
{\bf I.6.8} Computing Methodologies, SIMULATION AND
MODELING, Types of Simulation, Discrete event. {\bf
C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols.
{\bf C.4} Computer Systems Organization, PERFORMANCE OF
SYSTEMS, Performance attributes. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS,
Reliability, availability, and serviceability.",
}
@Article{Hajek:1998:VQR,
author = "Bruce Hajek and Linhai He",
title = "On variations of queue response for inputs with the
same mean and autocorrelation function",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "588--598",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p588-hajek/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance; theory",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Performance attributes. {\bf
G.3} Mathematics of Computing, PROBABILITY AND
STATISTICS, Queueing theory. {\bf I.6.8} Computing
Methodologies, SIMULATION AND MODELING, Types of
Simulation, Discrete event.",
}
@Article{Kalampoukas:1998:ASP,
author = "Lampros Kalampoukas and Anujan Varma",
title = "Analysis of source policy and its effects on {TCP} in
rate-controlled {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "599--610",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p599-kalampoukas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf
C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf F.2.2} Theory of
Computation, ANALYSIS OF ALGORITHMS AND PROBLEM
COMPLEXITY, Nonnumerical Algorithms and Problems,
Sequencing and scheduling. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Performance
attributes.",
}
@Article{Stiliadis:1998:LSG,
author = "Dimitrios Stiliadis and Anujan Varma",
title = "Latency-rate servers: a general model for analysis of
traffic scheduling algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "611--624",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p611-stiliadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; theory; verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf F.2.2}
Theory of Computation, ANALYSIS OF ALGORITHMS AND
PROBLEM COMPLEXITY, Nonnumerical Algorithms and
Problems, Sequencing and scheduling. {\bf C.4} Computer
Systems Organization, PERFORMANCE OF SYSTEMS, Modeling
techniques.",
}
@Article{Shiomoto:1998:SBM,
author = "Kohei Shiomoto and Shinichiro Chaki and Naoaki
Yamanaka",
title = "A simple bandwidth management strategy based on
measurements of instantaneous virtual path utilization
in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "625--634",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p625-shiomoto/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; measurement; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM). {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Measurement techniques.",
}
@Article{Adas:1998:UAL,
author = "Abdelnaser Mohammad Adas",
title = "Using adaptive linear prediction to support real-time
{VBR} video under {RCBR} network service model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "635--644",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p635-adas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.1}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Architecture and Design, Asynchronous
Transfer Mode (ATM). {\bf F.2.2} Theory of Computation,
ANALYSIS OF ALGORITHMS AND PROBLEM COMPLEXITY,
Nonnumerical Algorithms and Problems, Sequencing and
scheduling. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Reliability, availability, and
serviceability.",
}
@Article{Kim:1998:DSG,
author = "Peter Kim",
title = "Deterministic service guarantees in {IEEE 802.12}
networks --- part {I}: the single-hub case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "645--658",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p645-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; experimentation; measurement; performance;
standardization; theory; verification",
subject = "{\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.2}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Network Protocols. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS, Performance
attributes. {\bf F.2.2} Theory of Computation, ANALYSIS
OF ALGORITHMS AND PROBLEM COMPLEXITY, Nonnumerical
Algorithms and Problems, Sequencing and scheduling.",
}
@Article{Choe:1998:CAA,
author = "Jinwoo Choe and Ness B. Shroff",
title = "A central-limit-theorem-based approach for analyzing
queue behavior in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "5",
pages = "659--671",
month = oct,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-5/p659-choe/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; performance; reliability; theory;
verification",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.2.5} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Local and Wide-Area
Networks, High-speed. {\bf G.3} Mathematics of
Computing, PROBABILITY AND STATISTICS, Queueing theory.
{\bf G.1.2} Mathematics of Computing, NUMERICAL
ANALYSIS, Approximation. {\bf C.4} Computer Systems
Organization, PERFORMANCE OF SYSTEMS. {\bf I.6.8}
Computing Methodologies, SIMULATION AND MODELING, Types
of Simulation.",
}
@Article{Feldmann:1998:EPC,
author = "Anja Feldmann and Jennifer Rexford and Ram{\'o}n
C{\'a}ceres",
title = "Efficient policies for carrying {Web} traffic over
flow-switched networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "673--685",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p673-feldmann/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.2.5}
Computer Systems Organization, COMPUTER-COMMUNICATION
NETWORKS, Local and Wide-Area Networks, Internet.",
}
@Article{Liu:1998:LER,
author = "Ching-Gung Liu and Deborah Estrin and Scott Shenker
and Lixia Zhang",
title = "Local error recovery in {SRM}: comparison of two
approaches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "686--699",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p686-liu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "experimentation; performance; reliability",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Packet-switching networks. {\bf C.4}
Computer Systems Organization, PERFORMANCE OF SYSTEMS,
Reliability, availability, and serviceability.",
}
@Article{Yau:1998:MSS,
author = "David K. Y. Yau and Simon S. Lam",
title = "Migrating sockets --- end system support for
networking with quality of service guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "700--716",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p700-yau/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability",
subject = "{\bf C.4} Computer Systems Organization, PERFORMANCE
OF SYSTEMS, Reliability, availability, and
serviceability. {\bf C.2.2} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Protocols, TCP/IP. {\bf C.2.1} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Network
Architecture and Design.",
}
@Article{Duffield:1998:SAS,
author = "N. G. Duffield and K. K. Ramakrishnan and Amy R.
Reibman",
title = "{SAVE}: an algorithm for smoothed adaptive video over
explicit rate networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "717--728",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p717-duffield/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.3} Computer Systems Organization,
SPECIAL-PURPOSE AND APPLICATION-BASED SYSTEMS,
Real-time and embedded systems.",
}
@Article{Kalampoukas:1998:TTT,
author = "Lampros Kalampoukas and Anujan Varma and K. K.
Ramakrishnan",
title = "Two-way {TCP} traffic over rate controlled channels:
effects and analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "729--743",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p729-kalampoukas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; performance",
subject = "{\bf C.2.2} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Protocols,
TCP/IP. {\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design, Asynchronous Transfer Mode (ATM).",
}
@Article{Ramaswami:1998:MON,
author = "Rajiv Ramaswami and Galen Sasaki",
title = "Multiwavelength optical networks with limited
wavelength conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "744--754",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p744-ramaswami/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS.",
}
@Article{Ramamurthy:1998:OAP,
author = "Byrav Ramamurthy and Jason Iness and Biswanath
Mukherjee",
title = "Optimizing amplifier placements in a multiwavelength
optical {LAN\slash MAN}: the unequally powered
wavelengths case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "755--767",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p755-ramamurthy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance",
subject = "{\bf C.2.1} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Network Architecture
and Design. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS. {\bf C.2.5} Computer Systems
Organization, COMPUTER-COMMUNICATION NETWORKS, Local
and Wide-Area Networks.",
}
@Article{Lorenz:1998:QRN,
author = "Dean H. Lorenz and Ariel Orda",
title = "{QoS} routing in networks with uncertain parameters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "768--778",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p768-lorenz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design; performance; reliability",
subject = "{\bf C.2.6} Computer Systems Organization,
COMPUTER-COMMUNICATION NETWORKS, Internetworking,
Routers. {\bf C.4} Computer Systems Organization,
PERFORMANCE OF SYSTEMS, Reliability, availability, and
serviceability.",
}
@Article{Saha:1998:CRR,
author = "Debanjan Saha and Sarit Mukherjee and Satish K.
Tripathi",
title = "Carry-over round robin: a simple cell scheduling
mechanism for {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "779--796",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Pronk:2001:CCR}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p779-saha/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kulkarni:1998:PAR,
author = "Lalita A. Kulkarni and San-qi Li",
title = "Performance analysis of a rate-based feedback control
scheme",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "797--810",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p797-kulkarni/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mark:1998:RED,
author = "Brian L. Mark and Gopalakrishnan Ramamurthy",
title = "Real-time estimation and dynamic renegotiation of
{UPC} parameters for arbitrary traffic sources in {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "811--827",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p811-mark/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jia:1998:DAD,
author = "Xiaohua Jia",
title = "A distributed algorithm of delay-bounded multicast
routing for multimedia applications in wide area
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "828--837",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Huang:2005:CID}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p828-jia/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kweon:1998:PDD,
author = "Seok-Kyu Kweon and Kang G. Shin",
title = "Providing deterministic delay guarantees in {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "838--850",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p838-kweon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hac:1998:DLM,
author = "Anna Ha{\'c} and Bo Liu",
title = "Database and location management schemes for mobile
communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "6",
number = "6",
pages = "851--865",
month = dec,
year = "1998",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jul 27 15:53:14 MDT 1999",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1998-6-6/p851-hac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chlamtac:1999:SWA,
author = "Imrich Chlamtac and Vikt{\'o}ria Elek and Andrea
Fumagalli and Csaba Szab{\'o}",
title = "Scalable {WDM} access network architecture based on
photonic slot routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "1--9",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p1-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical networks; network scalability; packet
switching; photonic slot routing; wavelength-division
multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Greenberg:1999:RSB,
author = "Albert G. Greenberg and R. Srikant and Ward Whitt",
title = "Resource sharing for book-ahead and
instantaneous-request calls",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "10--22",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p10-greenberg/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "advance reservation; book-ahead calls; integrated
services networks; link partitioning; loss networks;
quality of service; video teleconferencing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Hobson:1999:PEP,
author = "Richard F. Hobson and P. S. Wong",
title = "A parallel embedded-processor architecture for {ATM}
reassembly",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "23--37",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p23-hobson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; embedded systems; medium access control;
segmentation and reassembly",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Processor Architectures --- Parallel Architectures
(C.1.4)",
}
@Article{Li:1999:CCN,
author = "Junyi Li and Ness B. Shroff and Edwin K. P. Chong",
title = "Channel carrying: a novel handoff scheme for mobile
cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "38--50",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p38-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "channel borrowing; channel reservation; dynamic
channel allocation; modified fixed channel allocation",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}",
}
@Article{Chlamtac:1999:ECA,
author = "Imrich Chlamtac and Chiara Petrioli and Jason Redi",
title = "Energy-conserving access protocols for identification
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "51--59",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p51-chlamtac/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Protocols (C.2.2)",
}
@Article{Nong:1999:ANA,
author = "Ge Nong and Jogesh K. Muppala and Mounir Hamdi",
title = "Analysis of nonblocking {ATM} switches with multiple
input queues",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "60--74",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p60-nong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "analytical modeling; ATM switch; computer simulation;
performance evaluation",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}",
}
@Article{Capone:1999:DQR,
author = "Jeffrey M. Capone and Ioannis Stavrakakis",
title = "Delivering {QoS} requirements to traffic with diverse
delay tolerances in a {TDMA} environment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "75--87",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p75-capone/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "integrated services; QoS; scheduling; TDMA; wireless",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Tassiulas:1999:CTS,
author = "Leandros Tassiulas",
title = "Cut-through switching, pipelining, and scheduling for
network evacuation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "88--97",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p88-tassiulas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Xiong:1999:RSS,
author = "Yijun Xiong and Lorne G. Mason",
title = "Restoration strategies and spare capacity requirements
in self-healing {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "98--110",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p98-xiong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; heuristics; linear programming; network design;
network reliability/survivability; self-healing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}",
}
@Article{Cheng:1999:QPN,
author = "Ray-Guang Cheng and Chung-Ju Chang and Li-Fong Lin",
title = "A {QoS-Provisioning} neural fuzzy connection admission
controller for multimedia high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "111--121",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p111-cheng/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Lombardo:1999:DTP,
author = "Alifo Lombardo and Giacomo Morabito and Giovanni
Schembra",
title = "A discrete-time paradigm to evaluate skew performance
in a multimedia {ATM} multiplexer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "1",
pages = "122--139",
month = feb,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-1/p122-lombardo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; Markov models; multimedia; performance
evaluation; skew",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Akyildiz:1999:SCP,
author = "Ian F. Akyildiz and David A. Levine and Inwhee Joe",
title = "A slotted {CDMA} protocol with {BER} scheduling for
wireless multimedia networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "146--158",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p146-akyildiz/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BER scheduling; code division multiple access;
multimedia traffic; power control; priority; wireless
networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}",
}
@Article{Cheshire:1999:COB,
author = "Stuart Cheshire and Mary Baker",
title = "Consistent overhead {Byte} stuffing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "159--172",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p159-cheshire/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Byte stuffing; framing; packet; serial; transmission",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}",
}
@Article{Feng:1999:UIT,
author = "Wu-chang Feng and Dilip D. Kandlur and Debanjan Saha
and Kang G. Shin",
title = "Understanding and improving {TCP} performance over
networks with minimum rate guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "173--187",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p173-feng/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "differentiated services; integrated services; queue
management; TCP",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2)",
}
@Article{McKeown:1999:ISA,
author = "Nick McKeown",
title = "The {iSLIP} scheduling algorithm for input-queued
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "188--201",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p188-mckeown/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM switch; crossbar switch; input-queueing; IP
router; scheduling",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf IP}; Theory of Computation --- Analysis
of Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Sequencing and
scheduling}",
}
@Article{Rexford:1999:SVB,
author = "Jennifer Rexford and Don Towsley",
title = "Smoothing variable-bit-rate video in an
{Internetwork}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "202--215",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p202-rexford/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Bandwidth-smoothing; Internetwork; majorization;
prefetching; variable-bit-rate video",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Information Systems
--- Information Interfaces and Presentation ---
Multimedia Information Systems (H.5.1): {\bf Video
(e.g., tape, disk, DVI)}",
}
@Article{Kim:1999:PAD,
author = "Yonghwan Kim and San-qi Li",
title = "Performance analysis of data packet discarding in
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "216--227",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p216-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "badput; buffer threshold; early packet discarding;
goodput; packet loss probability; packet tail
discarding; packet-level control; stochastic modeling",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Haas:1999:AH,
author = "Zygmunt J. Haas and Ben Liang",
title = "Ad hoc mobility management with uniform quorum
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "228--240",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p228-haas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0)",
}
@Article{Qiao:1999:LPE,
author = "Chunming Qiao and Yousong Mei",
title = "Off-line permutation embedding and scheduling in
multiplexed optical networks with regular topologies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "241--250",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p241-qiao/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "rearrangeable nonblocking; wavelength conversion;
wavelength routing; wavelength-division multiplexing;
WDM meshes; WDM rings",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Zafirovic-Vukotic:1999:WTE,
author = "Mirjana Zafirovic-Vukotic and Ignatius G. M. M.
Niemegeers",
title = "Waiting time estimates in symmetric {ATM}-oriented
rings with the destination release of used slots",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "251--261",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p251-zafirovic-vukotic/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; LAN; queueing model",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
}
@Article{Gopal:1999:FBH,
author = "Ajei Gopal and Inder Gopal and Shay Kutten",
title = "Fast broadcast in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "2",
pages = "262--275",
month = apr,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-2/p262-gopal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Protocols (C.2.2); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Modeling techniques}",
}
@Article{Paxson:1999:EEI,
author = "Vern Paxson",
title = "End-to-end {Internet} packet dynamics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "277--292",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p277-paxson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "computer network performance; computer network
reliability; computer networks; failure analysis;
Internet-working; stability",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization --- Performance of
Systems (C.4): {\bf Reliability, availability, and
serviceability}",
}
@Article{Grossglauser:1999:FRM,
author = "Matthias Grossglauser and David N. C. Tse",
title = "A framework for robust measurement-based admission
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "293--309",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p293-grossglauser/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Measurement; Performance; Reliability;
Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4)",
}
@Article{Agrawal:1999:PBF,
author = "Rajeev Agrawal and Rene L. Cruz and Clayton Okino and
Rajendran Rajan",
title = "Performance bonds for flow control protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "310--323",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p310-agrawal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Performance; Theory; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "adaptive service; burstiness; delay; guaranteed
service; network calculus; queueing; regulator;
scheduler; service curve",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Performance attributes}",
}
@Article{Lampson:1999:ILU,
author = "Butler Lampson and Venkatachary Srinivasan and George
Varghese",
title = "{IP} lookups using multiway and multicolumn search",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "324--334",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p324-lampson/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf IP}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization ---
Computer-Communication Networks --- Internetworking
(C.2.6): {\bf Routers}",
}
@Article{Varvarigos:1999:VCD,
author = "Emmanouel A. Varvarigos and Jonathan P. Lang",
title = "A virtual circuit deflection protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "335--349",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p335-varvarigos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "deflection routing; Manhattan Street network;
multigigabit networks; optical switching; performance
analysis; tell-and-go protocol; virtual circuit
switching",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2); Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Circuit-switching
networks}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Guerin:1999:QRN,
author = "Roche A. Gu{\'e}rin and Ariel Orda",
title = "{QoS} routing in networks with inaccurate information:
theory and algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "350--364",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p350-guerin/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Bandwidth; delay; inaccuracy; networks; QoS; routing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2)",
}
@Article{Orda:1999:REE,
author = "Ariel Orda",
title = "Routing with end-to-end {QoS} guarantees in broadband
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "365--374",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p365-orda/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "constrained path optimization; hierarchical networks;
QoS routing; rate-based schedulers; topology
aggregation",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Routing and layout}; Mathematics of Computing ---
Discrete Mathematics --- Graph Theory (G.2.2): {\bf
Network problems}",
}
@Article{Nonnenmacher:1999:SFL,
author = "J{\"o}rg Nonnenmacher and Ernst W. Biersack",
title = "Scalable feedback for large groups",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "375--386",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p375-nonnenmacher/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "extreme value theory; feedback; multicast; performance
evaluation; reliable multicast",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Reliability, availability, and serviceability}",
}
@Article{Manzoni:1999:WMV,
author = "Pietro Manzoni and Paolo Cremonesi and Giuseppe
Serazzi",
title = "Workload models of {VBR} video traffic and their use
in resource allocation policies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "387--397",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p387-manzoni/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "burstiness; communication systems performance;
delay-sensitive traffic; multimedia communication;
networks",
subject = "Computer Systems Organization --- Performance of
Systems (C.4): {\bf Performance attributes}; Computer
Systems Organization --- Computer-Communication
Networks --- General (C.2.0)",
}
@Article{Chandra:1999:MOT,
author = "Kavitha Chandra and Amy R. Reibman",
title = "Modeling one- and two-layer variable bit rate video",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "398--413",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p398-chandra/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MPEG2; multiplexing; traffic model; two-layer; VBR
video",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0);
Computer Systems Organization --- Performance of
Systems (C.4): {\bf Modeling techniques}; Mathematics
of Computing --- Probability and Statistics (G.3): {\bf
Markov processes}",
}
@Article{Pankaj:1999:WRM,
author = "Rajesh K. Pankaj",
title = "Wavelength requirements for multicasting in
all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "414--424",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p414-pankaj/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical networks; multicasting; wavelength
division multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2); Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}",
}
@Article{Modiano:1999:RAS,
author = "Eytan Modiano",
title = "Random algorithms for scheduling multicast traffic in
{WDM} broadcast-and-select networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "425--434",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p425-modiano/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadcast star topology; lightwave networks; local
lightwave networks; multicast scheduling algorithms;
multicast switching; multicast/broadcast algorithms;
wavelength division multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}; Computer Systems
Organization --- Computer-Communication Networks ---
Local and Wide-Area Networks (C.2.5)",
}
@Article{Zhang:1999:SAA,
author = "Xijun Zhang and Chunming Qiao",
title = "On scheduling all-to-all personalized connections and
cost-effective designs in {WDM} rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "435--445",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p435-zhang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical paths; all-to-all communications; lower
bound; wavelength requirement",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}",
}
@Article{Dasylva:1999:OWS,
author = "Abel Dasylva and R. Srikant",
title = "Optimal {WDM} schedules for optical star networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "3",
pages = "446--456",
month = jun,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-3/p446-dasylva/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical networks; polynomial-time algorithms;
scheduling; wavelength-division multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Computation by Abstract Devices --- Complexity
Measures and Classes (F.1.3)",
}
@Article{Floyd:1999:PUE,
author = "Sally Floyd and Kevin Fall",
title = "Promoting the use of end-to-end congestion control in
the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "458--472",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p458-floyd/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2); Computer Systems Organization --- Performance
of Systems (C.4)",
}
@Article{Lu:1999:FSW,
author = "Songwu Lu and Vaduvur Bharghavan and R. Srikant",
title = "Fair scheduling in wireless packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "473--489",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p473-lu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}",
}
@Article{Presti:1999:STS,
author = "Francesco {Lo Presti} and Zhi-Li Zhang and Jim Kurose
and Don Towsley",
title = "Source time scale and optimal buffer\slash bandwidth
tradeoff for heterogeneous regulated traffic in a
network node",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "490--501",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p490-presti/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Wong:1999:DSF,
author = "Chung Kei Wong and Simon S. Lam",
title = "Digital signatures for flows and multicasts",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "502--513",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p502-wong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0):
{\bf Security and protection (e.g., firewalls)};
Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Trees}",
}
@Article{Raghavan:1999:RAC,
author = "Sriram Raghavan and G. Manimaran and C. Siva Ram
Murthy",
title = "A rearrangeable algorithm for the construction
delay-constrained dynamic multicast trees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "514--529",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p514-raghavan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Trees}",
}
@Article{Kong:1999:MSS,
author = "Keith Kong and Dipak Ghosal",
title = "Mitigating server-side congestion in the {Internet}
through pseudoserving",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "530--544",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p530-kong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "caching; flash-crowd; Internet server technology;
pseudoserving",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet}",
}
@Article{Xiao:1999:AAW,
author = "Gaoxi Xiao and Yiu-Wing Leung",
title = "Algorithms for allocating wavelength converters in
all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "545--557",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p545-xiao/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "All-optical WDM networks; simulation-based
optimization; wavelength converter",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization --- Performance of
Systems (C.4): {\bf Performance attributes}",
}
@Article{Grover:1999:HAP,
author = "Wayne D. Grover",
title = "High availability path design in ring-based optimal
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "558--574",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p558-grover/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Modeling techniques}",
}
@Article{Sharma:1999:OBM,
author = "Supriya Sharma and Yannis Viniotis",
title = "Optimal buffer management policies for shared-buffer
{ATM} switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "575--587",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p575-sharma/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM switches; buffer management; optimal policies",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}",
}
@Article{Park:1999:DSR,
author = "Jae-Hyun Park and Hyunsoo Yoon and Heung-Kyu Lee",
title = "The deflection self-routing {Banyan} network: a
large-scale {ATM} switch using the fully adaptive
self-routing and its performance analyses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "4",
pages = "588--604",
month = aug,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-4/p588-park/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algebraic formalism; ATM switch; deflection
self-routing Banyan network; performance evaluation;
topological properties; unbuffered Banyan network",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}",
}
@Article{Chaskar:1999:TWL,
author = "Hemant M. Chaskar and T. V. Lakshman and U. Madhow",
title = "{TCP} over wireless with link level error control:
analysis and design methodology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "605--615",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p605-chaskar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "link-layer protocols; performance analysis; rayleigh
fading; TCP; wireless networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf TCP/IP}; Computer Systems Organization
--- Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Choi:1999:UCS,
author = "Sunghyun Choi and Kang G. Shin",
title = "An uplink {CDMA} system architecture with diverse
{QoS} guarantees for heterogeneous traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "616--628",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p616-choi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "admission control; admission tests; automatic
retransmission request; CDMA systems; dynamic
time-division duplexing (D-TDD); location-dependent
errors; MAC protocol; multicode CDMA; polling; power
control; priority scheduling; QoS guarantees;
QoS-sensitive communication; reed-Solomon/convolutional
concatenated code; transmission-rate request access
protocol; wireless LAN; wireless/mobile communication",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
}
@Article{Grossglauser:1999:RLR,
author = "Matthias Grossglauser and Jean-Chrysostome Bolot",
title = "On the relevance of long-range dependence in network
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "629--640",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p629-grossglauser/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "long-range dependence; network traffic modeling;
self-similarity",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Modeling techniques}",
}
@Article{Medard:1999:RTP,
author = "Muriel M{\'e}dard and Steven G. Finn and Richard A.
Barry",
title = "Redundant trees for preplanned recovery in arbitrary
vertex-redundant or edge-redundant graphs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "641--652",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p641-medard/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "graph theory; multicasting; network recovery; network
robustness; routing; trees",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Network
topology}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Trees}",
}
@Article{Banerjea:1999:FRG,
author = "Anindo Banerjea",
title = "Fault recovery for guaranteed performance
communications connections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "653--668",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p653-banerjea/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "B-ISDN; computer network management; connection
routing; network reliability; real time channels",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf ISDN (Integrated
Services Digital Network)}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Packet-switching networks}",
}
@Article{Sariowan:1999:SGS,
author = "Hanrijanto Sariowan and Rene L. Cruz and George C.
Polyzos",
title = "{SCED}: a generalized scheduling policy for
guaranteeing quality-of-service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "669--684",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p669-sariowan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "integrated services networks; multiplexing; network
calculus; quality-of-service guarantees; scheduling;
service curves; traffic envelopes",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Sequencing and
scheduling}",
}
@Article{Feng:1999:APM,
author = "Wu-Chang Feng and Dilip D. Kandlur",
title = "Adaptive packet marking for maintaining end-to-end
throughput in a differentiated-services {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "685--697",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p685-feng/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "differentiated services; integrated services;
Internet; quality-of-service; TCP",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Internet};
Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf TCP/IP}; Computer Systems Organization
--- Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}",
}
@Article{Manimaran:1999:NDR,
author = "G. Manimaran and Hariharan Shankar Rahul and C. Siva
Ram Murthy",
title = "A new distributed route selection approach for channel
establishment in real-time networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "698--709",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p698-manimaran/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "channel establishment; distributed routing;
heuristics; quality of service; real-time networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Lakshman:1999:TCV,
author = "T. V. Lakshman and P. P. Mishra and K. K.
Ramakrishnan",
title = "Transporting compressed video over {ATM} networks with
explicit-rate feedback control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "710--723",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p710-lakshman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; congestion control; packet video",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Information Systems ---
Information Interfaces and Presentation --- Multimedia
Information Systems (H.5.1): {\bf Video (e.g., tape,
disk, DVI)}; Data --- Coding and Information Theory
(E.4): {\bf Data compaction and compression}",
}
@Article{Al-Mouhamed:1999:EPD,
author = "Mayez A. Al-Mouhamed and Mohammed Kaleemuddin and
Habib Yousef",
title = "Evaluation of pipelined dilated banyan switch
architectures for {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "724--740",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p724-al-mouhamed/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf ISDN (Integrated
Services Digital Network)}",
}
@Article{Kolarov:1999:CTA,
author = "Aleksandar Kolarov and G. Ramamurthy",
title = "A control-theoretic approach to the design of an
explicit rate controller for {ABR} service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "741--753",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p741-kolarov/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ABR service; ATM networks; feedback control; flow
control",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Modeling
techniques}",
}
@Article{Subramaniam:1999:OCP,
author = "Suresh Subramaniam and Murat Azizo{\u{g}}lu and Arun
K. Somani",
title = "On optimal converter placement in wavelength-routed
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "754--766",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p754-subramaniam/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "call blocking performance; optimal converter
placement; sparse wavelength conversion;
wavelength-routing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Circuit-switching
networks}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Network
topology}",
}
@Article{Alanyali:1999:PAW,
author = "Murat Alanyali and Ender Ayanoglu",
title = "Provisioning algorithms for {WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "767--778",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p767-alanyali/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5); Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Network problems}",
}
@Article{Li:1999:DWR,
author = "Ling Li and Arun K. Somani",
title = "Dynamic wavelength routing using congestion and
neighborhood information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "5",
pages = "779--786",
month = oct,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Gong:2004:CDW}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-5/p779-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "alternate shortest-path routing; circuit switching;
neighborhood-information-based routing; wavelength
routing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Circuit-switching
networks}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}",
}
@Article{Bennett:1999:PRP,
author = "Jon C. R. Bennett and Craig Partridge and Nicholas
Shectman",
title = "Packet reordering is not pathological network
behavior",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "789--798",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/1999-7-6/p789-bennett/p789-bennett.pdf;
http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p789-bennett/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication system traffic; Internet; packet
switching",
}
@Article{Basagni:1999:MTD,
author = "Stefano Basagni and Imrich Chlamtac and Danilo
Bruschi",
title = "A mobility-transparent deterministic broadcast
mechanism for ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "799--807",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/1999-7-6/p799-basagni/p799-basagni.pdf;
http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p799-basagni/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Naor:1999:LLA,
author = "Zohar Naor and Hanoch Levy",
title = "{LATS}: a load-adaptive threshold scheme for tracking
mobile users",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "808--817",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p808-naor/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile; PCS; user tracking; wireless",
}
@Article{Li:1999:RPC,
author = "Junyi Li and Ness B. Shroff and K. P. Chong",
title = "A reduced-power channel reuse scheme for wireless
packet cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "818--832",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p818-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capture division packet access; channel reuse; packet
cellular networks; power control",
}
@Article{Gerstel:1999:WCA,
author = "Ori Gerstel and Galen Sasaki and Shay Kutten and Rajiv
Ramaswami",
title = "Worst-case analysis of dynamic wavelength allocation
in optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "833--846",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p833-gerstel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network design; optical networks; wavelength
assignment",
}
@Article{Aksoy:1999:SAL,
author = "Demet Aksoy and Michael Franklin",
title = "{$ R \times W $}: a scheduling approach for
large-scale on-demand data broadcast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "846--860",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p846-aksoy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Low:1999:OFC,
author = "Steven H. Low and David E. Lapsley",
title = "Optimization flow control, {I}: basic algorithm and
convergence",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "861--874",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 07 14:12:50 2003",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Karbowski:2003:CSF}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p861-low/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous algorithm; congestion pricing;
convergence; gradient projection; optimization flow
control",
}
@Article{Libman:1999:DPA,
author = "Lavy Libman and Ariel Orda",
title = "The designer's perspective to atomic noncooperative
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "875--884",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p875-libman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "atomic (unsplittable) resource sharing; capacity
allocation; network management; noncooperative
networks; routing",
}
@Article{Cidon:1999:AMP,
author = "Israel Cidon and Raphael Rom and Yuval Shavitt",
title = "Analysis of multi-path routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "885--896",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p885-cidon/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tsai:1999:CGP,
author = "Wei K. Tsai and John K. Antonio and Garng M. Huang",
title = "Complexity of gradient projection method for optimal
routing in data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "897--905",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p897-tsai/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithm complexity; congestion control;
internetworking; routing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Routing and layout}; Mathematics of Computing ---
Numerical Analysis --- Optimization (G.1.6): {\bf
Gradient methods}",
}
@Article{Felstaine:1999:DRC,
author = "Eyal Felstaine and Reuven Cohen",
title = "On the distribution of routing computation in
hierarchical {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "906--916",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p906-felstaine/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; hierarchical routing; load balancing; NIMROD;
PNNI",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Theory of Computation ---
Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Routing and layout}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Kousa:1999:PAN,
author = "Maan A. Kousa and Ahmed K. Elhakeem and Hui Yang",
title = "Performance of {ATM} networks under hybrid {ARQ\slash
FEC} error control scheme",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "917--925",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p917-kousa/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ARQ packet; ARQ/FEC; ATM networks; Go-back-N;
throughput efficiency; traffic intensity; virtual
circuits",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Levy:1999:SEB,
author = "Hanoch Levy and Tzippi Mendelson and Moshe Sidi and
Joseph Keren-Zvi",
title = "Sizing exit buffers in {ATM} networks: an intriguing
coexistence of instability and tiny cell loss rates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "7",
number = "6",
pages = "926--936",
month = dec,
year = "1999",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:43:37 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/1999-7-6/p926-levy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; buffer sizing; CBR; D+G/D/1 queue; end-to-end
loss rate",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Decasper:2000:RPS,
author = "Dan Decasper and Zubin Dittia and Guru Parulkar and
Bernhard Plattner",
title = "Router plugins: a software architecture for
next-generation routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "2--15",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p2-decasper/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication system routing; communication system
security; Internet; modular computer systems",
}
@Article{Wong:2000:SGC,
author = "Chung Kei Wong and Mohamed Gouda and Simon S. Lam",
title = "Secure group communications using key graphs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "16--30",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p16-wong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "confidentiality; group communications; group key
management; key distribution; multicast; privacy;
rekeying; security",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0):
{\bf Security and protection (e.g., firewalls)}",
}
@Article{Baldi:2000:AGM,
author = "Mario Baldi and Yoram Ofek and B{\"u}lent Yener",
title = "Adaptive group multicast with time-driven priority",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "31--43",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p31-baldi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fairness; multicast; quality of service; real time;
ring networks; scheduling; time-driven priority",
}
@Article{Choi:2000:UWL,
author = "Sunghyun Choi and Kang G. Shin",
title = "A unified wireless {LAN} architecture for real-time
and non-real-time communication services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "44--59",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p44-choi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Iatrou:2000:DRS,
author = "Steve Iatrou and Ioannis Stavrakakis",
title = "A dynamic regulation and scheduling scheme for
real-time traffic management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "60--70",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p60-iatrou/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay variance; dynamic policy; QoS; regulation;
scheduling; throughput",
}
@Article{Ghani:2000:EDE,
author = "Nasir Ghani and Jon W. Mark",
title = "Enhanced distributed explicit rate allocation for
{ABR} services in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "71--86",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p71-ghani/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "available bit-rate services; feedback flow control;
max-min fairness; weighted fairness",
}
@Article{Kalyanaraman:2000:ESA,
author = "Shivkumar Kalyanaraman and Raj Jain and Sonia Fahmy
and Rohit Goyal and Bobby Vandalore",
title = "The {ERICA} switch algorithm for {ABR} traffic
management in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "87--98",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p87-kalyanaraman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM network; Internet",
}
@Article{Su:2000:SMM,
author = "Ching-Fong Su and Gustavo {De Veciana}",
title = "Statistical multiplexing and mix-dependent alternative
routing in multiservice {VP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "99--108",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p99-su/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "alternative routing; statistical multiplexing; traffic
mix; virtual path",
}
@Article{Byun:2000:USA,
author = "Sung Hyuk Byun and Dan Keun Sung",
title = "The {UniMIN} switch architecture for large-scale {ATM}
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "1",
pages = "109--120",
month = feb,
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Oct 28 17:15:07 MDT 2000",
bibsource = "http://www.acm.org/pubs/contents/journals/ton/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-1/p109-byun/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM switch; distribution network; fair virtual FIFO;
general expansion architecture; UniMIN",
}
@Article{Padhye:2000:MTR,
author = "Jitendra Padhye and Victor Firoiu and Donald F.
Towsley and James F. Kurose",
title = "Modeling {TCP Reno} performance: a simple model and
its empirical validation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "133--145",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Chen:2006:CMT}.",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p133-padhye/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "empirical validation; modeling; retransmission
timeouts; TCP",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf TCP/IP}; Computer Systems Organization
--- Performance of Systems (C.4): {\bf Modeling
techniques}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1)",
}
@Article{Spatscheck:2000:OTF,
author = "Oliver Spatscheck and J{\o}rgen S. Hansen and John H.
Hartman and Larry L. Peterson",
title = "Optimizing {TCP} forwarder performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "146--157",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p146-spatscheck/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "firewall; proxy; router; TCP",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf TCP/IP}; Computer Systems Organization
--- Performance of Systems (C.4): {\bf Performance
attributes}; Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0):
{\bf Security and protection (e.g., firewalls)}",
}
@Article{Rizzo:2000:RPP,
author = "Luigi Rizzo and Lorenzo Vicisano",
title = "Replacement policies for a proxy cache",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "158--170",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p158-rizzo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "caching; communication networks; policies;
replacement; Web",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Network
communications}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Performance
attributes}",
}
@Article{Paschalidis:2000:CDP,
author = "Ioannis Ch. Paschalidis and John N. Tsitsiklis",
title = "Congestion-dependent pricing of network services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "171--184",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p171-paschalidis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic programming; Internet economics; loss
networks; revenue management",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Performance attributes}",
}
@Article{Stoica:2000:HFS,
author = "Ion Stoica and Hui Zhang and T. S. Eugene Ng",
title = "A hierarchical fair service curve algorithm for
link-sharing, real-time, and priority services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "185--199",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p185-stoica/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fairness; link-sharing; packet scheduling; quality of
service (QoS); real-time",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Performance attributes}",
}
@Article{Corner:2000:PSI,
author = "Mark D. Corner and J{\"o}rg Liebeherr and Nada Golmie
and Chatschik Bisdikian and David H. Su",
title = "A priority scheme for the {IEEE 802.14 MAC} protocol
for hybrid fiber-coax networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "200--211",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p200-corner/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "local area networks; quality-of-service",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- General (C.2.0):
{\bf Data communications}; Computer Systems
Organization --- Computer-Communication Networks ---
Local and Wide-Area Networks (C.2.5)",
}
@Article{Biswas:2000:DFB,
author = "Subir K. Biswas and Rauf Izmailov",
title = "Design of a fair bandwidth allocation policy for {VBR}
traffic in {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "212--212",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p212-biswas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access control; asynchronous transfer mode; resource
management; wireless LAN",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5); Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}",
}
@Article{Lacher:2000:PCC,
author = "Martin S. Lacher and J{\"o}rg Nonnenmacher and Ernst
W. Biersack",
title = "Performance comparison of centralized versus
distributed error recovery for reliable multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "224--224",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p224-lacher/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ARQ; error control; FEC; performance evaluation;
reliable multicast protocol",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Reliability, availability, and serviceability}; Theory
of Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Routing and layout}",
}
@Article{Reeves:2000:DAD,
author = "Douglas S. Reeves and Hussein F. Salama",
title = "A distributed algorithm for delay-constrained unicast
routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "239--250",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p239-reeves/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay constraints; distributed algorithms; quality of
service; routing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Computer Systems Organization ---
Computer-Communication Networks --- Distributed Systems
(C.2.4): {\bf Distributed applications}; Theory of
Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Routing and layout}",
}
@Article{Grah:2000:PSL,
author = "Adrian Grah and Terence D. Todd",
title = "Packet-switched local area networks using
wavelength-selective station couplers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "251--264",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p251-grah/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
}
@Article{Berthaud:2000:TSN,
author = "Jean-Marc Berthaud",
title = "Time synchronization over networks using convex
closures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "2",
pages = "265--277",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-2/p265-berthaud/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "continuous estimation from discrete samplings;
distributed processing; error propagation; network time
synchronization",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Distributed Systems (C.2.4)",
}
@Article{Fan:2000:SCS,
author = "Li Fan and Pei Cao and Jussara Almeida and Andrei Z.
Broder",
title = "Summary cache: a scalable wide-area {Web} cache
sharing protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "281--293",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p281-fan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bloom filter; cache sharing; ICP; Web cache; Web
proxy",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Information Systems
--- Information Storage and Retrieval --- Systems and
Software (H.3.4): {\bf World Wide Web (WWW)};
Information Systems --- Information Storage and
Retrieval --- Systems and Software (H.3.4): {\bf
Performance evaluation (efficiency and effectiveness)};
Information Systems --- Information Storage and
Retrieval --- Online Information Services (H.3.5): {\bf
Data sharing}",
}
@Article{Kasera:2000:SRM,
author = "Sneha Kumar Kasera and G{\'\i}sli Hj{\'a}lmt{\'y}sson
and Donald F. Towsley and James F. Kurose",
title = "Scalable reliable multicast using multiple multicast
channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "294--310",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p294-kasera/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multicast channel; reliable multicast; retransmission
scoping",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Protocols (C.2.2): {\bf Routing protocols};
Mathematics of Computing --- Discrete Mathematics ---
Graph Theory (G.2.2): {\bf Path and circuit problems};
Mathematics of Computing --- Numerical Analysis ---
Optimization (G.1.6)",
}
@Article{Chen:2000:MPP,
author = "Shiwen Chen and Oktay G{\"u}nl{\"u}k and B{\"u}lent
Yener",
title = "The multicast packing problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "311--318",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p311-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "lower bounds; multicast congestion; multicast
optimization; multicast packing; multicasting",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Network problems}; Mathematics of
Computing --- Numerical Analysis --- Optimization
(G.1.6)",
}
@Article{Li:2000:ODM,
author = "Jie Li and Hisao Kameda and Keqin Li",
title = "Optimal dynamic mobility management for {PCS}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "319--327",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p319-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3): {\bf Network management}; Computer Systems
Organization --- Computer-Communication Networks ---
Distributed Systems (C.2.4): {\bf Network operating
systems}",
}
@Article{Acampora:2000:NAM,
author = "Anthony S. Acampora and Srikanth V. Krishnamurthy",
title = "A new adaptive {MAC} layer protocol for broadband
packet wireless networks in harsh fading and
interference environments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "328--336",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p328-acampora/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "media access protocols; wireless",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5): {\bf Access schemes}; Computer
Systems Organization --- Computer-Communication
Networks --- Network Architecture and Design (C.2.1):
{\bf Packet-switching networks}",
}
@Article{Kim:2000:BAW,
author = "Jeong Geun Kim and Marwan M. Krunz",
title = "Bandwidth allocation in wireless networks with
guaranteed packet-loss performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "337--349",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p337-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "effective bandwidth; fluid analysis; QoS; wireless
networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf Wireless
communication}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}; Computer Systems Organization ---
Performance of Systems (C.4): {\bf Modeling
techniques}",
}
@Article{Su:2000:ERF,
author = "Ching-Fong Su and Gustavo {De Veciana} and Jean
Walrand",
title = "Explicit rate flow control for {ABR} services in {ATM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "350--361",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p350-su/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ABR service; ATM networks; delay differential
equations; explicit rate flow control",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Asynchronous Transfer Mode (ATM)}; Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Network problems}; Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Modeling techniques}",
}
@Article{Mayer:2000:LCD,
author = "Alain Mayer and Yoram Ofek and Moti Yung",
title = "Local and congestion-driven fairness algorithm in
arbitrary topology networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "362--372",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p362-mayer/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Distributed Systems (C.2.4): {\bf Network operating
systems}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Trees};
Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Network
topology}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}",
}
@Article{Low:2000:EBB,
author = "Steven H. Low",
title = "Equilibrium bandwidth and buffer allocations for
elastic traffics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "373--383",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p373-low/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth and buffer allocation; elastic traffic;
equilibrium allocation; equilibrium pricing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Packet-switching networks}; Information Systems ---
Information Storage and Retrieval --- Systems and
Software (H.3.4): {\bf Performance evaluation
(efficiency and effectiveness)}; Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}",
}
@Article{Crochat:2000:PIW,
author = "Olivier Crochat and Jean-Yves {Le Boudec} and Ornan
Gerstel",
title = "Protection interoperability for {WDM} optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "384--395",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p384-crochat/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "interoperability; optical network; protection;
routing; taboo search; WDM",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Path and circuit problems}",
}
@Article{Sikdar:2000:QAS,
author = "Biplab Sikdar and D. Manjunath",
title = "Queueing analysis of scheduling policies in copy
networks of space-based multicast packet switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "396--406",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p396-sikdar/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "copy networks; multicast switches; queueing analysis;
scheduling algorithms",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Packet-switching networks}",
}
@Article{Kannan:2000:MMM,
author = "Rajgopal Kannan and Sibabrata Ray",
title = "{MSXmin}: a modular multicast {ATM} packet switch with
low delay and hardware complexity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "407--418",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p407-kannan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous transfer mode; multistage interconnection
networks; routing; switching circuits",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Packet-switching networks}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Asynchronous Transfer Mode (ATM)}; Theory of
Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Routing and layout}; Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Trees}",
}
@Article{Wong:2000:ARC,
author = "Eric W. M. Wong and Andy K. M. Chan and Tak-Shing
Peter Yum",
title = "Analysis of rerouting in circuit-switched networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "3",
pages = "419--427",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-3/p419-wong/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "circuit-switched networks; dynamic routing; least
loaded routing; rerouting",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Circuit-switching networks}; Theory of Computation ---
Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Routing and layout}; Computing Methodologies ---
Simulation and Modeling --- Simulation Output Analysis
(I.6.6); Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Path and
circuit problems}",
}
@Article{Zhang:2000:VSP,
author = "Zhi-Li Zhang and Yuewei Wang and David H. C. Du and
Dongli Shu",
title = "Video staging: a proxy-server-based approach to
end-to-end video delivery over wide-area networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "429--442",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p429-zhang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "end-to-end video delivery; heterogeneous networking
environment; MPEG; proxy server; video smoothing; video
staging; video streaming",
subject = "Information Systems --- Information Interfaces and
Presentation --- Multimedia Information Systems
(H.5.1): {\bf Video (e.g., tape, disk, DVI)}; Computer
Systems Organization --- Computer System Implementation
--- Servers (C.5.5); Computer Systems Organization ---
Computer-Communication Networks --- Distributed Systems
(C.2.4)",
}
@Article{Abdalla:2000:KMR,
author = "Michel Abdalla and Yuval Shavitt and Avishai Wool",
title = "Key management for restricted multicast using
broadcast encryption",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "443--454",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p443-abdalla/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Data --- Data Encryption (E.3); Information Systems
--- Information Systems Applications --- Communications
Applications (H.4.3): {\bf Internet}; Computing Milieux
--- Computers and Society --- Public Policy Issues
(K.4.1): {\bf Intellectual property rights}; Computing
Milieux --- Computers and Society --- Electronic
Commerce (K.4.4)",
}
@Article{Zegura:2000:ALA,
author = "Ellen W. Zegura and Mostafa H. Ammar and Zongming Fei
and Samrat Bhattacharjee",
title = "Application-layer anycasting: a server selection
architecture and use in a replicated {Web} service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "455--466",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p455-zegura/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anycasting; replication; server selection",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Distributed Systems
(C.2.4): {\bf Client/server}; Information Systems ---
Information Storage and Retrieval --- Systems and
Software (H.3.4): {\bf World Wide Web (WWW)}; Computer
Systems Organization --- Computer-Communication
Networks --- Network Protocols (C.2.2)",
}
@Article{Roughan:2000:RTE,
author = "Matthew Roughan and Darryl Veitch and Patrice Abry",
title = "Real-time estimation of the parameters of long-range
dependence",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "467--478",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p467-roughan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "estimation; fractal; Hurst parameter; long-range
dependence; on-line; real-time; self-similar; traffic
modeling; wavelets",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3): {\bf Network management}; Mathematics of
Computing --- Numerical Analysis --- Approximation
(G.1.2): {\bf Wavelets and fractals}",
}
@Article{Baldi:2000:EED,
author = "Mario Baldi and Yoram Ofek",
title = "End-to-end delay analysis of videoconferencing over
packet-switched networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "479--492",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p479-baldi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "end-to-end delay; MPEG; performance guarantees;
quality of service; time-driven priority;
videoconference",
subject = "Information Systems --- Information Systems
Applications --- Communications Applications (H.4.3):
{\bf Videotex}; Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Data --- Coding and Information Theory
(E.4): {\bf Data compaction and compression}",
}
@Article{Iliadis:2000:OPC,
author = "Ilias Iliadis",
title = "Optimal {PNNI} complex node representations for
restrictive costs and minimal path computation time",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "493--506",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p493-iliadis/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "complex node representation; PNNI; restrictive cost;
state aggregation",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2); Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Numerical
Algorithms and Problems (F.2.1): {\bf Computations on
matrices}",
}
@Article{Barcelo:2000:WCT,
author = "Jos{\'e} M. Barcel{\'o} and Jorge Garc{\'\i}a-Vidal
and Olga Casals",
title = "Worst-case traffic in a tree network of {ATM}
multiplexers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "507--516",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p507-barcelo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; Bene{\v{s}} method; periodic traffic; tree
networks; worst-case traffic",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Mathematics of Computing ---
Discrete Mathematics --- Graph Theory (G.2.2);
Mathematics of Computing --- Probability and Statistics
(G.3): {\bf Queueing theory}",
}
@Article{Chen:2000:ECS,
author = "Wen-Tsuen Chen and Chun-Fu Huang and Yi-Luang Chang
and Wu-Yuin Hwang",
title = "An efficient cell-scheduling algorithm for multicast
{ATM} switching systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "517--525",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p517-chen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous transfer mode; cell-scheduling algorithm;
head-of-line blocking problem; multicast",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Theory of Computation ---
Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}; Hardware --- Logic Design
--- Design Aids (B.6.3): {\bf Hardware description
languages}",
}
@Article{Kim:2000:PSR,
author = "Dongsoo S. Kim and Ding-Zhu Du",
title = "Performance of split routing algorithm for three-stage
multicast networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "526--534",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p526-kim/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multicast; performance evaluation; probabilistic
model; switching networks",
subject = "Theory of Computation --- Analysis of Algorithms and
Problem Complexity --- Nonnumerical Algorithms and
Problems (F.2.2): {\bf Routing and layout}; Mathematics
of Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Network problems}",
}
@Article{Hwang:2000:NMT,
author = "Frank K. Hwang and Sheng-Chyang Liaw",
title = "On nonblocking multicast three-stage {Clos} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "4",
pages = "535--539",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-4/p535-hwang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multicast traffic; strictly nonblocking; switching
networks; wide-sense nonblocking",
subject = "Mathematics of Computing --- Discrete Mathematics ---
Graph Theory (G.2.2): {\bf Network problems}; Theory of
Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Routing and layout}",
}
@Article{Lakshman:2000:TIP,
author = "T. V. Lakshman and Upamanyu Madhow and Bernhard
Suter",
title = "{TCP\slash IP} performance with random loss and
bidirectional congestion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "541--555",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-5/p541-lakshman/p541-lakshman.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p541-lakshman/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Experimentation; Measurement;
Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ADSL; buffer management; cable modems; scheduling;
TCP",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf TCP/IP}; Computer Systems Organization
--- Computer-Communication Networks --- Internetworking
(C.2.6): {\bf Standards (e.g., TCP/IP)}; Theory of
Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Sequencing and scheduling}; Computer
Systems Organization --- Performance of Systems (C.4):
{\bf Performance attributes}",
}
@Article{Mo:2000:FEE,
author = "Jeonghoon Mo and Jean Walrand",
title = "Fair end-to-end window-based congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "556--567",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p556-mo/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Management; Theory; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth sharing; congestion control; fairness; TCP;
window",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Computer Systems Organization ---
Computer-Communication Networks --- Internetworking
(C.2.6): {\bf Standards (e.g., TCP/IP)}; Theory of
Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Sequencing and scheduling}; Computer
Systems Organization --- Performance of Systems (C.4)",
}
@Article{Krishnan:2000:CLP,
author = "P. Krishnan and Danny Raz and Yuval Shavitt",
title = "The cache location problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "568--582",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p568-krishnan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Performance; Reliability; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "location problem; mirror placement; transparent
cache",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3): {\bf Network management}; Computer Systems
Organization --- Computer-Communication Networks ---
Distributed Systems (C.2.4): {\bf Client/server};
Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5); Computer Systems Organization ---
Performance of Systems (C.4): {\bf Design studies};
Hardware --- Memory Structures --- Design Styles
(B.3.2): {\bf Cache memories}; Mathematics of Computing
--- Discrete Mathematics --- Graph Theory (G.2.2)",
}
@Article{Bambos:2000:CAA,
author = "Nicholas Bambos and Shou C. Chen and Gregory J.
Pottie",
title = "Channel access algorithms with active link protection
for wireless communication networks with power
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "583--597",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p583-bambos/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Experimentation; Measurement; Theory;
Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "admission control; multiple access; power control;
radio channel access; wireless networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3): {\bf Network management}; Computing
Methodologies --- Simulation and Modeling ---
Simulation Output Analysis (I.6.6)",
}
@Article{Banerjee:2000:WRO,
author = "Dhritiman Banerjee and Biswanath Mukherjee",
title = "Wavelength-routed optical networks: linear
formulation, resource budgeting tradeoffs, and a
reconfiguration study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "598--607",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p598-banerjee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Experimentation; Measurement; Performance;
Theory; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "integer linear program; lightpath; optical network;
optimization; reconfigurability; resource budgeting;
virtual topology; wavelength routing; WDM",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Circuit-switching
networks}; Mathematics of Computing --- Numerical
Analysis --- Optimization (G.1.6): {\bf Integer
programming}; Mathematics of Computing --- Numerical
Analysis --- Optimization (G.1.6): {\bf Linear
programming}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}",
}
@Article{Zhang:2000:ECA,
author = "Xijun Zhang and Chunming Qiao",
title = "An effective and comprehensive approach for traffic
grooming and wavelength assignment in {SONET\slash WDM}
rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "608--617",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p608-zhang/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Experimentation; Measurement;
Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ADMs; SONET; traffic grooming; wavelength assignment;
WDM rings",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Operations (C.2.3): {\bf Network management};
Mathematics of Computing --- Discrete Mathematics ---
Graph Theory (G.2.2)",
}
@Article{Gerstel:2000:CET,
author = "Ornan Gerstel and Rajiv Ramaswami and Galen H.
Sasaki",
title = "Cost-effective traffic grooming in {WDM} rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "618--630",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p618-gerstel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Experimentation; Measurement;
Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "electronic traffic grooming; nonblocking networks;
optical networks; wavelength division multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Operations (C.2.3): {\bf Network management};
Mathematics of Computing --- Discrete Mathematics ---
Graph Theory (G.2.2)",
}
@Article{Jue:2000:MMP,
author = "Jason P. Jue and Biswanath Mukherjee",
title = "Multiconfiguration multihop protocols: a new class of
protocols for packet-switched {WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "631--642",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p631-jue/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Experimentation; Measurement; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multiconfiguration; multihop; optical network; packet
switching; passive-star coupler; single-hop;
wavelength-division multiplexing",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Packet-switching
networks}; Mathematics of Computing --- Discrete
Mathematics --- Graph Theory (G.2.2): {\bf Network
problems}; Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}",
}
@Article{Berger:2000:DBE,
author = "Arthur W. Berger and Yaakov Kogan",
title = "Dimensioning bandwidth for elastic traffic in
high-speed data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "643--654",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p643-berger/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Experimentation; Measurement; Theory; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic approximation; asynchronous transfer mode;
closed queueing networks; computer network performance;
effective bandwidths; Internet; traffic engineering;
transmission control protocol",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3); Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Computer Systems Organization ---
Computer-Communication Networks --- Internetworking
(C.2.6): {\bf Standards (e.g., TCP/IP)}",
}
@Article{Biswas:2000:CSE,
author = "Subir K. Biswas and Rauf Izmailov and Bhaskar
Sengupta",
title = "Connection splitting: an efficient way of reducing
call blocking in {ATM}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "655--666",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p655-biswas/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access control; asynchronous transfer mode;
communication system routing; resource management;
scheduling",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}; Theory of Computation ---
Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Routing and layout}; Mathematics of Computing ---
Discrete Mathematics --- Graph Theory (G.2.2): {\bf
Network problems}",
}
@Article{Yaiche:2000:GTF,
author = "Ha{\"\i}kel Ya{\"\i}che and Ravi R. Mazumdar and
Catherine Rosenberg",
title = "A game theoretic framework for bandwidth allocation
and pricing in broadband networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "667--678",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p667-yaiche/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Theory; Verification",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth allocation; elastic traffic; game theory;
Nash bargaining solution; pricing",
subject = "Computing Methodologies --- Simulation and Modeling
--- Types of Simulation (I.6.8): {\bf Gaming}; Computer
Systems Organization --- Computer-Communication
Networks --- Network Operations (C.2.3); Mathematics of
Computing --- Numerical Analysis --- Optimization
(G.1.6)",
}
@Article{Cheung:2000:DMR,
author = "Chi-Chung Cheung and Danny H. K. Tsang and Sanjay
Gupta",
title = "Dynamic multicast routing based on mean number of new
calls accepted before blocking for single rate loss
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "5",
pages = "679--688",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 8 17:21:08 MST 2000",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/citations/journals/ton/2000-8-5/p679-cheung/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Experimentation; Measurement;
Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic routing; multicast routing; single rate loss
networks",
subject = "Theory of Computation --- Analysis of Algorithms and
Problem Complexity --- Nonnumerical Algorithms and
Problems (F.2.2): {\bf Routing and layout}; Mathematics
of Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Network problems}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1)",
}
@Article{LeBoudec:2000:OSG,
author = "Jean-Yves {Le Boudec} and Olivier Verscheure",
title = "Optimal smoothing for guaranteed service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "689--696",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p689-le\_boudec/p689-le\_boudec.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p689-le\_boudec/;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p689-le_boudec/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network calculus; playback delay; video transmission",
}
@Article{Hu:2000:PST,
author = "Rose Qingyang Hu and David W. Petr",
title = "A predictive self-tuning fuzzy-logic feedback rate
controller",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "697--709",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p697-hu/p697-hu.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p697-hu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "adaptive control; asynchronous transfer mode; computer
network performance; feedback systems; fuzzy control;
predictive control; traffic control",
}
@Article{Frey:2000:GBF,
author = "Michael Frey and Son Nguyen-Quang",
title = "A gamma-based framework for modeling variable-rate
{MPEG} video sources: the {GOP} {GBAR} model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "710--719",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p710-frey/p710-frey.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p710-frey/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "buffer overflow loss; frame size model; group of
pictures; MPEG video; video traffic modeling",
}
@Article{Vickers:2000:SAM,
author = "Brett J. Vickers and C{\'e}lio Albuquerque and Tatsuya
Suda",
title = "Source-adaptive multilayered multicast algorithms for
real-time video distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "720--733",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p720-vickers/p720-vickers.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p720-vickers/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; feedback control; multilayered
video",
}
@Article{Narvaez:2000:NDA,
author = "Paolo Narv{\'a}ez and Kai-Yeung Siu and Hong-Yi
Tzeng",
title = "New dynamic algorithms for shortest path tree
computation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "734--746",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p734-narvaez/p734-narvaez.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p734-narvaez/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "routing; shortest path trees",
subject = "Mathematics of Computing --- Discrete Mathematics ---
Graph Theory (G.2.2): {\bf Trees}; Mathematics of
Computing --- Discrete Mathematics --- Graph Theory
(G.2.2): {\bf Graph algorithms}",
}
@Article{Zhu:2000:PDA,
author = "Yuhong Zhu and George N. Rouskas and Harry G. Perros",
title = "A path decomposition approach for computing blocking
probabilities in wavelength-routing networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "747--762",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p747-zhu/p747-zhu.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p747-zhu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "call-blocking probability; converter placement;
decomposition algorithms; wavelength-division
multiplexing; wavelength-routing networks",
}
@Article{Noel:2000:PMM,
author = "Eric Noel and K. Wendy Tang",
title = "Performance modeling of multihop network subject to
uniform and nonuniform geometric traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "763--774",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p763-noel/p763-noel.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p763-noel/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "deflection routing; multihop networks; performance
modeling; store-and-forward routing",
}
@Article{Cohen:2000:CVP,
author = "Reuven Cohen and Gideon Kaempfer",
title = "On the cost of virtual private networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "775--784",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p775-cohen/p775-cohen.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p775-cohen/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cali:2000:DTI,
author = "Frederico Cal{\`\i} and Marco Conti and Enrico
Gregori",
title = "Dynamic tuning of the {IEEE} 802.11 protocol to
achieve a theoretical throughput limit",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "785--799",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p785-cal/p785-cal.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p785-cal/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multiple access protocol (MAC); performance analysis;
protocol capacity; wireless LAN (WLAN)",
}
@Article{Ivanovich:2000:SDM,
author = "Milosh Ivanovich and Moshe Zukerman and Fraser
Cameron",
title = "A study of deadlock models for a multiservice medium
access protocol employing a {Slotted} {Aloha}
signalling channel",
journal = j-IEEE-TRANS-NETWORKING,
volume = "8",
number = "6",
pages = "800--811",
year = "2000",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2000-8-6/p800-ivanovich/p800-ivanovich.pdf;
http://www.acm.org/pubs/citations/journals/ton/2000-8-6/p800-ivanovich/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "",
}
@Article{deVeciana:2001:SPA,
author = "Gustavo {De Veciana} and Takis Konstantopoulos and
Tae-Jin Lee",
title = "Stability and performance analysis of networks
supporting elastic services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "2--14",
year = "2001",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/90.909020",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p2-de\_veciana/p2-de\_veciana.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p2-de\_veciana/;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p2-de_veciana/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Management; Performance; Reliability",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ABR service; bandwidth allocation; Lyapunov functions;
performance analysis; proportional fairness; rate
control; stability; TCP/IP; weighted max-min fairness",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2); Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
}
@Article{Abraham:2001:NAA,
author = "Santosh Paul Abraham and Anurag Kumar",
title = "A new approach for asynchronous distributed rate
control of elastic sessions in integrated packet
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "15--30",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p15-abraham/p15-abraham.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p15-abraham/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ABR switch algorithms; effective service capacity;
explicit rate-based congestion control; stochastic
approximation",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Protocols (C.2.2); Computer Systems
Organization --- Computer-Communication Networks ---
Local and Wide-Area Networks (C.2.5)",
}
@Article{Yeom:2001:MTB,
author = "Ikjun Yeom and A. L. Narasimha Reddy",
title = "Modeling {TCP} behavior in a differentiated services
network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "31--46",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p31-yeom/p31-yeom.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p31-yeom/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Management",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "AF PHB; differentiated service; TCP modeling",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2); Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
}
@Article{Chich:2001:UDR,
author = "Thierry Chich and Pierre Fraigniaud and Johanne
Cohen",
title = "Unslotted deflection routing: a practical and
efficient protocol for multihop optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "47--59",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p47-chich/p47-chich.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p47-chich/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical networks; deflection routing; slotted
versus unslotted networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Theory of Computation
--- Computation by Abstract Devices --- Models of
Computation (F.1.1); Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5)",
xxauthor = "Thierry Chich and Johanne Cohen and Pierre
Fraigniaud",
xxtitle = "Unslotted deflection routing: a practical protocol for
multihop optical networks",
}
@Article{Li:2001:WAP,
author = "Guangzhi Li and Rahul Simha",
title = "On the wavelength assignment problem in multifiber
{WDM} star and ring networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "60--68",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p60-li/p60-li.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p60-li/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical networks; wavelength routing and assignment;
WDM optical networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Local and Wide-Area Networks (C.2.5)",
}
@Article{Shad:2001:DSA,
author = "Faisal Shad and Terence D. Todd and Vytas Kezys and
John Litva",
title = "Dynamic slot allocation {(DSA)} in indoor {SDMA\slash
TDMA} using smart antenna basestation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "69--81",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p69-shad/p69-shad.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p69-shad/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computing
Methodologies --- Artificial Intelligence --- Problem
Solving, Control Methods, and Search (I.2.8): {\bf
Heuristic methods}",
}
@Article{Awerbuch:2001:TAD,
author = "Baruch Awerbuch and Yuval Shavitt",
title = "Topology aggregation for directed graphs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "82--90",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p82-awerbuch/p82-awerbuch.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p82-awerbuch/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous transfer mode; communication system
routing; directed graphs; graph theory; PNNI; topology;
wide-area networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Local and Wide-Area
Networks (C.2.5); Software --- Operating Systems ---
Communications Management (D.4.4)",
}
@Article{Gerla:2001:RBS,
author = "Mario Gerla and Emilio Leonardi and Fabio Neri and
Prasasth Palnati",
title = "Routing in the bidirectional shufflenet",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "91--103",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p91-gerla/p91-gerla.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p91-gerla/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "deadlock avoidance; shufflenet; wormhole routing",
}
@Article{Leonardi:2001:SIQ,
author = "Emilio Leonardi and Marco Mellia and Fabio Neri and
Marco Ajmone Marsan",
title = "On the stability of input-queued switches with
speed-up",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "1",
pages = "104--118",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-1/p104-leonardi/p104-leonardi.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-1/p104-leonardi/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "input buffered switches; Lyapunov methods; scheduling
algorithm; stability",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Local and Wide-Area Networks (C.2.5)",
}
@Article{Chan:2001:DSA,
author = "S.-H Gary Chan and Fouad Tobagi",
title = "Distributed servers architecture for networked video
services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "125--136",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p125-chan/p125-chan.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p125-chan/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Measurement; Performance; Reliability",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "architecture; caching schemes; distributed servers;
network channels and local storage; tradeoff; unicast
and multicast; video-on-command",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Distributed Systems
(C.2.4): {\bf Client/server}; Information Systems ---
Information Interfaces and Presentation --- Multimedia
Information Systems (H.5.1): {\bf Video (e.g., tape,
disk, DVI)}",
}
@Article{Ekici:2001:DRA,
author = "Eylem Ekici and Ian F. Akyildiz and Michael D.
Bender",
title = "A distributed routing algorithm for datagram traffic
in {LEO} satellite networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "137--147",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p137-ekici/p137-ekici.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p137-ekici/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "connectionless/datagram routing; low earth orbit
(LEO); satellite networks",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2): {\bf Routing protocols}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf Wireless
communication}; Computer Applications --- Physical
Sciences and Engineering (J.2): {\bf Aerospace}; Theory
of Computation --- Analysis of Algorithms and Problem
Complexity --- Nonnumerical Algorithms and Problems
(F.2.2): {\bf Routing and layout}",
}
@Article{Krishnamurthy:2001:PBM,
author = "Srikanth V. Krishnamurthy and Anthony S. Acampora and
Michele Zorzi",
title = "Polling-based media access protocols for use with
smart adaptive array antennas",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "148--161",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p148-krishnamurthy/p148-krishnamurthy.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p148-krishnamurthy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Measurement; Performance;
Reliability; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "antenna; arrays; media; polling; protocols",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Wireless
communication}; Hardware --- Input/Output and Data
Communications --- Data Communications Devices (B.4.1);
Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2)",
}
@Article{Shaikh:2001:EIS,
author = "Anees Shaikh and Jennifer Rexford and Kang G. Shin",
title = "Evaluating the impact of stale link state on
quality-of-service routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "162--176",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p162-shaikh/p162-shaikh.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p162-shaikh/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Management; Measurement; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "explicit routing; link-state; modeling;
quality-of-service; signaling; source-directed
routing",
subject = "Theory of Computation --- Analysis of Algorithms and
Problem Complexity --- Nonnumerical Algorithms and
Problems (F.2.2): {\bf Routing and layout}; Computer
Systems Organization --- Computer-Communication
Networks --- Network Protocols (C.2.2); Computer
Systems Organization --- Computer-Communication
Networks --- Network Architecture and Design (C.2.1):
{\bf Packet-switching networks}; Computer Systems
Organization --- Computer-Communication Networks ---
Network Architecture and Design (C.2.1): {\bf
Asynchronous Transfer Mode (ATM)}; Computer Systems
Organization --- Performance of Systems (C.4): {\bf
Reliability, availability, and serviceability}",
}
@Article{Iida:2001:DAC,
author = "Katsuyoshi Iida and Tetsuya Takine and Hideki Sunahara
and Yuji Oie",
title = "Delay analysis for {CBR} traffic under static-priority
scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "177--185",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p177-iida/p177-iida.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p177-iida/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Performance",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access networks; constant bit rate; delay analysis;
G.723.1; static priority scheduling",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network Protocols
(C.2.2)",
}
@Article{Krishnaswamy:2001:DLT,
author = "Rajesh M. Krishnaswamy and Kumar N. Sivarajan",
title = "Design of logical topologies: a linear formulation for
wavelength-routed optical networks with no wavelength
changers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "186--198",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p186-krishnaswamy/p186-krishnaswamy.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p186-krishnaswamy/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Design; Performance; Reliability; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical networks; linear program; network
planning; topology design",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Network
topology}; Computer Systems Organization ---
Computer-Communication Networks --- Network Operations
(C.2.3); Theory of Computation --- Analysis of
Algorithms and Problem Complexity --- Nonnumerical
Algorithms and Problems (F.2.2): {\bf Routing and
layout}",
}
@Article{Qiu:2001:MBA,
author = "Jingyu Qiu and Edward W. Knightly",
title = "Measurement-based admission control with aggregate
traffic envelopes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "199--210",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p199-qiu/p199-qiu.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p199-qiu/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Measurement; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "admission control; quality of service; real-time
flows; traffic envelopes",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1); Computer Systems
Organization --- Computer-Communication Networks ---
Network Operations (C.2.3); Computer Systems
Organization --- Computer-Communication Networks ---
Distributed Systems (C.2.4); Theory of Computation ---
Analysis of Algorithms and Problem Complexity ---
Nonnumerical Algorithms and Problems (F.2.2): {\bf
Sequencing and scheduling}",
}
@Article{Valaee:2001:REW,
author = "Shahrokh Valaee",
title = "A recursive estimator of worst-case burstiness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "2",
pages = "211--222",
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jul 26 07:58:06 MDT 2001",
bibsource = "http://www.acm.org/pubs/toc/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
URL = "http://www.acm.org/pubs/articles/journals/ton/2001-9-2/p211-valaee/p211-valaee.pdf;
http://www.acm.org/pubs/citations/journals/ton/2001-9-2/p211-valaee/",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
generalterms = "Algorithms; Design; Measurement; Performance; Theory",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ATM; burstiness curve; deterministic source modeling;
leaky bucket; reflection mapping; regulator",
subject = "Computer Systems Organization ---
Computer-Communication Networks --- Network
Architecture and Design (C.2.1): {\bf Asynchronous
Transfer Mode (ATM)}",
}
@Article{Savage:2001:NSI,
author = "Stefan Savage and David Wetherall and Anna Karlin and
Tom Anderson",
title = "Network support for {IP} traceback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "226--237",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barford:2001:CPA,
author = "Paul Barford and Mark Crovella",
title = "Critical path analysis of {TCP} transactions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "238--248",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Christiansen:2001:TRW,
author = "Mikkel Christiansen and Kevin Jeffay and David Ott and
F. Donelson Smith",
title = "Tuning {RED} for {Web} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "249--264",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Feldmann:2001:DTD,
author = "Anja Feldmann and Albert Greenberg and Carsten Lund
and Nick Reingold and Jennifer Rexford and Fred True",
title = "Deriving traffic demands for operational {IP}
networks: methodology and experience",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "265--280",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffield:2001:TSD,
author = "N. G. Duffield and Matthias Grossglauser",
title = "Trajectory sampling for direct traffic observation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "280--292",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Labovitz:2001:DIR,
author = "Craig Labovitz and Abha Ahuja and Abhijit Bose and
Farnam Jahanian",
title = "Delayed {Internet} routing convergence",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "293--306",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akyildiz:2001:TPN,
author = "Ian F. Akyildiz and Giacomo Morabito and Sergio
Palazzo",
title = "{TCP-Peach}: a new congestion control scheme for
satellite {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "307--321",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chong:2001:SSS,
author = "Song Chong and Sangho Lee and Sungho Kang",
title = "A simple, scalable, and stable explicit rate
allocation algorithm for {MAX-MIN} flow control with
minimum rate guarantee",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "322--335",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wong:2001:SCP,
author = "Vincent W. S. Wong and Mark E. Lewis and Victor C. M.
Leung",
title = "Stochastic control of path optimization for
inter-switch handoffs in wireless {ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "336--350",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Siwko:2001:CAC,
author = "J. Siwko and I. Rubin",
title = "Connection admission control for capacity-varying
networks with stochastic capacity change times",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "351--360",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sun:2001:PBU,
author = "Hairong Sun and Xinyu Zang and Kishor S. Trivedi",
title = "Performance of broadcast and unknown server {(BUS)} in
{ATM LAN} emulation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "361--372",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pronk:2001:CCR,
author = "Verus Pronk and Jan Korst",
title = "Comments on {``Carry-over Round Robin: A Simple Cell
Scheduling Mechanism for ATM networks''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "3",
pages = "373--373",
month = jun,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 25 17:57:23 MST 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Saha:1998:CRR}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shakkottai:2001:TPE,
author = "Sanjay Shakkottai and Anurag Kumar and Aditya Karnik
and Ajit Anvekar",
title = "{TCP} performance over end-to-end rate control and
stochastic available capacity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "377--391",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Floyd:2001:DSI,
author = "Sally Floyd and Vern Paxson",
title = "Difficulties in simulating the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "392--403",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rodriguez:2001:AWC,
author = "Pablo Rodriguez and Christian Spanner and Ernst W.
Biersack",
title = "Analysis of {Web} caching architectures: hierarchical
and distributed caching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "404--418",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akyildiz:2001:AFS,
author = "Ian F. Akyildiz and Inwhee Joe and Henry Driver and
Yung-Lung Ho",
title = "An adaptive {FEC} scheme for data traffic in wireless
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "419--426",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Haas:2001:PQC,
author = "Zygmunt J. Haas and Marc R. Pearlman",
title = "The performance of query control schemes for the zone
routing protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "427--438",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sharon:2001:EPM,
author = "Oran Sharon and Eitan Altman",
title = "An efficient polling {MAC} for wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "439--451",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2001:NSU,
author = "Zhi-Ren Chang and I-Chung Lee and Cheng-Shang Chang
and Chien-Hsin Li and Ben-Li Sui",
title = "A novel scheme using the information of departure
processes for delay guarantees of distributed {VBR}
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "452--463",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Legout:2001:BAP,
author = "Arnaud Legout and J{\"o}rg Nonnenmacher and Ernst W.
Biersack",
title = "Bandwidth-allocation policies for unicast and
multicast flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "464--478",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bhatnagar:2001:OSF,
author = "Shalabh Bhatnagar and Michael C. Fu and Steven I.
Marcus and Pedram J. Fard",
title = "Optimal structured feedback policies for {ABR} flow
control using two-timescale {SPSA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "479--491",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mansour:2001:JCQ,
author = "Yishay Mansour and Boaz Patt-Shamir",
title = "Jitter control in {QoS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "492--502",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lang:2001:AOA,
author = "Jonathan P. Lang and Vishal Sharma and Emmanouel A.
Varvarigos",
title = "An analysis of oblivious and adaptive routing in
optical networks with wavelength translation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "503--517",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2001:EPC,
author = "Xiaojun Shen and Fan Yang and Yi Pan",
title = "Equivalent permutation capabilities between
time-division optical omega networks and non-optical
extra-stage omega networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "4",
pages = "518--524",
month = aug,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Francis:2001:IGI,
author = "Paul Francis and Sugih Jamin and Cheng Jin and Yixin
Jin and Danny Raz and Yuval Shavitt and Lixia Zhang",
title = "{IDMaps}: a global {Internet} host distance estimation
service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "525--540",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bonuccelli:2001:SRT,
author = "Maurizio A. Bonuccelli and M. Claudia Cl{\`o}",
title = "Scheduling of real-time messages in optical
broadcast-and-select networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "541--552",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mohan:2001:EAR,
author = "G. Mohan and C. Siva Ram Murthy and Arun K. Somani",
title = "Efficient algorithms for routing dependable
connections in {WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "553--566",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Banerjee:2001:PEQ,
author = "Ayan Banerjee and Ronald A. Iltis and Emmanouel A.
Varvarigos",
title = "Performance evaluation for a quasi-synchronous packet
radio network {(QSPNET)}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "567--577",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2001:JBD,
author = "Qiong Li and David L. Mills",
title = "Jitter-based delay-boundary prediction of wide-area
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "578--590",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bensaou:2001:CBF,
author = "Brahim Bensaou and Danny H. K. Tsang and King Tung
Chan",
title = "Credit-based fair queueing {(CBFQ)}: a simple
service-scheduling algorithm for packet-switched
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "591--604",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tabatabaee:2001:QPT,
author = "Vahid Tabatabaee and Leonidas Georgiadis and Leandros
Tassiulas",
title = "{QoS} provisioning and tracking fluid policies in
input queueing switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "605--617",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Beard:2001:PRA,
author = "Cory C. Beard and Victor S. Frost",
title = "Prioritized resource allocation for stressed
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "618--633",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2001:MHN,
author = "Sheng Ma and Chuanyi Ji",
title = "Modeling heterogeneous network traffic in wavelet
domain",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "634--649",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Katevenis:2001:WIC,
author = "Manolis G. H. Katevenis and Iakovos Mavroidis and
Georgios Sapountzis and Eva Kalyvianaki and Ioannis
Mavroidis and Georgios Glykopoulos",
title = "Wormhole {IP} over (connectionless) {ATM}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "650--661",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tham:2001:UAF,
author = "Yiu Kwok Tham",
title = "A unified algorithmic framework for variable-rate
{TDM} switching assignments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "662--668",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Thomopoulos:2001:LAT,
author = "Efstratios Thomopoulos and Louise E. Moser and Peter
M. Melliar-Smith",
title = "Latency analysis of the totem single-ring protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "5",
pages = "669--680",
month = oct,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:29 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gao:2001:SIR,
author = "Lixin Gao and Jennifer Rexford",
title = "Stable {Internet} routing without global
coordination",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "681--692",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Afek:2001:RC,
author = "Yehuda Afek and Anat Bremler-Barr and Sariel
Har-Peled",
title = "Routing with a clue",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "693--705",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Narvaez:2001:NDS,
author = "Paolo Narv{\'a}ez and Kai-Yeung Siu and Hong-Yi
Tzeng",
title = "New dynamic {SPT} algorithm based on a ball-and-string
model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "706--718",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{VanMieghem:2001:EM,
author = "Piet {Van Mieghem} and Gerard Hooghiemstra and Remco
van der Hofstad",
title = "On the efficiency of multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "719--732",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gao:2001:IAS,
author = "Lixin Gao",
title = "On inferring autonomous system relationships in the
{Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "733--745",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Su:2001:JTS,
author = "Weilian Su and Ian F. Akyildiz",
title = "The jitter time-stamp approach for clock recovery of
real-time variable bit-rate traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "746--754",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2001:LPC,
author = "Han S. Kim and Ness B. Shroff",
title = "Loss probability calculations and asymptotic analysis
for finite buffer multiplexers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "755--768",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rummukainen:2001:PCA,
author = "Hannu Rummukainen and Jorma Virtamo",
title = "Polynomial cost approximations in {Markov} decision
theory based call admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "769--779",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pillai:2001:DOC,
author = "R. Radhakrishna Pillai",
title = "A distributed overload control algorithm for
delay-bounded call setup",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "780--789",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiao:2001:DAC,
author = "Mingbo Xiao and Ness B. Shroff and Edwin K. P. Chong",
title = "Distributed admission control for power-controlled
cellular wireless systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "790--800",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leung:2001:APD,
author = "Matthew K. H. Leung and John C. S. Lui and David K. Y.
Yau",
title = "Adaptive proportional delay differentiated services:
characterization and performance evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "801--817",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Johari:2001:EEC,
author = "Ramesh Johari and David Kim Hong Tan",
title = "End-to-end congestion control for the {Internet}:
delays and stability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "818--832",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Begole:2001:RSR,
author = "James Begole and Randall B. Smith and Craig A. Struble
and Clifford A. Shaffer",
title = "Resource sharing for replicated synchronous
groupware",
journal = j-IEEE-TRANS-NETWORKING,
volume = "9",
number = "6",
pages = "833--843",
month = dec,
year = "2001",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Apr 11 08:34:30 MDT 2002",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ammar:2002:E,
author = "Mostafa H. Ammar",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "1--1",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nahum:2002:PIW,
author = "Erich Nahum and Tsipora Barzilai and Dilip D.
Kandlur",
title = "Performance issues in {WWW} servers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "2--11",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dovrolis:2002:PDS,
author = "Constantinos Dovrolis and Dimitrios Stiliadis and
Parameswaran Ramanathan",
title = "Proportional differentiated services: delay
differentiation and packet scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "12--26",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Reisslein:2002:FGS,
author = "Martin Reisslein and Keith W. Ross and Srinivas
Rajagopal",
title = "A framework for guaranteeing statistical {QoS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "27--42",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cobb:2002:PQS,
author = "Jorge Arturo Cobb",
title = "Preserving quality of service guarantees in spite of
flow aggregation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "43--53",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yan:2002:QAM,
author = "Shuqian Yan and Michalis Faloutsos and Anindo
Banerjea",
title = "{QoS-aware} multicast routing for the {Internet}: the
design and evaluation of {QoSMIC}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "54--66",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2002:SFC,
author = "Xi Zhang and Kang G. Shin and Debanjan Saha and Dilip
D. Kandlur",
title = "Scalable flow control for multicast {ABR} services in
{ATM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "67--85",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gau:2002:MFC,
author = "Rung-Hung Gau and Zygmunt J. Haas and Bhaskar
Krishnamachari",
title = "On multicast flow control for heterogeneous
receivers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "86--101",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lorenz:2002:OPQ,
author = "Dean H. Lorenz and Ariel Orda",
title = "Optimal partition of {QoS} requirements on unicast
paths and multicast trees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "102--114",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Meddeb:2002:IPM,
author = "Aref Meddeb and Andr{\'e} Girard and Catherine
Rosenberg",
title = "The impact of point-to-multipoint traffic
concentration on multirate networks design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "115--124",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mao:2002:LPA,
author = "Guoqiang Mao and Daryoush Habibi",
title = "Loss performance analysis for heterogeneous {{\sc
ON-OFF}} sources with application to connection
admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "125--138",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Varadarajan:2002:ESP,
author = "Srivatsan Varadarajan and Hung Q. Ngo and Jaideep
Srivastava",
title = "Error spreading: a perception-driven approach to
handling error in continuous media streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "139--152",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Medard:2002:GLB,
author = "Muriel M{\'e}dard and Richard A. Barry and Steven G.
Finn and Wenbo He and Steven S. Lumetta",
title = "Generalized loop-back recovery in optical mesh
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "1",
pages = "153--164",
month = feb,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rubenstein:2002:IML,
author = "Dan Rubenstein and Jim Kurose and Don Towsley",
title = "The impact of multicast layering on network fairness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "169--182",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ekici:2002:MRA,
author = "Eylem Ekici and Ian F. Akyildiz and Michael D.
Bender",
title = "A multicast routing algorithm for {LEO} satellite {IP}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "183--192",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Smith:2002:FSV,
author = "Mark A. Smith and K. K. Ramakrishnan",
title = "Formal specification and verification of safety and
performance of {TCP} selective acknowledgment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "193--207",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cao:2002:IPG,
author = "Xi-Ren Cao and Hong-Xia Shen and Rodolfo Milito and
Patrica Wirth",
title = "{Internet} pricing with a game theoretical approach:
concepts and examples",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "208--216",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Courcoubetis:2002:TES,
author = "Costas A. Courcoubetis and Antonis Dimakis and George
D. Stamoulis",
title = "Traffic equivalence and substitution in a multiplexer
with applications to dynamic available capacity
estimation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "217--231",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Griffin:2002:SPP,
author = "Timothy G. Griffin and F. Bruce Shepherd and Gordon
Wilfong",
title = "The stable paths problem and interdomain routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "232--243",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yuan:2002:HAM,
author = "Xin Yuan",
title = "Heuristic algorithms for multiconstrained
quality-of-service routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "244--256",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2002:DCA,
author = "Si Wu and K. Y. Michael Wong and Bo Li",
title = "A dynamic call admission policy with precision {QoS}
guarantee using stochastic control for mobile wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "257--271",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{La:2002:UBR,
author = "Richard J. La and Venkat Anantharam",
title = "Utility-based rate control in the {Internet} for
elastic traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "272--286",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Smiljanic:2002:FBA,
author = "Aleksandra Smiljani{\'c}",
title = "Flexible bandwidth allocation in high-capacity packet
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "2",
pages = "287--293",
month = apr,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:01 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Raman:2002:IIT,
author = "Suchitra Raman and Hari Balakrishnan and Murari
Srinivasan",
title = "{ITP}: an {Image Transport Protocol} for the
{Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "297--307",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gouda:2002:HIC,
author = "Mohamed G. Gouda and E. N. (Mootaz) Elnozahy and
Chin-Tser Huang and Tommy M. McGuire",
title = "Hop integrity in computer networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "308--319",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Massoulie:2002:BSO,
author = "Laurent Massouli{\'e} and James Roberts",
title = "Bandwidth sharing: objectives and algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "320--328",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{LeBoudec:2002:SPV,
author = "Jean-Yves {Le Boudec}",
title = "Some properties of variable length packet shapers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "329--337",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kalampoukas:2002:EWA,
author = "Lampros Kalampoukas and Anujan Varma and K. K.
Ramakrishnan",
title = "Explicit window adaptation: a method to enhance {TCP}
performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "338--350",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramamurthy:2002:FAR,
author = "Ramu Ramamurthy and Biswanath Mukherjee",
title = "Fixed-alternate routing and wavelength conversion in
wavelength-routed optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "351--367",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hahne:2002:DQL,
author = "Ellen L. Hahne and Abhijit K. Choudhury",
title = "Dynamic queue length thresholds for multiple loss
priorities",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "368--380",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rubenstein:2002:DSC,
author = "Dan Rubenstein and Jim Kurose and Don Towsley",
title = "Detecting shared congestion of flows via end-to-end
measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "381--395",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramjee:2002:HDB,
author = "Ramachandran Ramjee and Kannan Varadhan and Luca
Salgarelli and Sandra R. Thuel and Shie-Yuan Wang and
Thomas {La Porta}",
title = "{HAWAII}: a domain-based approach for supporting
mobility in wide-area wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "396--410",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akyildiz:2002:MNR,
author = "Ian F. Akyildiz and Eylem Ekici and Michael D.
Bender",
title = "{MLSR}: a novel routing algorithm for multilayered
satellite {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "411--424",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paschalidis:2002:PML,
author = "Ioannis Ch. Paschalidis and Yong Liu",
title = "Pricing in multiservice loss networks: static pricing,
asymptotic optimality, and demand substitution
effects",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "3",
pages = "425--438",
month = jun,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Psounis:2002:ERW,
author = "Konstantinos Psounis and Balaji Prabhakar",
title = "Efficient randomized web-cache replacement schemes
using samples from past eviction times",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "441--455",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rodriguez:2002:DPA,
author = "Pablo Rodriguez and Ernst W. Biersack",
title = "Dynamic parallel access to replicated content in the
{Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "455--465",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Brassil:2002:SIM,
author = "Jack Brassil and Henning Schulzrinne",
title = "Structuring {Internet} media streams with cueing
protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "466--476",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Grossglauser:2002:MIC,
author = "Matthias Grossglauser and David N. C. Tse",
title = "Mobility increases the capacity of ad hoc wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "477--486",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Uysal-Biyikoglu:2002:EEP,
author = "Elif Uysal-Biyikoglu and Balaji Prabhakar and Abbas
{El Gamal}",
title = "Energy-efficient packet transmission over a wireless
link",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "487--499",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chaintreau:2002:ITL,
author = "Augustin Chaintreau and Fran{\c{c}}ois Baccelli and
Christophe Diot",
title = "Impact of {TCP}-like congestion control on the
throughput of multicast groups",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "500--512",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Feng:2002:BAQ,
author = "Wu-chang Feng and Kang G. Shin and Dilip D. Kandlur
and Debanjan Saha",
title = "The {{\sc BLUE}} active queue management algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "513--528",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bennett:2002:DJB,
author = "Jon C. R. Bennett and Kent Benson and Anna Charny and
William F. Courtney and Jean-Yves {Le Boudec}",
title = "Delay jitter bounds and packet scale rate guarantee
for expedited forwarding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "529--540",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sobrinho:2002:AAQ,
author = "Jo{\~a}o Lu{\'\i}s Sobrinho",
title = "Algebra and algorithms for {QoS} path computation and
hop-by-hop routing in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "541--550",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Libman:2002:ORT,
author = "Lavy Libman and Ariel Orda",
title = "Optimal retrial and timeout strategies for accessing
network resources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "551--564",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kumar:2002:APV,
author = "Amit Kumar and Rajeev Rastogi and Avi Silberschatz and
Bulent Yener",
title = "Algorithms for provisioning virtual private networks
in the hose model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "565--578",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{dHalluin:2002:MCT,
author = "Yann d'Halluin and Peter A. Forsyth and Kenneth R.
Vetzal",
title = "Managing capacity for telecommunications networks
under uncertainty",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "4",
pages = "579--587",
month = aug,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:02 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jung:2002:DPE,
author = "Jaeyeon Jung and Emil Sit and Hari Balakrishnan and
Robert Morris",
title = "{DNS} performance and the effectiveness of caching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "589--603",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mitzenmacher:2002:CBF,
author = "Michael Mitzenmacher",
title = "Compressed bloom filters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "604--612",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Guerin:2002:CSP,
author = "Roch Gu{\'e}rin and Ariel Orda",
title = "Computing shortest paths for any number of hops",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "613--620",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Libeskind-Hadas:2002:MRW,
author = "Ran Libeskind-Hadas and Rami Melhem",
title = "Multicast routing and wavelength assignment in
multihop optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "621--629",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Antoniou:2002:EDC,
author = "Zoe Antoniou and Ioannis Stavrakakis",
title = "An efficient deadline-credit-based transport scheme
for prerecorded semisoft continuous media
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "630--643",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Blanchini:2002:RRC,
author = "Franco Blanchini and Renato {Lo Cigno} and Roberto
Tempo",
title = "Robust rate control for integrated services packet
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "644--652",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mneimneh:2002:SUP,
author = "Saad Mneimneh and Vishal Sharma and Kai-Yeung Siu",
title = "Switching using parallel input-output queued switches
with no speedup",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "653--665",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marsan:2002:PMS,
author = "Marco Ajmone Marsan and Andrea Bianco and Paolo
Giaccone and Emilio Leonardi and Fabio Neri",
title = "Packet-mode scheduling in input-queued cell-based
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "666--678",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffield:2002:RMH,
author = "N. G. Duffield and Pawan Goyal and Albert Greenberg
and Partho Mishra and K. K. Ramakrishnan and Jacobus E.
van der Merwe",
title = "Resource management with hoses: point-to-cloud
services for virtual private networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "679--692",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2002:SDA,
author = "Young Lee and James M. Tien",
title = "Static and dynamic approaches to modeling end-to-end
routing in circuit-switched networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "5",
pages = "693--705",
month = oct,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:03 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shannon:2002:BFO,
author = "Colleen Shannon and David Moore and K. C. Claffy",
title = "Beyond folklore: observations on fragmented traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "709--720",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Snoeren:2002:SPI,
author = "Alex C. Snoeren and Craig Partridge and Luis A.
Sanchez and Christine E. Jones and Fabrice Tchakountio
and Beverly Schwartz and Stephen T. Kent and W. Timothy
Strayer",
title = "Single-packet {IP} traceback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "721--734",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Markatos:2002:WCS,
author = "Evangelos P. Markatos and Dionisios N. Pnevmatikatos
and Michail D. Flouris and Manolis G. H. Katevenis",
title = "{Web}-conscious storage management for {Web} proxies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "735--748",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bejerano:2002:EHR,
author = "Yigal Bejerano and Israel Cidon and Joseph (Seffi)
Naor",
title = "Efficient handoff rerouting algorithms: a competitive
on-line algorithmic approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "749--760",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{LoPresti:2002:MBI,
author = "Francesco {Lo Presti} and N. G. Duffield and Joe
Horowitz and Don Towsley",
title = "Multicast-based inference of network-internal delay
distributions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "761--775",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2002:CMS,
author = "Chengzhi Li and Edward W. Knightly",
title = "Coordinated multihop scheduling: a framework for
end-to-end services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "776--789",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nelakuditi:2002:APR,
author = "Srihari Nelakuditi and Zhi Li Zhang and Rose P. Tsang
and David H. C. Du",
title = "Adaptive proportional routing: a localized {QoS}
routing approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "790--804",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2002:MST,
author = "Cheng Shang Chang and Rene L. Cruz and Jean Yves {Le
Boudec} and Patrick Thiran",
title = "A min,+ system theory for constrained traffic
regulation and dynamic service guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "805--817",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Georgiadis:2002:LOB,
author = "Leonidas Georgiadis and Panos Georgatsos and
Konstantinos Floros and Stelios Sartzetakis",
title = "Lexicographically optimal balanced networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "818--829",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Oki:2002:CRR,
author = "Eiji Oki and Zhigang Jing and Roberto Rojas-Cessa and
H. Jonathan Chao",
title = "Concurrent round-robin-based dispatching schemes for
{Clos}-network switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "10",
number = "6",
pages = "830--844",
month = dec,
year = "2002",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ammar:2003:E,
author = "Mostafa Ammar",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "1--1",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Intanagonwiwat:2003:DDW,
author = "Chalermek Intanagonwiwat and Ramesh Govindan and
Deborah Estrin and John Heidemann and Fabio Silva",
title = "Directed diffusion for wireless sensor networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "2--16",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Stoica:2003:CSP,
author = "Ion Stoica and Robert Morris and David Liben-Nowell
and David R. Karger and M. Frans Kaashoek and Frank
Dabek and Hari Balakrishnan",
title = "{Chord}: a scalable peer-to-peer lookup protocol for
{Internet} applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "17--32",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Stoica:2003:CSF,
author = "Ion Stoica and Scott Shenker and Hui Zhang",
title = "{{\em Core\/}}-stateless fair queueing: a scalable
architecture to approximate fair bandwidth allocations
in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "33--46",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lombardo:2003:PEA,
author = "Alfio Lombardo and Giovanni Schembra",
title = "Performance evaluation of an adaptive-rate {MPEG}
encoder matching intserv traffic constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "47--65",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Keon:2003:OPM,
author = "Neil J. Keon and G. Anandalingam",
title = "Optimal pricing for multiple services in
telecommunications networks offering quality-of-service
guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "66--80",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gummadi:2003:EPS,
author = "Krishna Phani Gummadi and Madhavarapu Jnana Pradeep
and C. Siva Ram Murthy",
title = "An efficient primary-segmented backup scheme for
dependable real-time communication in multihop
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "81--94",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{He:2003:ECA,
author = "Jiafu He and Khosrow Sohraby",
title = "An extended combinatorial analysis framework for
discrete-time queueing systems with general sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "95--110",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Srinivasan:2003:AFE,
author = "R. Srinivasan and Arun K. Somani",
title = "On achieving fairness and efficiency in high-speed
shared medium access",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "111--124",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2003:MSR,
author = "Qing Zhao and Lang Tong",
title = "A multiqueue service room {MAC} protocol for wireless
networks with multipacket reception",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "125--137",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Neely:2003:PAR,
author = "Michael J. Neely and Eytan Modiano and Charles E.
Rohrs",
title = "Power allocation and routing in multibeam satellites
with time-varying channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "138--152",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chalmers:2003:TMT,
author = "Robert C. Chalmers and Kevin C. Almeroth",
title = "On the topology of multicast trees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "153--165",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Auerbach:2003:MGM,
author = "Joshua Auerbach and Madan Gopal and Marc Kaplan and
Shay Kutten",
title = "Multicast group membership management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "1",
pages = "166--175",
month = feb,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:04 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rastogi:2003:OCO,
author = "Rajeev Rastogi and Yuri Breitbart and Minos
Garofalakis and Amit Kumar",
title = "Optimal configuration of {OSPF} aggregates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "181--194",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mahanti:2003:SDM,
author = "Anirban Mahanti and Derek L. Eager and Mary K. Vernon
and David J. Sundaram-Stukel",
title = "Scalable on-demand media streaming with packet loss
recovery",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "195--209",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiao:2003:UBP,
author = "Mingbo Xiao and Ness B. Shroff and Edwin K. P. Chong",
title = "A utility-based power-control scheme in wireless
cellular systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "210--221",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eun:2003:MAA,
author = "Do Young Eun and Ness B. Shroff",
title = "A measurement-analytic approach for {QoS} estimation
in a network based on the dominant time scale",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "222--235",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gencata:2003:VTA,
author = "Ayseg{\"u}l Gen{\c{c}}ata and Biswanath Mukherjee",
title = "Virtual-topology adaptation for {WDM} mesh networks
under dynamic traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "236--247",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zang:2003:PPR,
author = "Hui Zang and Canhui Ou and Biswanath Mukherjee",
title = "Path-protection routing and wavelength assignment
({RWA}) in {WDM} mesh networks under duct-layer
constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "248--258",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ozdaglar:2003:RWA,
author = "Asuman E. Ozdaglar and Dimitri P. Bertsekas",
title = "Routing and wavelength assignment in optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "259--272",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2003:RSH,
author = "Kayi Lee and Kai-Yeung Siu",
title = "On the reconfigurability of single-hub {WDM} ring
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "273--284",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhu:2003:NGG,
author = "Hongyue Zhu and Hui Zang and Keyao Zhu and Biswanath
Mukherjee",
title = "A novel generic graph model for traffic grooming in
heterogeneous {WDM} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "285--299",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dahlin:2003:EEW,
author = "Michael Dahlin and Bharat Baddepudi V. Chandra and Lei
Gao and Amol Nayate",
title = "End-to-end {WAN} service availability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "300--313",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Iyer:2003:APP,
author = "Sundar Iyer and Nick W. McKeown",
title = "Analysis of the parallel packet switch architecture",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "314--324",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chan:2003:SPG,
author = "Man Chi Chan and Tony T. Lee",
title = "Statistical performance guarantees in large-scale
cross-path packet switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "325--337",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karbowski:2003:CSF,
author = "Andrzej Karbowski",
title = "Comments on {``Optimization flow control, I: Basic
algorithm and convergence''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "2",
pages = "338--339",
month = apr,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Aug 7 14:11:05 MDT 2003",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Low:1999:OFC}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jin:2003:STF,
author = "Shudong Jin and Liang Guo and Ibrahim Matta and Azer
Bestavros",
title = "A spectrum of {TCP}-friendly window-based congestion
control algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "341--355",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Martin:2003:DBC,
author = "Jim Martin and Arne Nilsson and Injong Rhee",
title = "Delay-based congestion avoidance for {TCP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "356--369",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Anjum:2003:CSV,
author = "Farooq Anjum and Leandros Tassiulas",
title = "Comparative study of various {TCP} versions over a
wireless link with correlated losses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "370--383",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Korkmaz:2003:BDC,
author = "Turgay Korkmaz and Marwan Krunz",
title = "Bandwidth-delay constrained path selection under
inaccurate state information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "384--398",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2003:DRR,
author = "Murali Kodialam and T. V. Lakshman",
title = "Dynamic routing of restorable bandwidth-guaranteed
tunnels using aggregated network resource usage
information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "399--410",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Lau:2008:CDR}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Starobinski:2003:ANC,
author = "David Starobinski and Mark Karpovsky and Lev A.
Zakrevski",
title = "Application of network calculus to general topologies
using turn-prohibition",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "411--421",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fu:2003:SMR,
author = "Huirong Fu and Edward W. Knightly",
title = "A simple model of real-time flow aggregation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "422--435",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2003:DAF,
author = "Xi Zhang and Kang G. Shin",
title = "Delay analysis of feedback-synchronization signaling
for multicast flow control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "436--450",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baldi:2003:CRT,
author = "Mario Baldi and Yoram Ofek",
title = "A comparison of ring and tree embedding for real-time
group multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "451--464",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marsan:2003:MTI,
author = "Marco Ajmone Marsan and Andrea Bianco and Paolo
Giaccone and Emilio Leonardi and Fabio Neri",
title = "Multicast traffic in input-queued switches: optimal
scheduling and maximum throughput",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "465--477",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2003:PAM,
author = "Hakyong Kim and Kiseon Kim",
title = "Performance analysis of the multiple input-queued
packet switch with the restricted rule",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "478--487",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fu:2003:OEA,
author = "Alvin C. Fu and Eytan Modiano and John N. Tsitsiklis",
title = "Optimal energy allocation and admission control for
communications satellites",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "488--500",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fumagalli:2003:ODS,
author = "Andrea Fumagalli and Isabella Cerutti and Marco
Tacca",
title = "Optimal design of survivable mesh networks based on
line switched {WDM} self-healing rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "3",
pages = "501--512",
month = jun,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zegura:2003:Ea,
author = "Ellen W. Zegura",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "513--513",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Siganos:2003:PLL,
author = "Georgos Siganos and Michalis Faloutsos and Petros
Faloutsos and Christos Faloutsos",
title = "Power laws and the {AS}-level {Internet} topology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "514--524",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Low:2003:DMT,
author = "Steven H. Low",
title = "A duality model of {TCP} and queue management
algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "525--536",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jain:2003:EEA,
author = "Manish Jain and Constantinos Dovrolis",
title = "End-to-end available bandwidth: measurement
methodology, dynamics, and relation with {TCP}
throughput",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "537--549",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Grossglauser:2003:TSD,
author = "Matthias Grossglauser and David N. C. Tse",
title = "A time-scale decomposition approach to
measurement-based admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "550--563",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Loguinov:2003:EER,
author = "Dmitri Loguinov and Hayder Radha",
title = "End-to-end rate-based congestion control: convergence
properties and scalability analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "564--577",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Orda:2003:PSQ,
author = "Ariel Orda and Alexander Sprintson",
title = "Precomputation schemes for {QoS} routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "578--591",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chaskar:2003:FST,
author = "Hemant M. Chaskar and Upamanyu Madhow",
title = "Fair scheduling with tunable latency: a round-robin
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "592--601",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Daigle:2003:APN,
author = "John N. Daigle and Marcos Nascimento Magalh{\~a}es",
title = "Analysis of packet networks having contention-based
reservation with application to {GPRS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "602--615",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rojas-Cessa:2003:CFD,
author = "Roberto Rojas-Cessa and Eiji Oki and H. Jonathan
Chao",
title = "Concurrent fault detection for a multiple-plane packet
switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "616--627",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sichitiu:2003:EUT,
author = "Mihail L. Sichitiu and Peter H. Bauer and Kamal
Premaratne",
title = "The effect of uncertain time-variant delays in {ATM}
networks with explicit rate feedback: a control
theoretic approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "628--637",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sarkar:2003:MFL,
author = "Uttam K. Sarkar and Subramanian Ramakrishnan and Dilip
Sarkar",
title = "Modeling full-length video using {Markov}-modulated
{Gamma}-based framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "638--649",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sahni:2003:ECM,
author = "Sartaj Sahni and Kun Suk Kim",
title = "Efficient construction of multibit tries for {IP}
lookup",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "650--662",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gouda:2003:MRM,
author = "Mohamed G. Gouda and Marco Schneider",
title = "Maximizable routing metrics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "663--675",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2003:OMR,
author = "Murali Kodialam and T. V. Lakshman and Sudipta
Sengupta",
title = "Online multicast routing with bandwidth guarantees: a
new approach using multicast network flow",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "4",
pages = "676--686",
month = aug,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:07 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kunniyur:2003:EEC,
author = "Srisankar Kunniyur and R. Srikant",
title = "End-to-end congestion control schemes: utility
functions, random losses and {ECN} marks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "689--702",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cen:2003:EED,
author = "Song Cen and Pamela C. Cosman and Geoffrey M.
Voelker",
title = "End-to-end differentiation of congestion and wireless
losses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "703--717",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liang:2003:PDB,
author = "Ben Liang and Zygmunt J. Haas",
title = "Predictive distance-based mobility management for
multidimensional {PCS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "718--732",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marbach:2003:PSM,
author = "Peter Marbach",
title = "Priority service and max-min fairness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "733--746",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Markopoulou:2003:AQV,
author = "Athina P. Markopoulou and Fouad A. Tobagi and Mansour
J. Karam",
title = "Assessing the quality of voice communications over
{Internet} backbones",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "747--760",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2003:EDR,
author = "Guangzhi Li and Dongmei Wang and Charles Kalmanek and
Robert Doverspike",
title = "Efficient distributed restoration path selection for
shared mesh restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "761--771",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kar:2003:RRB,
author = "Koushik Kar and Murali Kodialam and T. V. Lakshman",
title = "Routing restorable bandwidth guaranteed connections
using maximum $2$-route flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "772--781",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koetter:2003:AAN,
author = "Ralf Koetter and Muriel M{\'e}dard",
title = "An algebraic approach to network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "782--795",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fecko:2003:TGF,
author = "Mariusz A. Fecko and M. {\"U}mit Uyar and Ali Y. Duale
and Paul D. Amer",
title = "A technique to generate feasible tests for
communications systems with multiple timers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "796--809",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{LeBoudec:2003:PSR,
author = "Jean-Yves {Le Boudec} and Anna Charny",
title = "Packet scale rate guarantee for non-{FIFO} nodes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "810--820",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Borst:2003:GPS,
author = "Sem Borst and Michel Mandjes and Miranda van Uitert",
title = "Generalized processor sharing with light-tailed and
heavy-tailed input",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "821--834",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Towles:2003:GSS,
author = "Brian Towles and William J. Dally",
title = "Guaranteed scheduling for switches with configuration
overhead",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "835--847",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Andrews:2003:ASN,
author = "Matthew Andrews and Lisa Zhang",
title = "Achieving stability in networks of input-queued
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "848--857",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mneimneh:2003:ATI,
author = "Saad Mneimneh and Kai-Yeung Siu",
title = "On achieving throughput in an input-queued switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "5",
pages = "858--867",
month = oct,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 3 17:35:08 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zegura:2003:Eb,
author = "Ellen Zegura",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "869--869",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duan:2003:SON,
author = "Zhenhai Duan and Zhi-Li Zhang and Yiwei Thomas Hou",
title = "Service overlay networks: {SLAs}, {QoS}, and bandwidth
provisioning",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "870--883",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gao:2003:PAT,
author = "Lixin Gao and Zhi-Li Zhang and Don Towsley",
title = "Proxy-assisted techniques for delivering continuous
multimedia streams",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "884--894",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bhattacharyya:2003:ERC,
author = "Supratik Bhattacharyya and James F. Kurose and Don
Towsley and Ramesh Nagarajan",
title = "Efficient rate-controlled bulk data transfer using
multiple multicast groups",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "895--907",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2003:PDS,
author = "X. Brian Zhang and Simon S. Lam and Dong-Young Lee and
Y. Richard Yang",
title = "Protocol design for scalable and reliable group
rekeying",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "908--922",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karol:2003:PDL,
author = "Mark Karol and S. Jamaloddin Golestani and David Lee",
title = "Prevention of deadlocks and livelocks in lossless
backpressured packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "923--934",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nayak:2003:DON,
author = "Tapan Kumar Nayak and Kumar N. Sivarajan",
title = "Dimensioning optical networks under traffic growth
models",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "935--947",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Heyman:2003:MMI,
author = "Daniel P. Heyman and David Lucantoni",
title = "Modeling multiple {IP} traffic streams with rate
limits",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "948--958",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sikdar:2003:AML,
author = "Biplab Sikdar and Shivkumar Kalyanaraman and Kenneth
S. Vastola",
title = "Analytic models for the latency and steady-state
throughput of {TCP Tahoe}, {Reno}, and {SACK}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "959--971",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shakkottai:2003:BTC,
author = "Sanjay Shakkottai and R. Srikant and Sean P. Meyn",
title = "Bounds on the throughput of congestion controllers in
the presence of feedback delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "972--981",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2003:BBC,
author = "Xiaohong Jiang and Hong Shen and Md. Mamun-ur-Rashid
Khandker and Susumu Horiguchi",
title = "Blocking behaviors of crosstalk-free optical {Banyan}
networks on vertical stacking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "982--993",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kong:2003:NSS,
author = "Peng-Yong Kong and Kee-Chaing Chua and Brahim
Bensaou",
title = "A novel scheduling scheme to share dropping ratio
while guaranteeing a delay bound in a {multiCode-CDMA}
network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "11",
number = "6",
pages = "994--1006",
month = dec,
year = "2003",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jan 28 17:11:35 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zegura:2004:E,
author = "Ellen Zegura",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "1--1",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Spring:2004:MIT,
author = "Neil Spring and Ratul Mahajan and David Wetherall and
Thomas Anderson",
title = "Measuring {ISP} topologies with rocketfuel",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "2--16",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lui:2004:RTA,
author = "King-Shan Lui and Klara Nahrstedt and Shigang Chen",
title = "Routing with topology aggregation in delay-bandwidth
sensitive networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "17--29",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zappala:2004:APR,
author = "Daniel Zappala",
title = "Alternate path routing for multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "30--43",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Helmy:2004:SMB,
author = "Ahmed Helmy and Sandeep Gupta and Deborah Estrin",
title = "The {STRESS} method for boundary-point performance
analysis of end-to-end multicast timer-suppression
mechanisms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "44--58",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jukan:2004:PSM,
author = "Admela Jukan and Gerald Franzl",
title = "Path selection methods with multiple constraints in
service-guaranteed {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "59--72",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ho:2004:RSC,
author = "Pin-Han Ho and Hussein T. Mouftah",
title = "Reconfiguration of spare capacity for {MPLS}-based
recovery in the {Internet} backbone networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "73--84",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gambiroza:2004:DAI,
author = "Violeta Gambiroza and Ping Yuan and Laura Balzano and
Yonghe Liu and Steve Sheafor and Edward Knightly",
title = "Design, analysis, and implementation of {DVSR}: a fair
high-performance protocol for packet rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "85--102",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2004:WBT,
author = "Xudong Wang",
title = "Wide-band {TD-CDMA MAC} with minimum-power allocation
and rate- and {BER}-scheduling for wireless multimedia
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "103--116",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gau:2004:CSM,
author = "Rung-Hung Gau and Zygmunt J. Haas",
title = "Concurrent search of mobile users in cellular
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "117--130",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2004:MPE,
author = "Wei Li and Xiuli Chao",
title = "Modeling and performance evaluation of a cellular
mobile network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "131--145",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mao:2004:DDA,
author = "Zuji Mao and Christos Douligeris",
title = "A distributed database architecture for global roaming
in next-generation mobile networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "146--160",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qiu:2004:PFC,
author = "Dongyu Qiu and Ness B. Shroff",
title = "A predictive flow control scheme for efficient network
utilization and {QoS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "161--172",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Albuquerque:2004:NBP,
author = "C{\'e}lio Albuquerque and Brett J. Vickers and Tatsuya
Suda",
title = "Network border patrol: preventing congestion collapse
and promoting fairness in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "173--186",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2004:PAH,
author = "Ben-Jye Chang and Ren-Hung Hwang",
title = "Performance analysis for hierarchical multirate loss
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "1",
pages = "187--199",
month = feb,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Stoica:2004:III,
author = "Ion Stoica and Daniel Adkins and Shelley Zhuang and
Scott Shenker and Sonesh Surana",
title = "{Internet} indirection infrastructure",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "205--218",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sen:2004:APP,
author = "Subhabrata Sen and Jia Wang",
title = "Analyzing peer-to-peer traffic across large networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "219--232",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Challenger:2004:ESD,
author = "James R. Challenger and Paul Dantzig and Arun Iyengar
and Mark S. Squillante and Li Zhang",
title = "Efficiently serving dynamic data at highly accessed
{Web} sites",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "233--246",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lety:2004:SSC,
author = "Emmanuel L{\'e}ty and Thierry Turletti and
Fran{\c{c}}ois Baccelli",
title = "{SCORE}: a scalable communication protocol for
large-scale virtual environments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "247--260",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Watson:2004:PSN,
author = "David Watson and Matthew Smart and G. Robert Malan and
Farnam Jahanian",
title = "Protocol scrubbing: network security through
transparent flow modification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "261--273",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deb:2004:CCF,
author = "Supratim Deb and R. Srikant",
title = "Congestion control for fair resource allocation in
networks with multicast flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "274--285",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kunniyur:2004:AVQ,
author = "Srisankar S. Kunniyur and R. Srikant",
title = "An adaptive virtual queue ({AVQ}) algorithm for active
queue management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "286--299",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Garetto:2004:CQN,
author = "Michele Garetto and Renato {Lo Cigno} and Michela Meo
and Marco Ajmone Marsan",
title = "Closed queueing network models of interacting
long-lived {TCP} flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "300--311",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marbach:2004:ASP,
author = "Peter Marbach",
title = "Analysis of a static pricing scheme for priority
services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "312--325",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2004:PAD,
author = "Shengquan Wang and Dong Xuan and Riccardo Bettati and
Wei Zhao",
title = "Providing absolute differentiated services for
real-time applications in static-priority scheduling
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "326--339",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Charikar:2004:ROQ,
author = "Moses Charikar and Joseph Naor and Baruch Schieber",
title = "Resource optimization in {QoS} multicast routing of
real-time multimedia",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "340--348",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2004:EBN,
author = "Shanchieh Jay Yang and Gustavo {De Veciana}",
title = "Enhancing both network and user performance for
networks supporting best effort traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "349--360",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2004:FPA,
author = "Mingyan Liu and John S. Baras",
title = "Fixed point approximation for multirate multihop loss
networks with state-dependent routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "361--374",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hartline:2004:OVT,
author = "Jeff R. K. Hartline and Ran Libeskind-Hadas and Kurt
M. Dresner and Ethan W. Drucker and Katrina J. Ray",
title = "Optimal virtual topologies for one-to-many
communication in {WDM} paths and rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "375--383",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sridharan:2004:BAO,
author = "Ashwin Sridharan and Kumar N. Sivarajan",
title = "Blocking in all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "2",
pages = "384--397",
month = apr,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Breitbart:2004:TDH,
author = "Yuri Breitbart and Minos Garofalakis and Ben Jai and
Cliff Martin and Rajeev Rastogi and Avi Silberschatz",
title = "Topology discovery in heterogeneous {IP} networks: the
{{\em NetInventory\/}} system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "401--414",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lagoa:2004:ACA,
author = "Constantino M. Lagoa and Hao Che and Bernardo A.
Movsichoff",
title = "Adaptive control algorithms for decentralized optimal
traffic engineering in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "415--428",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liao:2004:DCP,
author = "Raymond R.-F. Liao and Andrew T. Campbell",
title = "Dynamic core provisioning for quantitative
differentiated services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "429--442",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lombardo:2004:NAF,
author = "Alfio Lombardo and Giacomo Morabito and Giovanni
Schembra",
title = "A novel analytical framework compounding statistical
traffic modeling and aggregate-level service curve
disciplines: network performance and efficiency
implications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "443--455",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Papadopoulos:2004:LWM,
author = "Christos Papadopoulos and Guru Parulkar and George
Varghese",
title = "Light-weight multicast services ({LMS}): a
router-assisted scheme for reliable multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "456--468",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Radoslavov:2004:CAL,
author = "Pavlin Radoslavov and Christos Papadopoulos and Ramesh
Govindan and Deborah Estrin",
title = "A comparison of application-level and router-assisted
hierarchical schemes for reliable multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "469--482",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Raz:2004:DCE,
author = "Danny Raz and Yuval Shavitt and Lixia Zhang",
title = "Distributed council election",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "483--492",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ye:2004:MAC,
author = "Wei Ye and John Heidemann and Deborah Estrin",
title = "Medium access control with coordinated adaptive
sleeping for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "493--506",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wan:2004:MPM,
author = "Peng-Jun Wan and Gruia C{\~a}linescu and Chih-Wei Yi",
title = "Minimum-power multicast routing in static ad hoc
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "507--514",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xie:2004:SSA,
author = "Feng Xie and Joseph L. Hammond and Daniel L.
Noneaker",
title = "Steady-state analysis of a split-connection scheme for
{Internet} access through a wireless terminal",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "515--525",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qin:2004:MCC,
author = "Xiangdong Qin and Yuanyuan Yang",
title = "Multicast connection capacity of {WDM} switching
networks with limited wavelength conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "526--538",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chow:2004:FOL,
author = "Timothy Y. Chow and Fabian Chudak and Anthony M.
Ffrench",
title = "Fast optical layer mesh protection using
pre-cross-connected trails",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "539--548",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2004:DBM,
author = "C. Y. Li and P. K. A. Wai and Victor O. K. Li",
title = "The decomposition of a blocking model for
connection-oriented networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "549--558",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tseng:2004:SCT,
author = "Yu-Chee Tseng and Yu-Chi Chueh and Jang-Ping Sheu",
title = "Seamless channel transition for the staircase video
broadcasting scheme",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "559--571",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gong:2004:CDW,
author = "Yongtao Gong and Peiyuan Lee and Wanyi Gu",
title = "Comments on {``Dynamic wavelength routing using
congestion and neighborhood information''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "3",
pages = "572--572",
month = jun,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 10 09:53:35 MDT 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Li:1999:DWR}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gurbani:2004:TTS,
author = "Vijay K. Gurbani and Xian-He Sun",
title = "Terminating telephony services on the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "571--581",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jamjoom:2004:RCB,
author = "Hani Jamjoom and Padmanabhan Pillai and Kang G. Shin",
title = "Resynchronization and controllability of bursty
service requests",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "582--594",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Samar:2004:IZR,
author = "Prince Samar and Marc R. Pearlman and Zygmunt J.
Haas",
title = "Independent zone routing: an adaptive hybrid routing
framework for ad hoc wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "595--608",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2004:MLR,
author = "Jae-Hwan Chang and Leandros Tassiulas",
title = "Maximum lifetime routing in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "609--619",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vlajic:2004:PAD,
author = "Natalija Vlajic and Charalambos D. Charalambous and
Dimitrios Makrakis",
title = "Performance aspects of data broadcast in wireless
networks with user retrials",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "620--633",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akan:2004:AAR,
author = "{\"O}zg{\"u}r B. Akan and Ian F. Akyildiz",
title = "{ARC}: the analytical rate control scheme for
real-time traffic in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "634--644",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tham:2004:SSS,
author = "Yiu Kwok Tham",
title = "Scheduling satellite-switched time-division multiple
access with general switching modes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "645--652",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sun:2004:SMK,
author = "Yan Sun and Wade Trappe and K. J. Ray Liu",
title = "A scalable multicast key management scheme for
heterogeneous wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "653--666",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2004:MCM,
author = "Xi Zhang and Kang G. Shin",
title = "{Markov}-chain modeling for multicast signaling delay
analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "667--680",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lenzini:2004:TBL,
author = "Luciano Lenzini and Enzo Mingozzi and Giovanni Stea",
title = "Tradeoffs between low complexity, low latency, and
fairness with deficit round-robin schedulers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "681--693",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tang:2004:UCT,
author = "Ao Tang and Jiantao Wang and Steven H. Low",
title = "Understanding {CHOKe}: throughput and spatial
characteristics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "694--707",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2004:MEP,
author = "Zhili Zhao and Swaroop Darbha and A. L. Narasimha
Reddy",
title = "A method for estimating the proportion of
nonresponsive traffic at a router",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "708--718",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aweya:2004:DSA,
author = "James Aweya and Michel Ouellette and Delfin Y.
Montuno",
title = "Design and stability analysis of a rate control
algorithm using the {Routh--Hurwitz} stability
criterion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "719--732",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{deOliveira:2004:NPP,
author = "Jaudelice C. de Oliveira and Caterina Scoglio and Ian
F. Akyildiz and George Uhl",
title = "New preemption policies for {DiffServ}-aware traffic
engineering to minimize rerouting in {MPLS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "733--745",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Levy:2004:DAR,
author = "Hanoch Levy and Tsippy Mendelson and Gilad Goren",
title = "Dynamic allocation of resources to virtual path
agents",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "746--758",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Andrew:2004:FSW,
author = "Lachlan L. H. Andrew",
title = "Fast simulation of wavelength continuous {WDM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "4",
pages = "759--765",
month = aug,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:57 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Byers:2004:ICD,
author = "John W. Byers and Jeffrey Considine and Michael
Mitzenmacher and Stanislav Rost",
title = "Informed content delivery across adaptive overlay
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "767--780",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cherkasova:2004:AEM,
author = "Ludmila Cherkasova and Minaxi Gupta",
title = "Analysis of enterprise media server workloads: access
patterns, locality, content evolution, and rates of
change",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "781--794",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sarac:2004:TSM,
author = "Kamil Sarac and Kevin C. Almeroth",
title = "{Tracetree}: a scalable mechanism to discover
multicast tree topologies in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "795--808",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Steinder:2004:PFL,
author = "Ma{\l}gorzata Steinder and Adarshpal S. Sethi",
title = "Probabilistic fault localization in communication
systems using belief networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "809--822",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hao:2004:ISI,
author = "Ruibing Hao and David Lee and Rakesh K. Sinha and
Nancy Griffeth",
title = "Integrated system interoperability testing with
applications to {VoIP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "823--836",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Varsamopoulos:2004:DAR,
author = "Georgios Varsamopoulos and Sandeep K. S. Gupta",
title = "Dynamically adapting registration areas to user
mobility and call patterns for efficient location
management in {PCS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "837--850",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{VanMieghem:2004:CEQ,
author = "Piet {Van Mieghem} and Fernando A. Kuipers",
title = "Concepts of exact {QoS} routing algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "851--864",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Panagakis:2004:OCA,
author = "Antonis Panagakis and Nandita Dukkipati and Ioannis
Stavrakakis and Joy Kuri",
title = "Optimal call admission control on a single link with a
{GPS} scheduler",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "865--878",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Znati:2004:NDA,
author = "Taieb F. Znati and Rami Melhem",
title = "Node delay assignment strategies to support end-to-end
delay requirements in heterogeneous networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "879--892",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cavendish:2004:CTA,
author = "Dirceu Cavendish and Mario Gerla and Saverio Mascolo",
title = "A control theoretical approach to congestion control
in packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "893--906",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paschalidis:2004:ISE,
author = "Ioannis Ch. Paschalidis and Spyridon Vassilaras",
title = "Importance sampling for the estimation of buffer
overflow probabilities via trace-driven simulations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "907--919",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bouillet:2004:DCS,
author = "Eric Bouillet and Jean-Fran{\c{c}}ois Labourdette",
title = "Distributed computation of shared backup path in mesh
optical networks using probabilistic methods",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "920--930",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramasubramanian:2004:AON,
author = "Srinivasan Ramasubramanian and Arun K. Somani",
title = "Analysis of optical networks with heterogeneous
grooming architectures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "931--943",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Somani:2004:TWF,
author = "Arun K. Somani and Mani Mina and Ling Li",
title = "On trading wavelengths with fibers: a cost-performance
based study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "944--951",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2004:BST,
author = "Cheng-Shang Chang and Zhen Liu",
title = "A bandwidth sharing theory for a large number of
{HTTP}-like connections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "5",
pages = "952--962",
month = oct,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Dec 1 19:04:58 MST 2004",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dovrolis:2004:PDT,
author = "Constantinos Dovrolis and Parameswaran Ramanathan and
David Moore",
title = "Packet-dispersion techniques and a capacity-estimation
methodology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "963--977",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffield:2004:NTM,
author = "N. G. Duffield and Francesco {Lo Presti}",
title = "Network tomography from measured end-to-end delay
covariance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "978--992",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shavitt:2004:BBS,
author = "Yuval Shavitt and Tomer Tankel",
title = "Big-bang simulation for embedding network distances in
{Euclidean} space",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "993--1006",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rabinovich:2004:DEC,
author = "Michael Rabinovich and Hua Wang",
title = "{DHTTP}: an efficient and cache-friendly transfer
protocol for the {Web}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1007--1020",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akyildiz:2004:PUM,
author = "Ian F. Akyildiz and Wenye Wang",
title = "The predictive user mobility profile framework for
wireless multimedia networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1021--1035",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2004:HSS,
author = "Hsiao-Hwa Chen and Wee-Teck Tea",
title = "Hierarchy schedule-sensing protocol for {CDMA}
wireless data-centric networks with multiple packet
collision and capture effect",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1036--1048",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2004:UUR,
author = "Haiyun Luo and Jiejun Kong and Petros Zerfos and
Songwu Lu and Lixia Zhang",
title = "{URSA}: ubiquitous and robust access control for
mobile ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1049--1063",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bejerano:2004:EIM,
author = "Yigal Bejerano",
title = "Efficient integration of multihop wireless and wired
networks with {QoS} constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1064--1078",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ranjan:2004:NIT,
author = "Priya Ranjan and Eyad H. Abed and Richard J. La",
title = "Nonlinear instabilities in {TCP-RED}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1079--1092",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jordan:2004:VOB,
author = "Scott Jordan and Kalpana Jogi and Chunlin Shi and
Ikhlaq Sidhu",
title = "The variation of optimal bandwidth and buffer
allocation with the number of sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1093--1104",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ho:2004:SSP,
author = "Pin-Han Ho and J{\'a}nos Tapolcai and Tibor Cinkler",
title = "Segment shared protection in mesh communications
networks with bandwidth guaranteed tunnels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1105--1118",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments \cite{Luo:2007:CSS}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Choi:2004:LRD,
author = "Hongsik Choi and Suresh Subramaniam and Hyeong-Ah
Choi",
title = "Loopback recovery from double-link failures in optical
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1119--1130",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marsan:2004:UIP,
author = "Marco Ajmone Marsan and Mirko Franceschinis and Emilio
Leonardi and Fabio Neri and Alessandro Tarello",
title = "Underload instabilities in packet networks with flow
schedulers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1131--1143",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Guo:2004:STC,
author = "Chuanxiong Guo",
title = "{SRR}: an {$ O(1) $} time-complexity packet scheduler
for flows in multiservice packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1144--1155",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{delAngel:2004:OPR,
author = "Guillermo del Angel and Terrence L. Fine",
title = "Optimal power and retransmission control policies for
random access systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "12",
number = "6",
pages = "1156--1166",
month = dec,
year = "2004",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zegura:2005:Ea,
author = "Ellen W. Zegura",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "1--1",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baboescu:2005:SPC,
author = "Florin Baboescu and George Varghese",
title = "Scalable packet classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "2--14",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2005:FTB,
author = "Jun Xu and Richard J. Lipton",
title = "On fundamental tradeoffs between delay bounds and
computational complexity in packet scheduling
algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "15--28",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yau:2005:DAD,
author = "David K. Y. Yau and John C. S. Lui and Feng Liang and
Yeung Yam",
title = "Defending against distributed denial-of-service
attacks with max-min fair server-centric router
throttles",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "29--42",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paganini:2005:CCH,
author = "Fernando Paganini and Zhikui Wang and John C. Doyle
and Steven H. Low",
title = "Congestion control for high performance, stability,
and fairness in general networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "43--56",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qiu:2005:QPF,
author = "Dongyu Qiu and Ness B. Shroff",
title = "Queueing properties of feedback flow control systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "57--68",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xia:2005:ABC,
author = "Yong Xia and David Harrison and Shivkumar Kalyanaraman
and Kishore Ramachandran and Arvind Venkatesan",
title = "Accumulation-based congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "69--80",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lakshmikantha:2005:RRV,
author = "Ashvin Lakshmikantha and Carolyn L. Beck and R.
Srikant",
title = "Robustness of real and virtual queue-based active
queue management schemes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "81--93",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pitsillides:2005:ANC,
author = "Andreas Pitsillides and Petros Ioannou and Marios
Lestas and Loukas Rossides",
title = "Adaptive nonlinear congestion controller for a
differentiated-services framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "94--107",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karnik:2005:PTC,
author = "Aditya Karnik and Anurag Kumar",
title = "Performance of {TCP} congestion control with explicit
rate feedback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "108--120",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sarkar:2005:FDC,
author = "Saswati Sarkar and Leandros Tassiulas",
title = "Fair distributed congestion control in multirate
multicast networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "121--133",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Trappe:2005:RAC,
author = "Wade Trappe and Yuke Wang and K. J. Ray Liu",
title = "Resource-aware conference key establishment for
heterogeneous networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "134--146",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2005:CBD,
author = "Li Li and Joseph Y. Halpern and Paramvir Bahl and
Yi-Min Wang and Roger Wattenhofer",
title = "A cone-based distributed topology-control algorithm
for wireless multi-hop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "147--159",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2005:SNM,
author = "Guanglei Liu and Chuanyi Ji and Vincent W. S. Chan",
title = "On the scalability of network management information
for inter-domain light-path assessment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "160--172",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2005:ERW,
author = "Li-Wei Chen and Eytan Modiano",
title = "Efficient routing and wavelength assignment for
reconfigurable {WDM} ring networks with wavelength
converters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "173--186",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lu:2005:ABP,
author = "Kejie Lu and Gaoxi Xiao and Imrich Chlamtac",
title = "Analysis of blocking probability for distributed
lightpath establishment in {WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "187--197",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2005:AOS,
author = "Yu Liu and David Tipper and Peerapon
Siripongwutikorn",
title = "Approximating optimal spare capacity allocation by
successive survivable routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "1",
pages = "198--211",
month = feb,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Apr 12 07:15:18 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mitra:2005:STE,
author = "Debasis Mitra and Qiong Wang",
title = "Stochastic traffic engineering for demand uncertainty
and risk-aware network revenue management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "221--233",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sridharan:2005:ANO,
author = "Ashwin Sridharan and Roch Gu{\'e}rin and Christophe
Diot",
title = "Achieving near-optimal traffic engineering solutions
for current {OSPF\slash IS-IS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "234--247",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kerivin:2005:DCS,
author = "Herv{\'e} Kerivin and Dritan Nace and Thi-Tuyet-Loan
Pham",
title = "Design of capacitated survivable networks with a
single facility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "248--261",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ascia:2005:EMS,
author = "Giuseppe Ascia and Vincenzo Catania and Daniela
Panno",
title = "An evolutionary management scheme in high-performance
packet switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "262--275",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2005:SCP,
author = "Chengzhi Li and Edward W. Knightly",
title = "Schedulability criterion and performance analysis of
coordinated schedulers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "276--287",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Younis:2005:FSL,
author = "Ossama Younis and Sonia Fahmy",
title = "{FlowMate}: scalable on-line flow clustering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "288--301",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deb:2005:RAB,
author = "Supratim Deb and Ayalvadi Ganesh and Peter Key",
title = "Resource allocation between persistent and transient
flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "302--315",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mellia:2005:TSF,
author = "Marco Mellia and Michela Meo and Claudio Casetti",
title = "{TCP} smart framing: a segmentation algorithm to
reduce {TCP} latency",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "316--329",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sastry:2005:CTW,
author = "Nishanth R. Sastry and Simon S. Lam",
title = "{CYRF}: a theory of window-based unicast congestion
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "330--342",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kwak:2005:PAE,
author = "Byung-Jae Kwak and Nah-Oak Song and Leonard E.
Miller",
title = "Performance analysis of exponential backoff",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "343--355",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altman:2005:SMT,
author = "Eitan Altman and Konstantin Avrachenkov and Chadi
Barakat",
title = "A stochastic model of {TCP\slash IP} with stationary
random losses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "356--369",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2005:IQV,
author = "Ying Xu and Roch Gu{\'e}rin",
title = "Individual {QoS} versus aggregate {QoS}: a loss
performance study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "370--383",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Su:2005:TDS,
author = "Weilian Su and Ian F. Akyildiz",
title = "Time-diffusion synchronization protocol for wireless
sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "384--397",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Park:2005:OTL,
author = "Taejoon Park and Kang G. Shin",
title = "Optimal tradeoffs for location-based routing in
large-scale ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "398--410",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eryilmaz:2005:SSP,
author = "Atilla Eryilmaz and R. Srikant and James R. Perkins",
title = "Stable scheduling policies for fading wireless
channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "411--424",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dousse:2005:IIC,
author = "Olivier Dousse and Fran{\c{c}}ois Baccelli and Patrick
Thiran",
title = "Impact of interferences on connectivity in ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "425--436",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bouillet:2005:LRO,
author = "Eric Bouillet and Jean-Fran{\c{c}}ois Labourdette and
Ramu Ramamurthy and Sid Chaudhuri",
title = "Lightpath re-optimization in mesh optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "437--447",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dasylva:2005:OOC,
author = "Abel Dasylva and Delfin Y. Montuno and Prasad
Kodaypak",
title = "Optimization of optical cross-connects with
wave-mixing conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "2",
pages = "448--458",
month = apr,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zegura:2005:Eb,
author = "Ellen W. Zegura",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "461--461",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Clark:2005:TCD,
author = "David D. Clark and John Wroclawski and Karen R.
Sollins and Robert Braden",
title = "Tussle in cyberspace: defining tomorrow's {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "462--475",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ko:2005:DSS,
author = "Bong-Jun Ko and Dan Rubenstein",
title = "Distributed self-stabilizing placement of replicated
resources in emerging networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "476--487",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Feng:2005:TCP,
author = "Wu-chang Feng and Francis Chang and Wu-chi Feng and
Jonathan Walpole",
title = "A traffic characterization of popular on-line games",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "488--500",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rubenstein:2005:CUP,
author = "Dan Rubenstein and Sambit Sahu",
title = "Can unstructured {P2P} protocols survive flash
crowds?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "501--512",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lim:2005:CIC,
author = "Hyuk Lim and Jennifer C. Hou and Chong-Ho Choi",
title = "Constructing {Internet} coordinate system based on
delay measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "513--525",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eun:2005:NDT,
author = "Do Young Eun and Ness B. Shroff",
title = "Network decomposition: theory and practice",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "526--539",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yousefizadeh:2005:LMM,
author = "Homayoun Yousefi'zadeh and Hamid Jafarkhani and Amir
Habibi",
title = "Layered media multicast control {(LMMC)}: rate
allocation and partitioning",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "540--553",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akyildiz:2005:RCS,
author = "Ian F. Akyildiz and {\"O}zg{\"u}r B. Akan and Giacomo
Morabito",
title = "A rate control scheme for adaptive real-time
applications in {IP} networks with lossy links and long
round trip times",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "554--567",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vojnovic:2005:LRB,
author = "Milan Vojnovi{\'c} and Jean-Yves {Le Boudec}",
title = "On the long-run behavior of equation-based rate
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "568--581",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2005:CLO,
author = "Jiantao Wang and Lun Li and Steven H. Low and John C.
Doyle",
title = "Cross-layer optimization in {TCP\slash IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "582--595",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Biaz:2005:RCL,
author = "Sa{\^a}d Biaz and Nitin H. Vaidya",
title = "{``De-randomizing''} congestion losses to improve
{TCP} performance over wired-wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "596--608",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2005:NSC,
author = "Hongyi Wu and Chong Wang and Nian-Feng Tzeng",
title = "Novel self-configurable positioning technique for
multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "609--621",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kabamba:2005:RAR,
author = "Pierre T. Kabamba and Semyon M. Meerkov and Choon Yik
Tang",
title = "Ranking and adaptive ranking {CDMA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "622--635",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Borst:2005:ULP,
author = "Sem Borst",
title = "User-level performance of channel-aware scheduling
algorithms in wireless data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "636--647",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bejerano:2005:ACQ,
author = "Yigal Bejerano and Yuri Breitbart and Ariel Orda and
Rajeev Rastogi and Alexander Sprintson",
title = "Algorithms for computing {QoS} paths with
restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "648--661",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chakrabarti:2005:RCR,
author = "Anirban Chakrabarti and G. Manimaran",
title = "Reliability constrained routing in {QoS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "662--675",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yu:2005:QPG,
author = "Xiang Yu and Ian Li-Jin Thng and Yuming Jiang and
Chunming Qiao",
title = "Queueing processes in {GPS} and {PGPS} with {LRD}
traffic inputs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "676--689",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Basu:2005:FIU,
author = "Anindya Basu and Girija Narlikar",
title = "Fast incremental updates for pipelined forwarding
engines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "690--703",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chu:2005:DRW,
author = "Xiaowen Chu and Bo Li",
title = "Dynamic routing and wavelength assignment in the
presence of wavelength conversion for all-optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "3",
pages = "704--715",
month = jun,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kuipers:2005:CIC,
author = "Fernando A. Kuipers and Piet F. A. {Van Mieghem}",
title = "Conditions that impact the complexity of {QoS}
routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "717--730",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Maxemchuk:2005:QMT,
author = "Nicholas F. Maxemchuk and Iradj Ouveysi and Moshe
Zukerman",
title = "A quantitative measure for telecommunications networks
topology design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "731--742",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chait:2005:TDU,
author = "Yossi Chait and C. V. Hollot and Vishal Misra and Don
Towsley and Honggang Zhang and Yong Cui",
title = "Throughput differentiation using coloring at the
network edge and preferential marking at the core",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "743--754",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Taylor:2005:RHC,
author = "David E. Taylor and Andreas Herkersdorf and Andreas
D{\"o}ring and Gero Dittmann",
title = "Robust header compression {(ROHC)} in next-generation
network processors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "755--768",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akhbarizadeh:2005:HBI,
author = "Mohammad J. Akhbarizadeh and Mehrdad Nourani",
title = "Hardware-based {IP} routing using partitioned lookup
table",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "769--781",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ganjali:2005:CSV,
author = "Yashar Ganjali and Abtin Keshavarzian and Devavrat
Shah",
title = "Cell switching versus packet switching in input-queued
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "782--789",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shi:2005:LBP,
author = "Weiguang Shi and M. H. MacGregor and Pawel
Gburzynski",
title = "Load balancing for parallel forwarding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "790--801",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sangireddy:2005:SME,
author = "Rama Sangireddy and Natsuhiko Futamura and Srinivas
Aluru and Arun K. Somani",
title = "Scalable, memory efficient, high-speed {IP} lookup
algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "802--812",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2005:SND,
author = "Xiaojun Lin and Ness B. Shroff",
title = "Simplification of network dynamics in large systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "813--826",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2005:NCO,
author = "Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff",
title = "Non-convex optimization and rate control for
multi-class services in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "827--840",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baccelli:2005:ITF,
author = "Fran{\c{c}}ois Baccelli and Dohy Hong",
title = "Interaction of {TCP} flows as billiards",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "841--853",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2005:DPA,
author = "Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff",
title = "Downlink power allocation for multi-class wireless
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "854--867",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2005:CAR,
author = "Murali Kodialam and Thyaga Nandagopal",
title = "Characterizing achievable rates in multi-hop wireless
mesh networks with orthogonal channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "868--880",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sinha:2005:ITA,
author = "Sushant Sinha and C. Siva Ram Murthy",
title = "Information theoretic approach to traffic adaptive
{WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "881--894",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Saengudomlert:2005:DWA,
author = "Poompat Saengudomlert and Eytan H. Modiano and Robert
G. Gallager",
title = "Dynamic wavelength assignment for {WDM} all-optical
tree networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "895--905",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Labourdette:2005:FAD,
author = "Jean-Fran{\c{c}}ois Labourdette and Eric Bouillet and
Ramu Ramamurthy and Ahmet A. Akyama{\c{c}}",
title = "Fast approximate dimensioning and performance analysis
of mesh optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "906--917",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2005:SRL,
author = "Lu Shen and Xi Yang and Byrav Ramamurthy",
title = "Shared risk link group {(SRLG)-diverse} path
provisioning under hybrid service level agreements in
wavelength-routed optical mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "4",
pages = "918--931",
month = aug,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 5 06:43:22 MDT 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffield:2005:EFD,
author = "Nick Duffield and Carsten Lund and Mikkel Thorup",
title = "Estimating flow distributions from sampled flow
statistics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "933--946",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2005:EPP,
author = "Yin Zhang and Matthew Roughan and Carsten Lund and
David L. Donoho",
title = "Estimating point-to-point and point-to-multipoint
traffic matrices: an information-theoretic approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "947--960",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zou:2005:MED,
author = "Cliff C. Zou and Weibo Gong and Don Towsley and Lixin
Gao",
title = "The monitoring and early detection of {Internet}
Worms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "961--974",
month = oct,
year = "2005",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2005.857113",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "After many Internet-scale worm incidents in recent
years, it is clear that a simple self-propagating worm
can quickly spread across the Internet and cause severe
damage to our society. Facing this great security
threat, we need to build an early detection system that
can detect the presence of a worm in the Internet as
quickly as possible in order to give people accurate
early warning information and possible reaction time
for counteractions. This paper first presents an
Internet worm monitoring system. Then, based on the
idea of ``detecting the trend, not the burst'' of
monitored illegitimate traffic, we present a ``trend
detection'' methodology to detect a worm at its early
propagation stage by using Kalman filter estimation,
which is robust to background noise in the monitored
data. In addition, for uniform-scan worms such as Code
Red, we can effectively predict the overall vulnerable
population size, and estimate accurately how many
computers are really infected in the global Internet
based on the biased monitored data. For monitoring a
nonuniform scan worm, especially a sequential-scan worm
such as Blaster, we show that it is crucial for the
address space covered by the worm monitoring system to
be as distributed as possible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Computer network security; early detection; Internet
worm; network monitoring",
}
@Article{Pan:2005:SME,
author = "Rong Pan and Balaji Prabhakar and Konstantinos Psounis
and Damon Wischik",
title = "{SHRiNK}: a method for enabling scaleable performance
prediction and efficient network simulation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "975--988",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fang:2005:MPA,
author = "Yuguang Fang",
title = "Modeling and performance analysis for wireless mobile
networks: a new analytical approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "989--1002",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akan:2005:ESR,
author = "{\"O}zg{\"u}r B. Akan and Ian F. Akyildiz",
title = "Event-to-sink reliable transport in wireless sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1003--1016",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koskie:2005:NGA,
author = "Sarah Koskie and Zoran Gajic",
title = "A {Nash} game algorithm for {SIR}-based power control
in {$3$G} wireless {CDMA} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1017--1026",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yuen:2005:PBR,
author = "Clement Yuen and Peter Marbach",
title = "Price-based rate control in random access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1027--1040",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jin:2005:DUP,
author = "Youngmi Jin and George Kesidis",
title = "Dynamics of usage-priced communication networks: the
case of a single bottleneck resource",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1041--1053",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhou:2005:AFJ,
author = "Yunkai Zhou and Harish Sethu",
title = "On achieving fairness in the joint allocation of
processing and bandwidth resources: principles and
algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1054--1067",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2005:ERS,
author = "Shao Liu and Tamer Ba{\c{s}}ar and R. Srikant",
title = "Exponential-{RED}: a stabilizing {AQM} scheme for low-
and high-speed {TCP} protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1068--1081",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tian:2005:SAD,
author = "Yu-Ping Tian",
title = "Stability analysis and design of the second-order
congestion control for networks with heterogeneous
delays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1082--1093",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Amir:2005:CBF,
author = "Yair Amir and Baruch Awerbuch and Claudiu Danilov and
Jonathan Stanton",
title = "A cost-benefit flow control for reliable multicast and
unicast in overlay networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1094--1106",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Loguinov:2005:GTA,
author = "Dmitri Loguinov and Juan Casas and Xiaoming Wang",
title = "Graph-theoretic analysis of structured peer-to-peer
systems: routing distances and fault resilience",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1107--1120",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2005:ILL,
author = "Hui Zhang and Ashish Goel and Ramesh Govindan",
title = "Improving lookup latency in distributed hash table
systems using random sampling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1121--1134",
month = oct,
year = "2005",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2005.857106",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed hash table (DHT) systems are an important
class of peer-to-peer routing infrastructures. They
enable scalable wide-area storage and retrieval of
information, and will support the rapid development of
a wide variety of Internet-scale applications ranging
from naming systems and file systems to
application-layer multicast. DHT systems essentially
build an overlay network, but a path on the overlay
between any two nodes can be significantly different
from the unicast path between those two nodes on the
underlying network. As such, the lookup latency in
these systems can be quite high and can adversely
impact the performance of applications built on top of
such systems. In this paper, we discuss a random
sampling technique that incrementally improves lookup
latency in DHT systems. Our sampling can be implemented
using information gleaned from lookups traversing the
overlay network. For this reason, we call our approach
lookup-parasitic random sampling (LPRS). LPRS converges
quickly, and requires relatively few modifications to
existing DHT systems. For idealized versions of DHT
systems like Chord, Tapestry, and Pastry, we
analytically prove that LPRS can result in lookup
latencies proportional to the average unicast latency
of the network, provided the underlying physical
topology has a power-law latency expansion. We then
validate this analysis by implementing LPRS in the
Chord simulator. Our simulations reveal that LPRS-Chord
exhibits a qualitatively better latency scaling
behavior relative to unmodified Chord. The overhead of
LPRS is one sample per lookup hop in the worst case.
Finally, we provide evidence which suggests that the
Internet router-level topology resembles power-law
latency expansion. This finding implies that LPRS has
significant practical applicability as a general
latency reduction technique for many DHT systems. This
finding is also of independent interest since it might
inform the design of latency-sensitive topology models
for the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sun:2005:PCC,
author = "Xuehong Sun and Sartaj K. Sahni and Yiqiang Q. Zhao",
title = "Packet classification consuming small amount of
memory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1135--1145",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Orda:2005:SAP,
author = "Ariel Orda and Alexander Sprintson",
title = "A scalable approach to the partition of {QoS}
requirements in unicast and multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1146--1159",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sobrinho:2005:ATD,
author = "Jo{\~a}o Lu{\'\i}s Sobrinho",
title = "An algebraic theory of dynamic network routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1160--1173",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Siachalou:2005:APC,
author = "Stavroula Siachalou and Leonidas Georgiadis",
title = "Algorithms for precomputing constrained widest paths
and multicast trees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1174--1187",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sun:2005:EED,
author = "Wei Sun and Kang G. Shin",
title = "End-to-end delay bounds for traffic aggregates under
guaranteed-rate scheduling algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "5",
pages = "1188--1201",
month = oct,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Dec 30 06:01:37 MST 2005",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Alderson:2005:UIT,
author = "David Alderson and Lun Li and Walter Willinger and
John C. Doyle",
title = "Understanding {Internet} topology: principles, models,
and validation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1205--1218",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cormode:2005:WNF,
author = "Graham Cormode and S. Muthukrishnan",
title = "What's new: Finding significant differences in network
data streams",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1219--1232",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jin:2005:DCB,
author = "Nan Jin and Gayathri Venkitachalam and Scott Jordan",
title = "Dynamic congestion-based pricing of bandwidth and
buffer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1233--1246",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2005:IEP,
author = "Haining Wang and Abhijit Bose and Mohamed El-Gendy and
Kang G. Shin",
title = "{IP Easy-pass}: a light-weight network-edge resource
access control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1247--1260",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Alpcan:2005:GSA,
author = "Tansu Alpcan and Tamer Basar",
title = "A globally stable adaptive congestion control scheme
for {Internet}-style networks with delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1261--1274",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Weber:2005:RAM,
author = "Steven Weber and Gustavo {De Veciana}",
title = "Rate adaptive multimedia streams: optimization and
admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1275--1288",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marsan:2005:UPD,
author = "Marco Ajmone Marsan and Michele Garetto and Paolo
Giaccone and Emilio Leonardi and Enrico Schiattarella
and Alessandro Tarello",
title = "Using partial differential equations to model {TCP}
mice and elephants in large {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1289--1301",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2005:PBL,
author = "Shengming Jiang and Dajiang He and Jianqiang Rao",
title = "A prediction-based link availability estimation for
routing metrics in {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1302--1312",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2005:LTC,
author = "Ning Li and Jennifer C. Hou",
title = "Localized topology control algorithms for
heterogeneous wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1313--1324",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Marbach:2005:CWA,
author = "Peter Marbach and Ying Qiu",
title = "Cooperation in wireless ad hoc networks: a
market-based approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1325--1338",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bandyopadhyay:2005:STS,
author = "Seema Bandyopadhyay and Qingjiang Tian and Edward J.
Coyle",
title = "Spatio-temporal sampling rates and energy efficiency
in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1339--1352",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lu:2005:CDR,
author = "Haibin Lu and Sartaj Sahni",
title = "Conflict detection and resolution in two-dimensional
prefix router tables",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1353--1363",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Keslassy:2005:GSS,
author = "Isaac Keslassy and Murali Kodialam and T. V. Lakshman
and Dimitrios Stiliadis",
title = "On guaranteed smooth scheduling for input-queued
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1364--1375",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Valaee:2005:ERP,
author = "Shahrokh Valaee and Jean-Charles Gr{\'e}goire",
title = "An estimator of regulator parameters in a stochastic
setting",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1376--1389",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2005:CTA,
author = "Tao Wu and Arun K. Somani",
title = "Cross-talk attack monitoring and localization in
all-optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1390--1401",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rosenberg:2005:HTN,
author = "Eric Rosenberg",
title = "Hierarchical topological network design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1402--1409",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2005:CID,
author = "Tzu-Lun Huang and D. T. Lee",
title = "Comments and an improvement on {``A distributed
algorithm of delay-bounded multicast routing for
multimedia applications in wide area networks''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "13",
number = "6",
pages = "1410--1411",
month = dec,
year = "2005",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Feb 27 07:14:54 MST 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Jia:1998:DAD}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2006:JRA,
author = "Jang-Won Lee and Ravi R. Mazumdar and Ness B. Shroff",
title = "Joint resource allocation and base-station assignment
for the downlink in {CDMA} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "1--14",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kar:2006:DNA,
author = "Koushik Kar and Ananth Krishnamurthy and Neeraj
Jaggi",
title = "Dynamic node activation in networks of rechargeable
sensors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "15--26",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Haas:2006:NNM,
author = "Zygmunt J. Haas and Tara Small",
title = "A new networking model for biological applications of
ad hoc sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "27--40",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cristescu:2006:NCD,
author = "Razvan Cristescu and Baltasar Beferull-Lozano and
Martin Vetterli and Roger Wattenhofer",
title = "Network correlated data gathering with explicit
communication: {NP}-completeness and algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "41--54",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gupta:2006:CSC,
author = "Himanshu Gupta and Zongheng Zhou and Samir R. Das and
Quinyi Gu",
title = "Connected sensor cover: self-organization of sensor
networks for efficient query execution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "55--67",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hohn:2006:IST,
author = "Nicolas Hohn and Darryl Veitch",
title = "Inverting sampled traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "68--80",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Byers:2006:FGL,
author = "John W. Byers and Gu-In Kwon and Michael Luby and
Michael Mitzenmacher",
title = "Fine-grained layered multicast with {STAIR}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "81--93",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ranjan:2006:GSC,
author = "Priya Ranjan and Richard J. La and Eyad H. Abed",
title = "Global stability conditions for rate control with
arbitrary communication delays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "94--107",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tinnakornsrisuphap:2006:ABH,
author = "Peerapol Tinnakornsrisuphap and Richard J. La",
title = "Asymptotic behavior of heterogeneous {TCP} flows and
{RED} gateway",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "108--120",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2006:MOQ,
author = "Hyoung-Il Lee and Seung-Woo Seo",
title = "Matching output queueing with a multiple input\slash
output-queued switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "121--132",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Veloso:2006:HCL,
author = "Eveline Veloso and Virg{\'\i}lio Almeida and Wagner
{Meira, Jr.} and Azer Bestavros and Shudong Jin",
title = "A hierarchical characterization of a live streaming
media workload",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "133--146",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2006:CAF,
author = "Dahai Xu and Yang Chen and Yizhi Xiong and Chunming
Qiao and Xin He",
title = "On the complexity of and algorithms for finding the
shortest path with a disjoint counterpart",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "147--158",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fumagalli:2006:DRD,
author = "Andrea Fumagalli and Marco Tacca",
title = "Differentiated reliability {(DiR)} in wavelength
division multiplexing rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "159--168",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2006:WAM,
author = "Jianping Wang and Xiangtong Qi and Biao Chen",
title = "Wavelength assignment for multicast in all-optical
{WDM} networks with splitting constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "169--182",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ferrel:2006:VTM,
author = "Ian Ferrel and Adrian Mettler and Edward Miller and
Ran Libeskind-Hadas",
title = "Virtual topologies for multicasting with multiple
originators in {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "183--190",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Harai:2006:HSB,
author = "Hiroaki Harai and Masayuki Murata",
title = "High-speed buffer management for {40 Gb/s}-based
photonic packet switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "191--204",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ngo:2006:CAN,
author = "Hung Q. Ngo and Dazhen Pan and Chunming Qiao",
title = "Constructions and analyses of nonblocking {WDM}
switches based on arrayed waveguide grating and limited
wavelength conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "205--217",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ou:2006:SVC,
author = "Canhui Ou and Laxman H. Sahasrabuddhe and Keyao Zhu
and Charles U. Martel and Biswanath Mukherjee",
title = "Survivable virtual concatenation for data over
{SONET\slash SDH} in optical transport networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "1",
pages = "218--231",
month = feb,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue May 30 16:30:02 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Banerjee:2006:RMU,
author = "Suman Banerjee and Seungjoon Lee and Bobby
Bhattacharjee and Aravind Srinivasan",
title = "Resilient multicast using overlays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "237--248",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872579",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We introduce Probabilistic Resilient Multicast (PRM):
a multicast data recovery scheme that improves data
delivery ratios while maintaining low end-to-end
latencies. PRM has both a proactive and a reactive
components; in this paper we describe how PRM can be
used to improve the performance of application-layer
multicast protocols especially when there are high
packet losses and host failures. Through detailed
analysis in this paper, we show that this loss recovery
technique has efficient scaling properties-the
overheads at each overlay node asymptotically decrease
to zero with increasing group sizes.As a detailed case
study, we show how PRM can be applied to the NICE
application-layer multicast protocol. We present
detailed simulations of the PRM-enhanced NICE protocol
for 10000 node Internet-like topologies. Simulations
show that PRM achieves a high delivery ratio
({$>$97}\%) with a low latency bound (600 ms) for
environments with high end-to-end network losses
(1\%-5\%) and high topology change rates (5 changes per
second) while incurring very low overheads
({$<$5}\%).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gorinsky:2006:DMP,
author = "Sergey Gorinsky and Sugat Jain and Harrick Vin and
Yongguang Zhang",
title = "Design of multicast protocols robust against inflated
subscription",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "249--262",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872573",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To disseminate data to a heterogeneous body of
receivers efficiently, congestion control protocols for
IP multicast compose a session from several multicast
groups and prescribe guidelines that enable each
receiver to subscribe to an appropriate subset of the
groups. However, a misbehaving receiver can ignore the
group subscription rules and inflate its subscription
to acquire unfairly high throughput. In this paper, we
present the first solution for the problem of inflated
subscription. Our design guards access to multicast
groups with dynamic keys and consists of two
independent components: DELTA (Distribution of
ELigibility To Access) --- a novel method for in-band
distribution of group keys to receivers that are
eligible to access the groups according to the
congestion control protocol, and SIGMA (Secure Internet
Group Management Architecture) --- a generic
architecture for key-based group access at edge
routers. We apply DELTA and SIGMA to derive robust
versions of prominent RLM and FLID-DL protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2006:DCK,
author = "Patrick P. C. Lee and John C. S. Lui and David K. Y.
Yau",
title = "Distributed collaborative key agreement and
authentication protocols for dynamic peer groups",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "263--276",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872575",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider several distributed collaborative key
agreement and authentication protocols for dynamic peer
groups. There are several important characteristics
which make this problem different from traditional
secure group communication. They are: (1) distributed
nature in which there is no centralized key server; (2)
collaborative nature in which the group key is
contributory (i.e., each group member will
collaboratively contribute its part to the global group
key); and (3) dynamic nature in which existing members
may leave the group while new members may join. Instead
of performing individual rekeying operations, i.e.,
recomputing the group key after every join or leave
request, we discuss an interval-based approach of
rekeying. We consider three interval-based distributed
rekeying algorithms, or interval-based algorithms for
short, for updating the group key: (1) the Rebuild
algorithm; (2) the Batch algorithm; and (3) the
Queue-batch algorithm. Performance of these three
interval-based algorithms under different settings,
such as different join and leave probabilities, is
analyzed. We show that the interval-based algorithms
significantly outperform the individual rekeying
approach and that the Queue-batch algorithm performs
the best among the three interval-based algorithms.
More importantly, the Queue-batch algorithm can
substantially reduce the computation and communication
workload in a highly dynamic environment. We further
enhance the interval-based algorithms in two aspects:
authentication and implementation. Authentication
focuses on the security improvement, while
implementation realizes the interval-based algorithms
in real network settings. Our work provides a
fundamental understanding about establishing a group
key via a distributed and collaborative approach for a
dynamic peer group.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Levy:2006:EPD,
author = "Hanoch Levy and Haim Zlatokrilov",
title = "The effect of packet dispersion on voice applications
in {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "277--288",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872543",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Delivery of real time streaming applications, such as
voice and video over IP, in packet switched networks is
based on dividing the stream into packets and shipping
each of the packets on an individual basis to the
destination through the network. The basic implicit
assumption on these applications is that shipping all
the packets of an application is done, most of the
time, over a single path along the network. In this
work, we present a model in which packets of a certain
session are dispersed over multiple paths, in contrast
to the traditional approach. The dispersion may be
performed by network nodes for various reasons such as
load-balancing, or implemented as a mechanism to
improve quality, as will be presented in this work. To
study the effect of packet dispersion on the quality of
voice over IP (VoIP) applications, we focus on the
effect of the network loss on the applications, where
we propose to use the Noticeable Loss Rate (NLR) as a
measure (negatively) correlated with the voice quality.
We analyze the NLR for various packet dispersion
strategies over paths experiencing memoryless
(Bernoulli) or bursty (Gilbert model) losses, and
compare them to each other. Our analysis reveals that
in many situations the use of packet dispersion reduces
the NLR and thus improves session quality. The results
suggest that the use of packet dispersion can be quite
beneficial for these applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Musacchio:2006:WAP,
author = "John Musacchio and Jean Walrand",
title = "{WiFi} access point pricing as a dynamic game",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "289--301",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TENT.2006.872553",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the economic interests of a wireless access
point owner and his paying client, and model their
interaction as a dynamic game. The key feature of this
game is that the players have asymmetric
information-the client knows more than the access
provider. We find that if a client has a ``web
browser'' utility function (a temporal utility function
that grows linearly), it is a Nash equilibrium for the
provider to charge the client a constant price per unit
time. On the other hand, if the client has a ``file
transferor'' utility function (a utility function that
is a step function), the client would be unwilling to
pay until the final time slot of the file transfer. We
also study an expanded game where an access point sells
to a reseller, which in turn sells to a mobile client
and show that if the client has a web browser utility
function, that constant price is a Nash equilibrium of
the three player game. Finally, we study a two player
game in which the access point does not know whether he
faces a web browser or file transferor type client, and
show conditions for which it is not a Nash equilibrium
for the access point to maintain a constant price.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2006:IIS,
author = "Xiaojun Lin and Ness B. Shroff",
title = "The impact of imperfect scheduling on cross-layer
congestion control in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "302--315",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TENT.2006.872546",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study cross-layer design for
congestion control in multihop wireless networks. In
previous work, we have developed an optimal cross-layer
congestion control scheme that jointly computes both
the rate allocation and the stabilizing schedule that
controls the resources at the underlying layers.
However, the scheduling component in this optimal
cross-layer congestion control scheme has to solve a
complex global optimization problem at each time, and
is hence too computationally expensive for online
implementation. In this paper, we study how the
performance of cross-layer congestion control will be
impacted if the network can only use an imperfect (and
potentially distributed) scheduling component that is
easier to implement. We study both the case when the
number of users in the system is fixed and the case
with dynamic arrivals and departures of the users, and
we establish performance bounds of cross-layer
congestion control with imperfect scheduling. Compared
with a layered approach that does not design congestion
control and scheduling together, our cross-layer
approach has provably better performance bounds, and
substantially outperforms the layered approach. The
insights drawn from our analyzes also enable us to
design a fully distributed cross-layer congestion
control and scheduling algorithm for a restrictive
interference model.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vuran:2006:SCB,
author = "Mehmet C. Vuran and Ian F. Akyildiz",
title = "Spatial correlation-based collaborative medium access
control in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "316--329",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TENT.2006.872544",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless Sensor Networks (WSN) are mainly
characterized by dense deployment of sensor nodes which
collectively transmit information about sensed events
to the sink. Due to the spatial correlation between
sensor nodes subject to observed events, it may not be
necessary for every sensor node to transmit its data.
This paper shows how the spatial correlation can be
exploited on the Medium Access Control (MAC) layer. To
the best of our knowledge, this is the first effort
which exploits spatial correlation in WSN on the MAC
layer. A theoretical framework is developed for
transmission regulation of sensor nodes under a
distortion constraint. It is shown that a sensor node
can act as a representative node for several other
sensor nodes observing the correlated data. Based on
the theoretical framework, a distributed, spatial
Correlation-based Collaborative Medium Access Control
(CC-MAC) protocol is then designed which has two
components: Event MAC (E-MAC) and Network MAC (N-MAC).
E-MAC filters out the correlation in sensor records
while N-MAC prioritizes the transmission of route-thru
packets. Simulation results show that CC-MAC achieves
high performance in terms energy, packet drop rate, and
latency.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Saengudomlert:2006:LRW,
author = "Poompat Saengudomlert and Eytan Modiano and Robert G.
Gallager",
title = "On-line routing and wavelength assignment for dynamic
traffic in {WDM} ring and torus networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "330--340",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872549",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We develop on-line routing and wavelength assignment
(RWA) algorithms for WDM bidirectional ring and torus
networks with $N$ nodes. The algorithms dynamically
support all $k$-allowable traffic matrices, where $k$
denotes an arbitrary integer vector $ [k_1, k - 2,
\ldots {}, k_N]$, and node $i$, $ 1 \leq i \leq N$, can
transmit at most $ k_i$ wavelengths and receive at most
$ k_i$ wavelengths. Both algorithms support the
changing traffic in a rearrangeably nonblocking
fashion. Our first algorithm, for a bidirectional ring,
uses $ \lceil (\sum_{i = 1}^N k_i) / 3 \rceil $
wavelengths in each fiber and requires at most three
lightpath rearrangements per new session request
regardless of the number of nodes $N$ and the amount of
traffic $k$. When all the $ k_i$ 's are equal to $k$,
the algorithm uses $ \lceil k N / 3 \rceil $
wavelengths, which is known to be the minimum for any
off-line rearrangeably nonblocking algorithm. Our
second algorithm, for a torus topology, is an extension
of a known off-line algorithm for the special case with
all the $ k_i$'s equal to $k$. For an $ R \times C$
torus network with $ R \geq C$ nodes, our on-line
algorithm uses $ \lceil k R / 2 \rceil $ wavelengths in
each fiber, which is the same as in the off-line
algorithm, and is at most two times a lower bound
obtained by assuming full wavelength conversion at all
nodes. In addition, the on-line algorithm requires at
most $ C - 1$ lightpath rearrangements per new session
request regardless of the amount of traffic $k$.
Finally, each RWA update requires solving a bipartite
matching problem whose time complexity is only $ O(R)$,
which is much smaller than the time complexity $ O(k C
R^2)$ of the bipartite matching problem for an off-line
algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rosberg:2006:PDO,
author = "Zvi Rosberg and Andrew Zalesky and Moshe Zukerman",
title = "Packet delay in optical circuit-switched networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "341--354",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872570",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A framework is provided for evaluation of packet delay
distribution in an optical circuit-switched network.
The framework is based on a fluid traffic model, packet
queueing at edge routers, and circuit-switched
transmission between edge routers. Packets are assigned
to buffers according to their destination, delay
constraint, physical route and wavelength. At every
decision epoch, a subset of buffers is allocated to
end-to-end circuits for transmission, where circuit
holding times are based on limited and exhaustive
circuit allocation policies. To ensure computational
tractability, the framework approximates the evolution
of each buffer independently. ``Slack variables'' are
introduced to decouple amongst buffers in a way that
the evolution of each buffer remains consistent with
all other buffers in the network. The delay
distribution is derived for a single buffer and an
approximation is given for a network of buffers. The
approximation entails finding a fixed point for the
functional relation between the ``slack variables'' and
a specific circuit allocation policy. An analysis of a
specific policy, in which circuits are
probabilistically allocated based on buffer size, is
given as an illustrative example. The framework is
shown to be in good agreement with a discrete event
simulation model.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tang:2006:CIT,
author = "Ao Tang and Jiantao Wang and Steven H. Low",
title = "Counter-intuitive throughput behaviors in networks
under end-to-end control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "355--368",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872552",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It has been shown that as long as traffic sources
adapt their rates to aggregate congestion measure in
their paths, they implicitly maximize certain utility.
In this paper we study some counter-intuitive
throughput behaviors in such networks, pertaining to
whether a fair allocation is always inefficient and
whether increasing capacity always raises aggregate
throughput. A bandwidth allocation policy can be
defined in terms of a class of utility functions
parameterized by a scalar \alpha that can be
interpreted as a quantitative measure of fairness. An
allocation is fair if \alpha is large and efficient if
aggregate throughput is large. All examples in the
literature suggest that a fair allocation is
necessarily inefficient. We characterize exactly the
tradeoff between fairness and throughput in general
networks. The characterization allows us both to
produce the first counter-example and trivially explain
all the previous supporting examples. Surprisingly, our
counter-example has the property that a fairer
allocation is always more efficient. In particular it
implies that maxmin fairness can achieve a higher
throughput than proportional fairness. Intuitively, we
might expect that increasing link capacities always
raises aggregate throughput. We show that not only can
throughput be reduced when some link increases its
capacity, more strikingly, it can also be reduced when
all links increase their capacities by the same amount.
If all links increase their capacities proportionally,
however, throughput will indeed increase. These
examples demonstrate the intricate interactions among
sources in a network setting that are missing in a
single-link topology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bohacek:2006:NTP,
author = "Stephan Bohacek and Joao P. Hespanha and Junsoo Lee
and Chansook Lim and Katia Obraczka",
title = "A new {TCP} for persistent packet reordering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "369--382",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.873366",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most standard implementations of TCP perform poorly
when packets are reordered. In this paper, we propose a
new version of TCP that maintains high throughput when
reordering occurs and yet, when packet reordering does
not occur, is friendly to other versions of TCP. The
proposed TCP variant, or TCP-PR, does not rely on
duplicate acknowledgments to detect a packet loss.
Instead, timers are maintained to keep track of how
long ago a packet was transmitted. In case the
corresponding acknowledgment has not yet arrived and
the elapsed time since the packet was sent is larger
than a given threshold, the packet is assumed lost.
Because TCP-PR does not rely on duplicate
acknowledgments, packet reordering (including
out-or-order acknowledgments) has no effect on TCP-PR's
performance.Through extensive simulations, we show that
TCP-PR performs consistently better than existing
mechanisms that try to make TCP more robust to packet
reordering. In the case that packets are not reordered,
we verify that TCP-PR maintains the same throughput as
typical implementations of TCP (specifically, TCP-SACK)
and shares network resources fairly. Furthermore,
TCP-PR only requires changes to the TCP sender side
making it easier to deploy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2006:SAT,
author = "Liangping Ma and Kenneth E. Barner and Gonzalo R.
Arce",
title = "Statistical analysis of {TCP}'s retransmission timeout
algorithm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "383--396",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872577",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The retransmission timeout (RTO) algorithm of
Transmission Control Protocol (TCP), which sets a
dynamic upper bound on the next round-trip time (RTT)
based on past RTTs, plays an important role in reliable
data transfer and congestion control of the Internet. A
rigorous theoretical analysis of the RTO algorithm is
important in that it provides insight into the
algorithm and prompts optimal design strategies.
Nevertheless, such an analysis has not been conducted
to date. This paper presents such an analysis from a
statistical approach. We construct an auto-regressive
(AR) model for the RTT processes based on experimental
results that indicate: (1) RTTs along a certain path in
the Internet can be modeled by a shifted Gamma
distribution and (2) the temporal correlation of RTTs
decreases quickly with lag. This model is used to
determine the average reaction time and premature
timeout probability for the RTO algorithm. We derive a
closed-form expression for the first measure and a
formula for numerically calculating the second. Both
measures are validated through tests on simulated and
real RTT data. The theoretical analysis strengthens a
number of observations reported in past
experiment-oriented studies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dharmapurikar:2006:LPM,
author = "Sarang Dharmapurikar and Praveen Krishnamurthy and
David E. Taylor",
title = "Longest prefix matching using {Bloom} filters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "397--409",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872576",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We introduce the first algorithm that we are aware of
to employ Bloom filters for longest prefix matching
(LPM). The algorithm performs parallel queries on Bloom
filters, an efficient data structure for membership
queries, in order to determine address prefix
membership in sets of prefixes sorted by prefix length.
We show that use of this algorithm for Internet
Protocol (IP) routing lookups results in a search
engine providing better performance and scalability
than TCAM-based approaches. The key feature of our
technique is that the performance, as determined by the
number of dependent memory accesses per lookup, can be
held constant for longer address lengths or additional
unique address prefix lengths in the forwarding table
given that memory resources scale linearly with the
number of prefixes in the forwarding table. Our
approach is equally attractive for Internet Protocol
Version 6 (IPv6) which uses 128-bit destination
addresses, four times longer than IPv4. We present a
basic version of our approach along with optimizations
leveraging previous advances in LPM algorithms. We also
report results of performance simulations of our system
using snapshots of IPv4 BGP tables and extend the
results to IPv6. Using less than 2 Mb of embedded RAM
and a commodity SRAM device, our technique achieves
average performance of one hash probe per lookup and a
worst case of two hash probes and one array access per
lookup.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jamjoom:2006:RCP,
author = "Hani Jamjoom and Kang G. Shin",
title = "On the role and controllability of persistent clients
in traffic aggregates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "410--423",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872547",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Flash crowd events (FCEs) present a real threat to the
stability of routers and end-servers. Such events are
characterized by a large and sustained spike in client
arrival rates, usually to the point of service failure.
Traditional rate-based drop policies, such as Random
Early Drop (RED), become ineffective in such situations
since clients tend to be persistent, in the sense that
they make multiple retransmission attempts before
aborting their connection. As it is built into TCP's
congestion control, this persistence is very
widespread, making it a major stumbling block to
providing responsive aggregate traffic controls. This
paper focuses on analyzing and modeling the effects of
client persistence on the controllability of aggregate
traffic. Based on this model, we propose a new drop
strategy called persistent dropping to regulate the
arrival of SYN packets and achieves three important
goals: (1) it allows routers and end-servers to quickly
converge to their control targets without sacrificing
fairness; (2) it minimizes the portion of client delay
that is attributed to the applied controls; and (3) it
is both easily implementable and computationally
tractable. Using a real implementation of this
controller in the Linux kernel, we demonstrate its
efficacy, up to 60\% delay reduction for drop
probabilities less than 0.5.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2006:NPS,
author = "David Lee and Dongluo Chen and Ruibing Hao and Raymond
E. Miller and Jianping Wu and Xia Yin",
title = "Network protocol system monitoring: a formal approach
with passive testing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "424--437",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872572",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study network protocol system monitoring for fault
detection using a formal technique of passive testing
that is a process of detecting system faults by
passively observing its input/output behaviors without
interrupting its normal operations. After describing a
formal model of event-driven extended finite state
machines, we present two algorithms for passive testing
of protocol system control and data portions.
Experimental results on OSPF and TCP are reported.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bejerano:2006:ELA,
author = "Yigal Bejerano and Mark A. Smith and Joseph (Seffi)
Naor and Nicole Immorlica",
title = "Efficient location area planning for personal
communication systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "438--450",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872555",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A central problem in personal communication systems is
to optimize bandwidth usage, while providing Quality of
Service (QoS) guarantees to mobile users. Network
mobility management, and in particular, location
management, consumes a significant portion of
bandwidth, which is a necessary overhead for supporting
mobile users. We focus our efforts on minimizing this
overhead. Unlike previous works, we concentrate on
optimizing existing schemes, and so the algorithms we
present are easily incorporated into current networks.
We present the first polynomial time approximation
algorithms for minimum bandwidth location management.
In planar graphs, our algorithm provably generates a
solution that uses no more than a constant factor more
bandwidth than the optimal solution. In general graphs,
our algorithm provably generates a solution that uses
just a factor O (log n ) more bandwidth than optimal
where n is the number of base stations in the network.
We show that, in practice, our algorithm produces
near-optimal results and outperforms other schemes that
are described in the literature. For the important case
of the line graph, we present a polynomial-time optimal
algorithm. Finally, we illustrate that our algorithm
can also be used for optimizing the handoff
mechanism.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2006:CMT,
author = "Zesheng Chen and Tian Bu and Mostafa Ammar and Don
Towsley",
title = "Comments on {``Modeling TCP Reno performance: a simple
model and its empirical validation''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "2",
pages = "451--453",
month = apr,
year = "2006",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2006.872541",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:00:28 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Padhye:2000:MTR}.",
abstract = "In this Comments, several errors in Padhye et al.,
2000, are pointed out. The more serious of these errors
result in an over prediction of the send rate. The
expression obtained for send rate in this Comments
leads to greater accuracy when compared with the
measurement data than the original send rate expression
in Padhye et al.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Grossglauser:2006:LMN,
author = "Matthias Grossglauser and Martin Vetterli",
title = "Locating mobile nodes with {EASE}: learning efficient
routes from encounter histories alone",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "457--469",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leung:2006:OPC,
author = "Kin-Kwong Leung and Chi Wan Sung",
title = "An opportunistic power control algorithm for cellular
network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "470--478",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Haas:2006:GBA,
author = "Zygmunt J. Haas and Joseph Y. Halpern and Li Li",
title = "Gossip-based ad hoc routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "479--491",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barrenetxea:2006:LNC,
author = "Guillermo Barrenetxea and Baltasar Berefull-Lozano and
Martin Vetterli",
title = "Lattice networks: capacity limits, optimal routing,
and queueing behavior",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "492--505",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See correction \cite{Barrenetxea:2006:CLN}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2006:PNR,
author = "Xin Wang and Henning Schulzrinne",
title = "Pricing network resources for adaptive applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "506--519",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Arora:2006:LLS,
author = "Anish Arora and Hongwei Zhang",
title = "{LSRP}: local stabilization in shortest path routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "520--531",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shaikh:2006:AID,
author = "Aman Shaikh and Rohit Dube and Anujan Varma",
title = "Avoiding instability during graceful shutdown of
multiple {OSPF} routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "532--542",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Costa:2006:ISD,
author = "Lu{\'\i}s Henrique M. K. Costa and Serge Fdida and
Otto Carlos M. B. Duarte",
title = "Incremental service deployment using the hop-by-hop
multicast routing protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "543--556",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dolev:2006:MTS,
author = "Danny Dolev and Osnat Mokryn and Yuval Shavitt",
title = "On multicast trees: structure and size estimation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "557--567",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ganesh:2006:CNP,
author = "Ayalvadi J. Ganesh and Peter B. Key and Damien Polis
and R. Srikant",
title = "Congestion notification and probing mechanisms for
endpoint admission control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "568--578",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ying:2006:GSI,
author = "Lei Ying and Geir E. Dullerud and R. Srikant",
title = "Global stability of {Internet} congestion controllers
with heterogeneous delays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "579--591",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Thommes:2006:DPM,
author = "Richard W. Thommes and Mark J. Coates",
title = "Deterministic packet marking for time-varying
congestion price estimation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "592--602",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Moon:2006:RAS,
author = "Ji-Cheol Moon and Byeong Gi Lee",
title = "Rate-adaptive snoop: a {TCP} enhancement scheme over
rate-controlled lossy links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "603--615",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shorten:2006:PSM,
author = "Robert Shorten and Fabian Wirth and Douglas Leith",
title = "A positive systems model of {TCP}-like congestion
control: asymptotic results",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "616--629",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2006:PDP,
author = "Yuming Jiang",
title = "Per-domain packet scale rate guarantee for expedited
forwarding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "630--643",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2006:PGR,
author = "Cheng-Shang Chang and Duan-Shin Lee and Chi-Yao Yue",
title = "Providing guaranteed rate services in the load
balanced {Birkhoff--von Neumann} switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "644--656",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cheng:2006:DIS,
author = "Yu Cheng and Weihua Zhuang",
title = "Dynamic inter-{SLA} resource sharing in path-oriented
differentiated services networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "3",
pages = "657--670",
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 21 05:27:29 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cai:2006:ISIa,
author = "Ning Cai and Mung Chiang and Michelle Effros and Ralf
Koetter and Muriel M{\'e}dard and Balaji Prabhakar and
R. Srikant and Don Towsley and Raymond W. Yeung",
title = "Introduction to the special issue on networking and
information theory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2285--2288",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xue:2006:ICL,
author = "Feng Xue and P. R. Kumar",
title = "On the $ \theta $-coverage and connectivity of large
random networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2289--2299",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ciucu:2006:SPS,
author = "Florin Ciucu and Almut Burchard and J{\"o}rg
Liebeherr",
title = "Scaling properties of statistical end-to-end bounds in
the network calculus",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2300--2312",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xie:2006:PLA,
author = "Liang-Liang Xie and P. R. Kumar",
title = "On the path-loss attenuation regime for positive cost
and linear scaling of transport capacity in wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2313--2328",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Katz:2006:RPT,
author = "Michael Katz and Shlomo Shamai",
title = "Relaying protocols for two colocated users",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2329--2344",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Harvey:2006:CIN,
author = "Nicholas J. A. Harvey and Robert Kleinberg and April
Rasala Lehman",
title = "On the capacity of information networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2345--2364",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dougherty:2006:UNC,
author = "Randall Dougherty and Chris Freiling and Kenneth
Zeger",
title = "Unachievability of network coding capacity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2365--2372",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yan:2006:OBM,
author = "Xijin Yan and Jun Yang and Zhen Zhang",
title = "An outer bound for multisource multisink network
coding with minimum cost consideration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2373--2385",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Langberg:2006:ECN,
author = "Michael Langberg and Alexander Sprintson and Jehoshua
Bruck",
title = "The encoding complexity of network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2386--2397",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2006:UNC,
author = "Yunnan Wu and Kamal Jain and Sun-Yuan Kung",
title = "A unification of network coding and tree-packing
(routing) theorems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2398--2409",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chekuri:2006:ATA,
author = "Chandra Chekuri and Christina Fragouli and Emina
Soljanin",
title = "On average throughput and alphabet size in network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2410--2424",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ratnakar:2006:MCD,
author = "Niranjan Ratnakar and Gerhard Kramer",
title = "The multicast capacity of deterministic relay networks
with no interference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2425--2432",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liang:2006:MGM,
author = "Xue-Bin Liang",
title = "Matrix games in the multicast networks: maximum
information flows with network switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2433--2466",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2006:AMM,
author = "Zongpeng Li and Baochun Li and Lap Chi Lau",
title = "On achieving maximum multicast throughput in
undirected networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2467--2485",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deb:2006:AGN,
author = "Supratim Deb and Muriel M{\'e}dard and Clifford
Choute",
title = "Algebraic gossip: a network coding approach to optimal
multiple rumor mongering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2486--2507",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Boyd:2006:RGA,
author = "Stephen Boyd and Arpita Ghosh and Balaji Prabhakar and
Devavrat Shah",
title = "Randomized gossip algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2508--2530",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sirkeci-Mergen:2006:AAM,
author = "Birsen Sirkeci-Mergen and Anna Scaglione and
G{\"o}khan Mergen",
title = "Asymptotic analysis of multistage cooperative
broadcast in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2531--2550",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shokrollahi:2006:RC,
author = "Amin Shokrollahi",
title = "Raptor codes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2551--2567",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{ElGamal:2006:OTD,
author = "Abbas {El Gamal} and James Mammen and Balaji Prabhakar
and Devavrat Shah",
title = "Optimal throughput-delay scaling in wireless networks:
part {I}: the fluid model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2568--2592",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2006:TCS,
author = "Jie Luo and Anthony Ephremides",
title = "On the throughput, capacity, and stability regions of
random multiple access",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2593--2607",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lun:2006:MCM,
author = "Desmond S. Lun and Niranjan Ratnakar and Muriel
M{\'e}dard and Ralf Koetter and David R. Karger and
Tracey Ho and Ebad Ahmed and Fang Zhao",
title = "Minimum-cost multicast over coded packet networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2608--2623",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sikora:2006:BPE,
author = "Marcin Sikora and J. Nicholas Laneman and Martin
Haenggi and Daniel J. {Costello, Jr.} and Thomas E.
Fuja",
title = "Bandwidth- and power-efficient routing in linear
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2624--2633",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liang:2006:FLA,
author = "Gang Liang and Nina Taft and Bin Yu",
title = "A fast lightweight approach to origin-destination {IP}
traffic estimation using partial measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2634--2648",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Petrovic:2006:OUR,
author = "Dragan Petrovi{\'c} and Kannan Ramchandran and Jan
Rabaey",
title = "Overcoming untuned radios in wireless networks with
network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2649--2657",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wan:2006:CRD,
author = "Peng-Jun Wan and Chih-Wei Yi",
title = "Coverage by randomly deployed wireless sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2658--2669",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ray:2006:SLD,
author = "Saikat Ray and Wei Lai and Ioannis Ch. Paschalidis",
title = "Statistical location detection with sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2670--2683",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Georgiadis:2006:OOR,
author = "Leonidas Georgiadis and Leandros Tassiulas",
title = "Optimal overload response in sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2684--2696",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sundaresan:2006:CQP,
author = "Rajesh Sundaresan and Sergio Verd{\'u}",
title = "Capacity of queues via point-process channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2697--2709",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gurewitz:2006:OWD,
author = "Omer Gurewitz and Israel Cidon and Moshe Sidi",
title = "One-way delay estimation using network-wide
measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2710--2724",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hu:2006:SCT,
author = "An-Swol Hu and Sergio D. Servetto",
title = "On the scalability of cooperative time synchronization
in pulse-connected networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2725--2748",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Borbash:2006:FMW,
author = "Steven A. Borbash and Anthony Ephremides",
title = "The feasibility of matchings in a wireless network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2749--2755",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dousse:2006:TSW,
author = "Olivier Dousse and Massimo Franceschetti and Patrick
Thiran",
title = "On the throughput scaling of wireless relay networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2756--2761",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khisti:2006:FLS,
author = "Ashish Khisti and Uri Erez and Gregory W. Wornell",
title = "Fundamental limits and scaling behavior of cooperative
multicasting in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2762--2770",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ahmad:2006:OBC,
author = "Sahand Haji Ali Ahmad and Aleksandar Jovi{\v{c}}i{\'c}
and Pramod Viswanath",
title = "On outer bounds to the capacity region of wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2770--2776",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2006:DDC,
author = "Xiaojun Lin and Gaurav Sharma and Ravi R. Mazumdar and
Ness B. Shroff",
title = "Degenerate delay-capacity tradeoffs in ad-hoc networks
with {Brownian} mobility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2777--2784",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramamoorthy:2006:SDS,
author = "Aditya Ramamoorthy and Kamal Jain and Philip A. Chou
and Michelle Effros",
title = "Separating distributed source coding from network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2785--2795",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barbero:2006:CLT,
author = "{\'A}ngela I. Barbero and {\O}yvind Ytrehus",
title = "Cycle-logical treatment for {``Cyclopathic''}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2795--2804",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jain:2006:CMU,
author = "Kamal Jain and Vijay V. Vazirani and Gideon Yuval",
title = "On the capacity of multiple unicast sessions in
undirected graphs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2805--2809",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dimakis:2006:DEC,
author = "Alexandros G. Dimakis and Vinod Prabhakaran and Kannan
Ramchandran",
title = "Decentralized erasure codes for distributed networked
storage",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2809--2816",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cristescu:2006:LNC,
author = "Razvan Cristescu and Baltasar Beferull-Lozano",
title = "Lossy network correlated data gathering with
high-resolution coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2817--2824",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Birk:2006:CDI,
author = "Yitzhak Birk and Tomer Kol",
title = "Coding on demand by an informed source {(ISCOD)} for
efficient broadcast of different supplemental data to
caching clients",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2825--2830",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Franceschetti:2006:CNL,
author = "Massimo Franceschetti and Ronald Meester",
title = "Critical node lifetimes in random networks via the
{Chen-Stein} method",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2831--2837",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2006:COF,
author = "Cheng-Shang Chang and Yi-Ting Chen and Duan-Shin Lee",
title = "Constructions of optical {FIFO} queues",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "SI",
pages = "2838--2843",
month = jun,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Aug 23 09:35:00 MDT 2006",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Towsley:2006:E,
author = "Don Towsley",
title = "Editorial",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "673--673",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cai:2006:ISIb,
author = "Ning Cai and Mung Chiang and Michelle Effros and Ralf
Koetter and Muriel M{\'e}dard and Balaji Prabhakar and
R. Srikant and Don Towsley and Raymond W. Yeung",
title = "Introduction to the special issue on networking and
information theory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "674--674",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Towsley:2006:AIT,
author = "Don Towsley",
title = "Abstracts from the {IEEE} transactions on information
theory, special issue, {June} 2006",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "675--682",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kuzmanovic:2006:LRT,
author = "Aleksandar Kuzmanovic and Edward W. Knightly",
title = "Low-rate {TCP}-targeted denial of service attacks and
counter strategies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "683--696",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Denial of Service attacks are presenting an increasing
threat to the global inter-networking infrastructure.
While TCP's congestion control algorithm is highly
robust to diverse network conditions, its implicit
assumption of end-system cooperation results in a
well-known vulnerability to attack by high-rate
non-responsive flows. In this paper, we investigate a
class of low-rate denial of service attacks which,
unlike high-rate attacks, are difficult for routers and
counter-DoS mechanisms to detect. Using a combination
of analytical modeling, simulations, and Internet
experiments, we show that maliciously chosen low-rate
DoS traffic patterns that exploit TCP's retransmission
timeout mechanism can throttle TCP flows to a small
fraction of their ideal rate while eluding detection.
Moreover, as such attacks exploit protocol homogeneity,
we study fundamental limits of the ability of a class
of randomized timeout mechanisms to thwart such
low-rate DoS attacks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "denial of service; retransmission timeout; TCP",
}
@Article{Duffield:2006:NLT,
author = "Nick Duffield and Francesco {Lo Presti} and Vern
Paxson and Don Towsley",
title = "Network loss tomography using striped unicast probes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "697--710",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we explore the use of end-to-end
unicast traffic as measurement probes to infer
link-level loss rates. We leverage off of earlier work
that produced efficient estimates for link-level loss
rates based on end-to-end multicast traffic
measurements. We design experiments based on the notion
of transmitting stripes of packets (with no delay
between transmission of successive packets within a
stripe) to two or more receivers. The purpose of these
stripes is to ensure that the correlation in receiver
observations matches as closely as possible what would
have been observed if a multicast probe followed the
same path to the receivers. Measurements provide good
evidence that a packet pair to distinct receivers
introduces considerable correlation which can be
further increased by simply considering longer stripes.
Using an M/M/1/K model for a link, we theoretically
confirm this benefit for stripes. We also use
simulation to explore how well these stripes translate
into accurate link-level loss estimates. We observe
good accuracy with packet pairs, with a typical error
of about 1\%, which significantly decreases as stripe
length is increased.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "correlation; end-to-end measurement; estimation;
network tomography; packet loss rates",
}
@Article{Breitgand:2006:TMP,
author = "David Breitgand and Danny Raz and Yuval Shavitt",
title = "The traveling miser problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "711--724",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Various monitoring and performance evaluation tools
generate considerable amount of low priority traffic.
This information is not always needed in real time and
often can be delayed by the network without hurting
functionality. This paper proposes a new framework to
handle this low priority, but resource consuming
traffic in such a way that it incurs a minimal
interference with the higher priority traffic.
Consequently, this improves the network goodput. The
key idea is allowing the network nodes to delay data by
locally storing it. This can be done, for example, in
the Active Network paradigm. In this paper we show that
such a model can improve the network's goodput
dramatically even if a very simple scheduling algorithm
for intermediate parking is used. The parking imposes
additional load on the intermediate nodes. To obtain
minimal cost schedules we define an optimization
problem called the traveling miser problem. We
concentrate on the on-line version of the problem for a
predefined route, and develop a number of enhanced
scheduling strategies. We study their characteristics
under different assumptions on the environment through
a rigorous simulation study. We prove that if only one
link can be congested, then our scheduling algorithm is
$ O(\log_2 B) $ competitive, where $B$ is congestion
time, and is 3-competitive, if additional signaling is
allowed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "active networks; competitive analysis; delay tolerant
networks; network management; on-line algorithms",
}
@Article{Qiu:2006:SRI,
author = "Lili Qiu and Yang Richard Yang and Yin Zhang and Scott
Shenker",
title = "On selfish routing in {Internet}-like environments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "725--738",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A recent trend in routing research is to avoid
inefficiencies in network-level routing by allowing
hosts to either choose routes themselves (e.g., source
routing) or use overlay routing networks (e.g., Detour
or RON). Such approaches result in selfish routing,
because routing decisions are no longer based on
system-wide criteria but are instead designed to
optimize host-based or overlay-based metrics. A series
of theoretical results showing that selfish routing can
result in suboptimal system behavior have cast doubts
on this approach. In this paper, we use a
game-theoretic approach to investigate the performance
of selfish routing in Internet-like environments based
on realistic topologies and traffic demands in our
simulations. We show that in contrast to theoretical
worst cases, selfish routing achieves close to optimal
average latency in such environments. However, such
performance benefits come at the expense of
significantly increased congestion on certain links.
Moreover, the adaptive nature of selfish overlays can
significantly reduce the effectiveness of traffic
engineering by making network traffic less
predictable.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "game theory; optimization; overlay; relaxation;
selfish routing; traffic engineering; traffic
equilibrium",
}
@Article{Kuzmanovic:2006:TLL,
author = "Aleksandar Kuzmanovic and Edward W. Knightly",
title = "{TCP-LP}: low-priority service via end-point
congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "739--752",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Service prioritization among different traffic classes
is an important goal for the Internet. Conventional
approaches to solving this problem consider the
existing best-effort class as the low-priority class,
and attempt to develop mechanisms that provide
`better-than-best-effort' service. In this paper, we
explore the opposite approach, and devise a new
distributed algorithm to realize a low-priority service
(as compared to the existing best effort) from the
network endpoints. To this end, we develop TCP Low
Priority (TCP-LP), a distributed algorithm whose goal
is to utilize only the excess network bandwidth as
compared to the `fair share' of bandwidth as targeted
by TCP. The key mechanisms unique to TCP-LP congestion
control are the use of one-way packet delays for early
congestion indications and a TCP-transparent congestion
avoidance policy. The results of our simulation and
Internet experiments show that: (1) TCP-LP is largely
non-intrusive to TCP traffic; (2) both single and
aggregate TCP-LP flows are able to successfully utilize
excess network bandwidth; moreover, multiple TCP-LP
flows share excess bandwidth fairly; (3) substantial
amounts of excess bandwidth are available to the
low-priority class, even in the presence of `greedy'
TCP flows; (4) the response times of web connections in
the best-effort class decrease by up to 90\% when
long-lived bulk data transfers use TCP-LP rather than
TCP; (5) despite their low-priority nature, TCP-LP
flows are able to utilize significant amounts of
available bandwidth in a wide-area network
environment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "available bandwidth; service prioritization; TCP;
TCP-LP; TCP-transparency",
}
@Article{Zhu:2006:PMT,
author = "Jing Zhu and Sumit Roy and Jae H. Kim",
title = "Performance modelling of {TCP} enhancements in
terrestrial-satellite hybrid networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "753--766",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we focus on the performance of TCP
enhancements for a hybrid terrestrial-satellite
network. While a large body of literature exists
regarding modeling TCP performance for the wired
Internet, and recently over a single-hop wireless link,
the literature is very sparse on TCP analysis over a
hybrid wired-wireless (multi-hop) path. We seek to make
a contribution to this problem (where the wireless
segment is a satellite uplink) by deriving analytical
estimates of TCP throughput for two widely deployed
approaches: TCP splitting and E2E (End-to-End) TCP with
link layer support as a function of key parameters such
as terrestrial/satellite propagation delay, segment
loss rate and buffer size. Our analysis is supported by
simulations; throughput comparisons indicate
superiority of TCP splitting over E2E scheme in most
cases. However, in situations where end-to-end delay is
dominated by terrestrial portion and buffering is very
limited at intermediate node, E2E achieves higher
throughput than TCP splitting.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "automatic retransmission request (ARQ); satellite
networks; TCP/IP",
}
@Article{Karsten:2006:CEI,
author = "Martin Karsten",
title = "Collected experience from implementing {RSVP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "767--778",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet quality of service (QoS) is still a highly
debated topic for more than fifteen years. Even with
the large variety of QoS proposals and the impressive
research advances, there is little deployment yet of
network layer QoS technology. One specific problem
domain is QoS signalling, which has recently attracted
increasing attention to bring forward new
standardization approaches. In this paper, an extensive
study of RSVP is presented, covering protocol design,
software design, and performance aspects of the basic
version of RSVP and of certain standardized and
experimental extensions. This work is based on and
presents the experience from implementing RSVP for UNIX
systems and the ns-2 simulation environment. The
implementation includes a variety of protocol
extensions and incorporates several internal
improvements. It has been subject to extensive
functional and performance evaluations, the results of
which are reported here.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "protocol implementation; quality of service;
signalling",
}
@Article{He:2006:IDS,
author = "Xinming He and Christos Papadopoulos and Pavlin
Radoslavov",
title = "Incremental deployment strategies for router-assisted
reliable multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "779--792",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Incremental deployment of a new network service or
protocol is typically a hard problem, especially when
it has to be deployed at the routers. First, an
incrementally deployable version of the protocol may be
needed. Second, a systematic study of the performance
impact of incremental deployment is needed to evaluate
potential deployment strategies. Choosing the wrong
strategy can be disastrous, as it may inhibit reaping
the benefits of an otherwise robust service and prevent
widespread adoption. We focus on two router-assisted
reliable multicast protocols, namely PGM and LMS. Our
evaluation consists of three parts: (1) selection and
classification of deployment strategies; (2) definition
of performance metrics; and (3) systematic evaluation
of deployment strategies. Our study yields several
interesting results: (1) the performance of different
deployment strategies varies widely, for example, with
some strategies, both PGM and LMS approach full
deployment performance with as little as 5\% of the
routers deployed; other strategies require up to 80\%
deployment to approach the same level; (2) our
sensitivity analysis reveals relatively small variation
in the results in most cases; and (3) the impact
associated with partial deployment is different for
each of these protocols; PGM tends to impact the
network, whereas LMS the endpoints. Our study clearly
demonstrates that the choice of a strategy has a
substantial impact on performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "incremental deployment; reliable multicast;
router-assisted services",
}
@Article{Kulkarni:2006:ALI,
author = "Sunil Kulkarni and Aravind Iyer and Catherine
Rosenberg",
title = "An address-light, integrated {MAC} and routing
protocol for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "793--806",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose an address-light, integrated MAC and
routing protocol (abbreviated AIMRP) for wireless
sensor networks (WSNs). Due to the broad spectrum of
WSN applications, there is a need for protocol
solutions optimized for specific application classes.
AIMRP is proposed for WSNs deployed for detecting rare
events which require prompt detection and response.
AIMRP organizes the network into concentric tiers
around the sink(s), and routes event reports by
forwarding them from one tier to another, in the
direction of (one of) the sink(s). AIMRP is
address-light in that it does not employ unique
per-node addressing, and integrated since the MAC
control packets are also responsible for finding the
next-hop node to relay the data, via an anycast query.
For reducing the energy expenditure due to
idle-listening, AIMRP provides a power-saving algorithm
which requires absolutely no synchronization or
information exchange. We evaluate AIMRP through
analysis and simulations, and compare it with another
MAC protocol proposed for WSNs, S-MAC. AIMRP
outperforms S-MAC for event-detection applications, in
terms of total average power consumption, while
satisfying identical sensor-to-sink latency
constraints.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "addressing; anycast routing; cross-layer integration;
MAC; power-saving mode; rare event detection; sensor
networks",
}
@Article{Chou:2006:UNP,
author = "Zi-Tsan Chou and Ching-Chi Hsu and Shin-Neng Hsu",
title = "{UPCF}: a new point coordination function with {QoS}
and power management for multimedia over wireless
{LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "807--820",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a new novel polling-based
medium access control protocol, named UPCF (Unified
Point Coordination Function), to provide power
conservation and quality-of-service (QoS) guarantees
for multimedia applications over wireless local area
networks. Specifically, UPCF has the following
attractive features. First, it supports multiple
priority levels and guarantees that high-priority
stations always join the polling list earlier than
low-priority stations. Second, it provides fast
reservation scheme such that associated stations with
real-time traffic can get on the polling list in
bounded time. Third, it employs dynamic channel time
allocation scheme to support CBR/VBR transportation and
provide per-flow probabilistic bandwidth assurance.
Fourth, it employs the power management techniques to
let mobile stations save as much energy as possible.
Fifth, it adopts the mobile-assisted admission control
technique such that the point coordinator can admit as
many newly flows as possible while not violating QoS
guarantees made to already-admitted flows. The
performance of UPCF is evaluated through both analysis
and simulations. Simulation results do confirm that, as
compared with the PCF in IEEE 802.11, UPCF not only
provides higher goodput and energy throughput, but also
achieves lower power consumption and frame loss due to
delay expiry. Last but not least, we expect that UPCF
can pass the current Wi-Fi certification and may
coexist with the upcoming IEEE 802.11e standard.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IEEE 802.11; medium access control (MAC); multimedia;
point coordination function (PCF); power management;
quality of service (QoS)",
}
@Article{Tsaur:2006:CLA,
author = "Lih-feng Tsaur and Daniel C. Lee",
title = "Closed-loop architecture and protocols for rapid
dynamic spreading gain adaptation in {CDMA} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "821--834",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a closed-loop architecture and protocols
for rapid dynamic spreading gain adaptation and fast
feedback between a transmitter and a receiver
communicating with each other in CDMA networks. These
protocols and architecture do not require the transfer
of an explicit control message indicating the change of
CDMA spreading gain from transmitter to receiver. Also,
with these protocols, the transmitter can change the
spreading gain symbol-by-symbol as opposed to
frame-by-frame, and feedback information (e.g., the
fast-varying channel condition) can be exchanged almost
as frequently as the symbol rate. Thus, adaptation to
the time-varying channel conditions of wireless
networks and/or to the rate variation of traffic can be
much faster than is possible with the existing
frame-by-frame approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CDMA; OVSF codes; rate adaptation",
}
@Article{Chaporkar:2006:DQP,
author = "Prasanna Chaporkar and Saswati Sarkar and Rahul
Shetty",
title = "Dynamic quorum policy for maximizing throughput in
limited information multiparty {MAC}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "835--848",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In multiparty MAC, a sender needs to transmit each
packet to a set of receivers within its transmission
range. Bandwidth efficiency of wireless multiparty MAC
can be improved substantially by exploiting the fact
that several receivers can be reached at the MAC layer
by a single transmission. Multiparty communication,
however, requires new design paradigms since systematic
design techniques that have been used effectively in
unicast and wireline multicast do not apply. For
example, a transmission policy that maximizes the
stability region of the network need not maximize the
network throughput. Therefore, the objective is to
design a policy that maximizes the system throughput
subject to maintaining stability. We present a
sufficient condition that can be used to establish the
throughput optimality of a stable transmission policy.
We subsequently design a distributed adaptive stable
policy that allows a sender to decide when to transmit
using simple computations. The computations are based
only on limited information about current transmissions
in the sender's neighborhood. Even though the proposed
policy does not use any network statistics, it attains
the same throughput as an optimal offline stable policy
that uses in its decision process past, present, and
even future network states. We prove the throughput
optimality of this policy using the sufficient
condition and the large deviation results. We present a
MAC protocol for acquiring the local information
necessary for executing this policy, and implement it
in ns-2. The performance evaluations demonstrate that
the optimal policy significantly outperforms the
existing multiparty schemes in ad hoc networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MAC layer scheduling; stability; throughput optimal
policy; wireless multicast",
}
@Article{Bejerano:2006:MFF,
author = "Yigal Bejerano and Randeep S. Bhatia",
title = "{MiFi}: a framework for fairness and {QoS} assurance
for current {IEEE} 802.11 networks with multiple access
points",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "849--862",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a framework for providing
fair service and supporting quality of service (QoS)
requirements in IEEE 802.11 networks with multiple
access points (APs). These issues becomes critical as
IEEE 802.11 wireless LAN are widely deployed in
nationwide networks, linking tens of thousands of
`hotspots' for providing both real-time (voice) and non
real-time (data) services to a large population of
mobile users. However, both fairness and QoS guarantees
cannot be supported in the current 802.11 standard. Our
system, termed MiFi, relies on centralized coordination
of the APs. During any given time of the
`contention-free' period only a set of non-interfering
APs is activated while the others are silenced.
Moreover, the amount of service granted to an AP is
proportional to its load and the system's performance
is optimized by employing efficient scheduling
algorithms. We show that such a system can be
implemented without requiring any modification of the
underlying MAC protocol standard or the behavior of the
mobile stations. Our scheme is complementary to the
emerging 802.11e standard for QoS and guarantees to
overcome the hidden node and the overlapping cell
problems. Our simulations establish that the system
supports fairness and hence can provide QoS guarantees
for real-time traffic, while maintaining a relative
high throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; fairness; IEEE 802.11;
quality of service (QoS); wireless LAN",
}
@Article{Zheng:2006:TBD,
author = "Kai Zheng and Chengchen Hu and Hongbin Lu and Bin
Liu",
title = "A {TCAM}-based distributed parallel {IP} lookup scheme
and performance analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "863--875",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Using ternary content addressable memory (TCAM) for
high-speed IP address lookup has been gaining
popularity due to its deterministic high performance.
However, restricted by the slow improvement of memory
accessing speed, the route lookup engines for
next-generation terabit routers demand exploiting
parallelism among multiple TCAM chips. Traditional
parallel methods always incur excessive redundancy and
high power consumption. We propose in this paper an
original TCAM-based IP lookup scheme that achieves both
ultra-high lookup throughput and optimal utilization of
the memory while being power-efficient. In our
multi-chip scheme, we devise a load-balanced TCAM table
construction algorithm together with an adaptive load
balancing mechanism. The power efficiency is well
controlled by decreasing the number of TCAM entries
triggered in each lookup operation. Using four 133 MHz
TCAM chips and given 25\% more TCAM entries than the
original route table, the proposed scheme achieves a
lookup throughput of up to 533 MPPS while remains
simple for ASIC implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IP; power consumption; route lookup; TCAM;
throughput",
}
@Article{Gurewitz:2006:NCT,
author = "Omer Gurewitz and Israel Cidon and Moshe Sidi",
title = "Network classless time protocol based on clock offset
optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "876--888",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Time synchronization is critical in distributed
environments. A variety of network protocols,
middleware and business applications rely on proper
time synchronization across the computational
infrastructure and depend on the clock accuracy. The
Network Time Protocol (NTP) is the current widely
accepted standard for synchronizing clocks over the
Internet. NTP uses a hierarchical scheme in order to
synchronize the clocks in the network. In this paper we
present a novel non-hierarchical peer-to-peer approach
for time synchronization termed CTP--Classless Time
Protocol. This approach exploits convex optimization
theory in order to evaluate the impact of each clock
offset on the overall objective function. We define the
clock offset problem as an optimization problem and
derive its optimal solution. Based on the solution we
develop a distributed protocol that can be implemented
over a communication network, prove its convergence to
the optimal clock offsets and show its properties. For
compatibility, CTP may use the packet format and number
of measurements used by NTP. We also present
methodology and numerical results for evaluating and
comparing the accuracy of time synchronization schemes.
We show that the CTP outperforms hierarchical schemes
such as NTP in the sense of clock accuracy with respect
to a universal clock.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "classless time protocol (CTP); estimation;
measurements; network management; one-way delay; time
synchronization; UTC",
}
@Article{Naser:2006:JOI,
author = "Hassan Naser and Hussein T. Mouftah",
title = "A joint-{ONU} interval-based dynamic scheduling
algorithm for {Ethernet} passive optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "889--899",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes a new dynamic bandwidth allocation
system for Ethernet Passive Optical Networks (EPONs),
subject to requirements of fairness, efficiency, and
cost. An Optical Line Terminal (OLT)-centric bandwidth
allocation model is proposed which employs a credit
pooling technique combined with a weighted-share policy
to partition the upstream bandwidth among different
classes of service, and to prevent Optical Network
Units (ONUs) from monopolizing the bandwidth. The
OLT-centric model allows global optimization of network
resources, a characteristic which is not found in many
earlier proposals. Supported by the new bandwidth
allocation, the paper proposes a joint-ONU
interval-based packet scheduling algorithm, referred to
herein as COPS (Class-of-service Oriented Packet
Scheduling), that meets the requirements set out above.
We compare COPS with another well-known scheduling
algorithm which employed a standard priority-based
bandwidth sharing. We show that COPS is superior in
terms of network utilization and maximum packet delay,
with the consequence of an increase in average packet
delay for the premium traffic. This drawback is
overcome by combining COPS with a rate-based
optimization scheme.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication protocols; network architecture and
design; network technologies",
}
@Article{Awduche:2006:DAC,
author = "Daniel O. Awduche and Bijan Jabbari",
title = "Demand assigned capacity management {(DACM)} in {IP}
over optical {(IPO)} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "900--913",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The demand assigned capacity management (DACM) problem
in IP over optical (IPO) network aims at devising
efficient bandwidth replenishment schedules from the
optical domain conditioned upon traffic evolution
processes in the IP domain. A replenishment schedule
specifies the location, sizing, and sequencing of link
capacity expansions to support the growth of Internet
traffic demand in the IP network subject to economic
considerations. A major distinction in the approach
presented in this paper is the focus of attention on
the economics of `excess bandwidth' in the IP domain,
which can be viewed as an inventory system that is
endowed with fixed and variable costs and depletes with
increase in IP traffic demand requiring replenishment
from the optical domain. We develop mathematical models
to address the DACM problem in IPO networks based on a
class of inventory management replenishment methods. We
apply the technique to IPO networks that implement
capacity adaptive routing in the IP domain and networks
without capacity adaptive routing. We analyze the
performance characteristics under both scenarios, in
terms of minimizing cumulative replenishment cost over
an interval of time. For the non-capacity adaptive
routing scenario, we consider a shortest path approach
in the IP domain, specifically OSPF. For the capacity
adaptive scenario, we use an online constraint-based
routing scheme. This study represents an application of
integrated traffic engineering which concerns
collaborative decision making targeted towards network
performance improvement that takes into consideration
traffic demands, control capabilities, and network
assets at different levels in the network hierarchy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ASON; bandwidth replenishment; capacity management;
demand assigned capacity management; GMPLS; integrated
traffic engineering; inventory management; IP over
optical; IPO; MPLS; network performance optimization;
networks; traffic engineering",
}
@Article{Liang:2006:GAA,
author = "Weifa Liang and Xiaojun Shen",
title = "A general approach for all-to-all routing in multihop
{WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "4",
pages = "914--923",
month = aug,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:51:36 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "WDM optical networks provide unprecedented high speed
and reliability for message transfer among the nodes.
All-to-all routing is a fundamental routing problem in
such networks and has been well studied on single hop
WDM networks. However, the number of wavelengths to
realize all-to-all routing on the single hop model
typically is very large. One way to reduce the number
of wavelengths is to use $k$-hop routing, in which each
routing path consists of $k$ segments and each segment
is assigned a different wavelength, where $k$ usually
is a small constant. Because of the complexity of
design and analysis for such a routing problem, only
few papers discussed and proposed all-to-all routing by
$ k \geq 2$ hops. However, the proposed algorithms are
usually exceeding complicated even for ring topologies.
Often, an ad hoc approach is employed to deal with each
individual topology. In this paper we propose a generic
method for all-to-all routing in multi-hop WDM
networks, which aims to minimize the number of
wavelengths. We illustrate the approach for several
optical networks of commonly used topology, including
lines, rings, tori, meshes, and complete binary trees.
For each case an upper bound on the number of
wavelengths is obtained. The results show that this
approach produces clear routing paths, requires less
wavelengths, and can easily incorporate load balancing.
For simple topologies such as lines and rings, this
approach easily produces the same bounds on the number
of wavelengths that were hard-obtained previously.
Moreover, this general approach provides a unified
routing algorithm for any $d$-dimensional torus, which
seems impossible to obtain by the previous approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-to-all routing; gossiping; multihop routing
algorithms; network design; optical networks; robust
routing protocol; WDM routing",
}
@Article{Estan:2006:BAC,
author = "Cristian Estan and George Varghese and Michael Fisk",
title = "Bitmap algorithms for counting active flows on
high-speed links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "925--937",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a family of bitmap algorithms that
address the problem of counting the number of distinct
header patterns (flows) seen on a high-speed link. Such
counting can be used to detect DoS attacks and port
scans and to solve measurement problems. Counting is
especially hard when processing must be done within a
packet arrival time (8 ns at OC-768 speeds) and, hence,
may perform only a small number of accesses to limited,
fast memory. A naive solution that maintains a hash
table requires several megabytes because the number of
flows can be above a million. By contrast, our new
probabilistic algorithms use little memory and are
fast. The reduction in memory is particularly important
for applications that run multiple concurrent counting
instances. For example, we replaced the port-scan
detection component of the popular intrusion detection
system Snort with one of our new algorithms. This
reduced memory usage on a ten minute trace from 50 to
5.6 MB while maintaining a 99.77\% probability of
alarming on a scan within 6s of when the large-memory
algorithm would. The best known prior algorithm
(probabilistic counting) takes four times more memory
on port scan detection and eight times more on a
measurement application. This is possible because our
algorithms can be customized to take advantage of
special features such as a large number of instances
that have very small counts or prior knowledge of the
likely range of the count.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "counting distinct elements; traffic measurements",
}
@Article{Yi:2006:TSD,
author = "Yung Yi and Supratim Deb and Sanjay Shakkottai",
title = "Time-scale decomposition and equivalent rate-based
marking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "938--950",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Differential equation models for Internet congestion
control algorithms have been widely used to understand
network dynamics and the design of router algorithms.
These models use a fluid approximation for user data
traffic and describe the dynamics of the router queue
and user adaptation through coupled differential
equations. The interaction between the routers and
flows occurs through marking, where routers indicate
congestion by appropriately marking packets during
congestion. In this paper, we show that the randomness
due to short and unresponsive flows in the Internet is
sufficient to decouple the dynamics of the router
queues from those of the end controllers. This implies
that a time-scale decomposition naturally occurs such
that the dynamics of the router manifest only through
their statistical steady-state behavior. We show that
this time-scale decomposition implies that a
queue-length based marking function (e.g., RED-like and
REM-like algorithms, which have no queue averaging, but
depend only on the instantaneous queue length) has an
equivalent form which depends only on the data arrival
rate from the end-systems and does not depend on the
queue dynamics. This leads to much simpler dynamics of
the differential equation models (there is no queueing
dynamics to consider), which enables easier analysis
and could be potentially used for low-complexity fast
simulation. Using packet-based simulations, we study
queue-based marking schemes and their equivalent
rate-based marking schemes for different types of
controlled sources (i.e., proportional fair and TCP)
and queue-based marking schemes. Our results indicate a
good match in the rates observed at the intermediate
router with the queue-based marking function and the
corresponding rate-based approximation. Further, the
window size distributions of a typical TCP flow with a
queue-based marking function as well as the equivalent
rate-based marking function match closely, indicating
that replacing a queue-based marking function by its
equivalent rate-based function does not statistically
affect the end host's behavior.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "internet congestion control; marking functions;
time-scale decomposition",
}
@Article{Iyengar:2006:CMT,
author = "Janardhan R. Iyengar and Paul D. Amer and Randall
Stewart",
title = "Concurrent multipath transfer using {SCTP} multihoming
over independent end-to-end paths",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "951--964",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Concurrent multipath transfer (CMT) uses the Stream
Control Transmission Protocol's (SCTP) multihoming
feature to distribute data across multiple end-to-end
paths in a multihomed SCTP association. We identify
three negative side-effects of reordering introduced by
CMT that must be managed before efficient parallel
transfer can be achieved: (1) unnecessary fast
retransmissions by a sender; (2) overly conservative
congestion window (cwnd) growth at a sender; and (3)
increased ack traffic due to fewer delayed acks by a
receiver. We propose three algorithms which augment
and/or modify current SCTP to counter these
side-effects. Presented with several choices as to
where a sender should direct retransmissions of lost
data, we propose five retransmission policies for CMT.
We demonstrate spurious retransmissions in CMT with all
five policies and propose changes to CMT to allow the
different policies. CMT is evaluated against AppStripe,
which is an idealized application that stripes data
over multiple paths using multiple SCTP associations.
The different CMT retransmission policies are then
evaluated with varied constrained receive buffer sizes.
In this foundation work, we operate under the strong
assumption that the bottleneck queues on the end-to-end
paths used in CMT are independent.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "end-to-end; load balancing; load sharing; multipath;
SCTP; transport layer",
}
@Article{Huang:2006:SER,
author = "Yaqing Huang and Roch Gu{\'e}rin and Pranav Gupta",
title = "Supporting excess real-time traffic with active drop
queue",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "965--977",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Real-time applications often stand to benefit from
service guarantees, and in particular delay guarantees.
However, most mechanisms that provide delay guarantees
also hard-limit the amount of traffic the application
can generate, i.e., to enforce to a traffic contract.
This can be a significant constraint and interfere with
the operation of many real-time applications. Our
purpose in this paper is to propose and investigate
solutions that overcome this limitation. We have four
major goals: (1) guarantee a delay bound to a
contracted amount of real-time traffic; (2) transmit
with the same delay bound as many excess real-time
packets as possible; (3) enforce a given link sharing
ratio between excess real-time traffic and other
service classes, e.g., best-effort; and (4) preserve
the ordering of real-time packets, if required. Our
approach is based on a combination of buffer management
and scheduling mechanisms for both guaranteeing delay
bounds, while allowing the transmission of excess
traffic. We evaluate the `cost' of our scheme by
measuring the processing overhead of an actual
implementation, and we investigate its performance by
means of simulations using video traffic traces.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "quality-of-service (QoS); queue management; real-time
application; service guarantee",
}
@Article{Ma:2006:ISD,
author = "Richard T. B. Ma and Sam C. M. Lee and John C. S. Lui
and David K. Y. Yau",
title = "Incentive and service differentiation in {P2P}
networks: a game theoretic approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "978--991",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Conventional peer-to-peer (P2P) networks do not
provide service differentiation and incentive for
users. Therefore, users can easily obtain information
without themselves contributing any information or
service to a P2P community. This leads to the well
known free-riding problem. Consequently, most of the
information requests are directed towards a small
number of P2P nodes which are willing to share
information or provide service, causing the `tragedy of
the commons.' The aim of this paper is to provide
service differentiation in a P2P network based on the
amount of services each node has provided to the
network community. Since the differentiation is based
on nodes' prior contributions, the nodes are encouraged
to share information/services with each other. We first
introduce a resource distribution mechanism for all the
information sharing nodes. The mechanism is distributed
in nature, has linear time complexity, and guarantees
Pareto-optimal resource allocation. Second, we model
the whole resource request/distribution process as a
competition game between the competing nodes. We show
that this game has a Nash equilibrium. To realize the
game, we propose a protocol in which the competing
nodes can interact with the information providing node
to reach Nash equilibrium efficiently and dynamically.
We also present a generalized incentive mechanism for
nodes having heterogeneous utility functions.
Convergence analysis of the competition game is carried
out. Examples are used to illustrate that the incentive
protocol provides service differentiation and can
induce productive resource sharing by rational network
nodes. Lastly, the incentive protocol is adaptive to
node arrival and departure events, and to different
forms of network congestion.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "contribution-based service differentiation; game
theory; incentive protocol; peer-to-peer network",
}
@Article{Maille:2006:PIM,
author = "Patrick Maill{\'e} and Bruno Tuffin",
title = "Pricing the {Internet} with multibid auctions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "992--1004",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Usage-based or congestion-based charging schemes have
been regarded as a relevant way to control congestion
and to differentiate services among users in
telecommunication networks; auctioning for bandwidth
appears as one of several possibilities. In a previous
work, the authors designed a multibid auction scheme
where users compete for bandwidth at a link by
submitting several couples (e.g., amount of bandwidth
asked, associated unit price) so that the link
allocates the bandwidth and computes the charge
according to the second price principle. They showed
that incentive compatibility and efficiency among other
properties are verified. We propose in the present
paper to extend this scheme to the case of a network by
using the properties/ assumptions that the backbone
network is overprovisioned and the access networks have
a tree structure.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "control theory; economics",
}
@Article{Ribeiro:2006:MQA,
author = "Vinay J. Ribeiro and Rudolf H. Riedi and Richard G.
Baraniuk",
title = "Multiscale queueing analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1005--1018",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces a new multiscale framework for
estimating the tail probability of a queue fed by an
arbitrary traffic process. Using traffic statistics at
a small number of time scales, our analysis extends the
theoretical concept of the critical time scale and
provides practical approximations for the tail queue
probability. These approximations are non-asymptotic;
that is, they apply to any finite queue threshold.
While our approach applies to any traffic process, it
is particularly apt for long-range-dependent (LRD)
traffic. For LRD fractional Brownian motion, we prove
that a sparse exponential spacing of time scales yields
optimal performance. Simulations with LRD traffic
models and real Internet traces demonstrate the
accuracy of the approach. Finally, simulations reveal
that the marginals of traffic at multiple time scales
have a strong influence on queueing that is not
captured well by its global second-order correlation in
non-Gaussian scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "admission control; critical time scale; fractional
Brownian motion; long-range dependence; marginals;
multifractals; multiscale; network provisioning;
queueing; wavelets",
}
@Article{Celandroni:2006:LLT,
author = "Nedo Celandroni and Franco Davoli and Erina Ferro and
Alberto Gotta",
title = "Long-lived {TCP} connections via satellite:
cross-layer bandwidth allocation, pricing, and adaptive
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1019--1030",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The paper focuses on the assignment of a common
bandwidth resource to TCP connections over a satellite
channel. The connections are grouped according to their
source-destination pairs, which correspond to the up-
and down-link channels traversed, and each group may
experience different fading conditions. By exploiting
the tradeoff between bandwidth and channel redundancy
(as determined by bit and coding rates) in the
maximization of TCP goodput, an overall optimization
problem is constructed, which can be solved by
numerical techniques. Different relations between
goodput maximization and fairness of the allocations
are investigated, and a possible pricing scheme is
proposed. The allocation strategies are tested and
compared in a fading environment, first under static
conditions, and then in a real dynamic scenario. The
goodput-fairness optimization allows significant gains
over bandwidth allocations only aimed at keeping the
channel bit error rate below a given threshold in all
fading conditions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optimization; resource allocation; satellite networks;
TCP connections",
}
@Article{Taleb:2006:REF,
author = "Tarik Taleb and Nei Kato and Yoshiaki Nemoto",
title = "{REFWA}: an efficient and fair congestion control
scheme for {LEO} satellite networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1031--1044",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper examines some issues that affect the
efficiency and fairness of the Transmission Control
Protocol (TCP), the backbone of Internet protocol
communication, in multihops satellite network systems.
It proposes a scheme that allows satellite systems to
automatically adapt to any change in the number of
active TCP flows due to handover occurrence, the free
buffer size, and the bandwidth-delay product of the
network. The proposed scheme has two major design
goals: increasing the system efficiency, and improving
its fairness. The system efficiency is controlled by
matching the aggregate traffic rate to the sum of the
link capacity and total buffer size. On the other hand,
the system min-max fairness is achieved by allocating
bandwidth among individual flows in proportion with
their RTTs. The proposed scheme is dubbed Recursive,
Explicit, and Fair Window Adjustment (REFWA).Simulation
results elucidate that the REFWA scheme substantially
improves the system fairness, reduces the number of
packet drops, and makes better utilization of the
bottleneck link. The results demonstrate also that the
proposed scheme works properly in more complicated
environments where connections traverse multiple
bottlenecks and the available bandwidth may change over
data transmission time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; fairness; receiver's advertised
window adjustment; satellite networks; TCP",
}
@Article{Nuggehalli:2006:ECP,
author = "Pavan Nuggehalli and Vikram Srinivasan and
Carla-Fabiana Chiasserini and Ramesh R. Rao",
title = "Efficient cache placement in multi-hop wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1045--1055",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we address the problem of efficient
cache placement in multi-hop wireless networks. We
consider a network comprising a server with an
interface to the wired network, and other nodes
requiring access to the information stored at the
server. In order to reduce access latency in such a
communication environment, an effective strategy is
caching the server information at some of the nodes
distributed across the network. Caching, however, can
imply a considerable overhead cost; for instance,
disseminating information incurs additional energy as
well as bandwidth burden. Since wireless systems are
plagued by scarcity of available energy and bandwidth,
we need to design caching strategies that optimally
trade-off between overhead cost and access latency. We
pose our problem as an integer linear program. We show
that this problem is the same as a special case of the
connected facility location problem, which is known to
be NP-hard. We devise a polynomial time algorithm which
provides a suboptimal solution. The proposed algorithm
applies to any arbitrary network topology and can be
implemented in a distributed and asynchronous manner.
In the case of a tree topology, our algorithm gives the
optimal solution. In the case of an arbitrary topology,
it finds a feasible solution with an objective function
value within a factor of 6 of the optimal value. This
performance is very close to the best approximate
solution known today, which is obtained in a
centralized manner. We compare the performance of our
algorithm against three candidate cache placement
schemes, and show via extensive simulation that our
algorithm consistently outperforms these alternative
schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "heuristic optimization; web cache placement; wireless
multi-hop networks",
}
@Article{Koutsopoulos:2006:CLA,
author = "Iordanis Koutsopoulos and Leandros Tassiulas",
title = "Cross-layer adaptive techniques for throughput
enhancement in wireless {OFDM}-based networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1056--1066",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Although independent consideration of layers
simplifies wireless system design, it is inadequate
since: (1) it does not consider the effect of
co-channel user interference on higher layers; (2) it
does not address the impact of local adaptation actions
on overall performance; and (3) it attempts to optimize
performance at one layer while keeping parameters of
other layers fixed. Cross-layer adaptation techniques
spanning several layers improve performance and provide
better quality of service for users across layers. In
this study, we consider a synergy between the physical
and access layers and address the joint problem of
channel allocation, modulation level, and power control
in a multicell network. Since performance is determined
by channel reuse, it is important to handle co-channel
interference appropriately by constructing co-channel
user sets and by assigning transmission parameters so
that achievable system rate is maximized. The problem
is considered for orthogonal frequency-division
multiplexing, which introduces novel challenges to
resource allocation due to different quality of
subcarriers for users and existing transmit power
constraints. We study the structure of the problem and
present two classes of centralized heuristic
algorithms. The first one considers each subcarrier
separately and sequentially allocates users from
different base stations in the subcarrier based on
different criteria, while the second is based on
water-filling across subcarriers in each cell. Our
results show that the first class of heuristics
performs better and quantify the impact of different
parameters on system performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-layer design; multicell systems; orthogonal
frequency-division multiplexing (OFDM); resource
allocation",
}
@Article{Andrews:2006:SNW,
author = "Matthew Andrews and Lisa Zhang",
title = "Scheduling over nonstationary wireless channels with
finite rate sets",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1067--1077",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a wireless basestation transmitting
high-speed data to multiple mobile users in a cell. The
channel conditions between the basestation and the
users are time-varying and user-dependent. Our
objective is to design a scheduler that determines
which user to schedule at each time step. Previous work
on this problem has typically assumed that the channel
conditions are governed by a stationary stochastic
process. In this setting, a popular algorithm known as
Max-Weight has been shown to have good performance.
However, the stationarity assumption is not always
reasonable. In this paper, we study a more general
worst-case model in which the channel conditions are
governed by an adversary and are not necessarily
stationary. In this model, we show that the
nonstationarities can cause Max-Weight to have
extremely poor performance. In particular, even if the
set of possible transmission rates is finite, as in the
CDMA 1xEV-DO system, Max-Weight can produce queue sizes
that are exponential in the number of users. On the
positive side, we describe a set of tracking algorithms
that aim to track the performance of a schedule
maintained by the adversary. For one of these tracking
algorithms, the queue sizes are only quadratic. We
discuss a number of practical issues associated with
the tracking algorithms. We also illustrate the
performance of Max-Weight and the tracking algorithms
using simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "nonstationary channel rates; wireless scheduling",
}
@Article{Soh:2006:PBR,
author = "Wee-Seng Soh and Hyong S. Kim",
title = "A predictive bandwidth reservation scheme using mobile
positioning and road topology information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1078--1091",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In cellular networks, an important practical issue is
how to limit the handoff dropping probability
efficiently. One possible approach is to perform
dynamic bandwidth reservation based on mobility
predictions. With the rapid advances in mobile
positioning technology, and the widespread availability
of digital road maps previously designed for
navigational devices, we propose a predictive bandwidth
reservation scheme built upon these timely
opportunities. In contrast to the common practice of
utilizing only incoming handoff predictions at each
cell to compute the reservations, our scheme is more
efficient as it innovatively utilizes both incoming and
outgoing handoff predictions; it can meet the same
target handoff dropping probability by blocking fewer
new calls. The individual base stations are responsible
for the computations, which are shown to be simple
enough to be performed in real-time. We evaluate the
scheme via simulation, along with five other schemes
for comparison. Simulation results show that those
schemes that rely on positioning information are
significantly more efficient than those that do not.
Our scheme's additional use of the road topology
information further improves upon this advantage,
bringing the efficiency closer to the bound set by a
benchmark scheme that assumes perfect knowledge about
future handoffs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "call admission control; handoff prioritization; mobile
positioning; mobility prediction",
}
@Article{Bejerano:2006:RML,
author = "Yigal Bejerano and Rajeev Rastogi",
title = "Robust monitoring of link delays and faults in {IP}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1092--1103",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we develop failure-resilient techniques
for monitoring link delays and faults in a Service
Provider or Enterprise IP network. Our two-phased
approach attempts to minimize both the monitoring
infrastructure costs as well as the additional traffic
due to probe messages. In the first phase, we compute
the locations of a minimal set of monitoring stations
such that all network links are covered, even in the
presence of several link failures. Subsequently, in the
second phase, we compute a minimal set of probe
messages that are transmitted by the stations to
measure link delays and isolate network faults. We show
that both the station selection problem as well as the
probe assignment problem are NP-hard. We then propose
greedy approximation algorithms that achieve a
logarithmic approximation factor for the station
selection problem and a constant factor for the probe
assignment problem. These approximation ratios are
provably very close to the best possible bounds for any
algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; latency and fault
monitoring; network failures; set cover problem",
}
@Article{Singhal:2006:OMM,
author = "Narendra K. Singhal and Laxman H. Sahasrabuddhe and
Biswanath Mukherjee",
title = "Optimal multicasting of multiple light-trees of
different bandwidth granularities in a {WDM} mesh
network with sparse splitting capabilities",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1104--1117",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the advent of next-generation,
bandwidth-intensive multimedia applications such as
HDTV, interactive distance learning, and movie
broadcasts from studios, it is becoming imperative to
exploit the enormous bandwidth promised by the rapidly
growing wavelength-division-multiplexing (WDM)
technology. These applications require multicasting of
information from a source to several destination nodes
which should be performed judiciously to conserve
expensive network resources. In this study, we
investigate two switch architectures to support
multicasting in a WDM network: one using an opaque
(optical-electronic-optical) approach and the other
using a transparent (all-optical) approach. For both
these switch architectures, we present mathematical
formulations for routing and wavelength assignment of
several light-tree-based multicast sessions on a given
network topology at a globally optimal cost. We expand
our work to also accommodate: (1) fractional-capacity
sessions (where a session's capacity is a fraction of a
wavelength channel's bandwidth, thereby leading to
`traffic-groomed' multicast sessions) and (2) sparse
splitting constraints, i.e., limited fanout of optical
splitters and limited number of such splitters at each
node. We illustrate the solutions obtained on different
networks by solving these optimization problems, which
turn out to be mixed integer linear programs (MILPs).
Because the MILP is computationally intensive and does
not scale well for large problem sizes, we also propose
fast heuristics for establishing a set of multicast
sessions in a network with or without wavelength
converters and with fractional-capacity sessions. We
find that, for all scenarios, the heuristics which
arrange the sessions in ascending order with respect to
destination set size and/or cost perform better in
terms of network resource usage than the heuristics
which arrange the sessions in descending order.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "grooming; light-tree; lightpath; mesh network; mixed
integer linear program (MILP); multicasting; optical
crossconnect; optical crossconnect (OXC); optical
network; optimization; splitter fanout;
wavelength-division multiplexing (WDM)",
}
@Article{Rosberg:2006:AON,
author = "Zvi Rosberg and Andrew Zalesky and Hai L. Vu and Moshe
Zukerman",
title = "Analysis of {OBS} networks with limited wavelength
conversion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1118--1127",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Presented herein is a scalable framework for
estimating path blocking probabilities in optical burst
switched (OBS) networks where limited wavelength
conversion is possible. Although presented under the
guise of OBS, it is pertinent to a broader class of
optical networks based on the principle of bufferless
unacknowledged switching. By applying the framework to
the NSFNET topology, it is shown that even the most
limited conversion range may reduce path blocking
probabilities by several orders of magnitude, compared
with no wavelength conversion. Moreover, contrary to
previous results derived for all-optical non-OBS
networks with acknowledgement, OBS with full wavelength
conversion achieves significantly lower blocking
probabilities than OBS with limited wavelength
conversion when the conversion range is small.
Underpinning the framework is a generalization of the
classical reduced load approximation. Assuming links
evolve independently of each other allows decoupling of
the network into its constituent links. A set of
fixed-point equations describing the evolution of each
conversion range are then solved by successive
substitution to estimate link blocking probabilities.
Having these link blocking probabilities, path blocking
probabilities are evaluated. The complexity of the
framework is dominated by the wavelength conversion
range and is independent of the number of wavelengths
per link under certain symmetry conditions. Both
just-in-time (JIT) and just-enough-time (JET)
scheduling are considered. Simulations are implemented
to corroborate the accuracy of the framework.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical network; blocking probability; limited
wavelength conversion; optical burst switching; reduced
load approximation",
}
@Article{Mao:2006:JDJ,
author = "Yinian Mao and Yan Sun and Min Wu and K. J. Ray Liu",
title = "{JET}: dynamic join-exit-tree amortization and
scheduling for contributory key management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1128--1140",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In secure group communications, the time cost
associated with key updates in the events of member
join and departure is an important aspect of quality of
service, especially in large groups with highly dynamic
membership. To achieve better time efficiency, we
propose a join-exit-tree (JET) key management
framework. First, a special key tree topology with join
and exit subtrees is introduced to handle key updates
for dynamic membership. Then, optimization techniques
are employed to determine the capacities of join and
exit subtrees for achieving the best time efficiency,
and algorithms are designed to dynamically update the
join and exit trees. We show that, on average, the
asymptotic time cost for each member join\slash
departure event is reduced to $ O(\log (\log n)) $ from
the previous cost of $ O(\log n) $, where $n$ is the
group size. Our experimental results based on simulated
user activities as well as the real MBone data
demonstrate that the proposed JET scheme can
significantly improve the time efficiency, while
maintaining low communication and computation cost, of
tree-based contributory key management.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "contributory key management; dynamic tree topology;
secure group communications; time efficiency",
}
@Article{Hwang:2006:NRN,
author = "Frank K. Hwang and Wen-Dar Lin and Vadim Lioubimov",
title = "On noninterruptive rearrangeable networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1141--1149",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study a new class of nonblocking
networks called noninterruptive rearrangeable (NIR)
networks, which are rearrangeable under the additional
condition that existing connections are not interrupted
while their paths being possibly rerouted to
accommodate a new request. We give a complete
characterization of NIR Clos networks built of
switching elements of various nonblocking properties.
In particular, we propose a novel class of NIR Clos
networks that leads to recursive constructions of
various cost-efficient multistage NIR networks.
Finally, we present examples of such constructions and
compare them with the best previously known results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "clos network; doubled path; noninterruptive
rearrangeable (NIR); output (input)-divertability;
Paull's matrix; rearrangeably nonblocking (RNB);
strictly nonblocking (SNB); wide-sense nonblocking
(WSNB)",
}
@Article{Barrenetxea:2006:CLN,
author = "Guillermo Barrenetxea and Baltasar Beferull-Lozano and
Martin Vetterli",
title = "Correction to {`Lattice networks: Capacity limits,
optimal routing, and queueing behavior'}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "5",
pages = "1150--1150",
month = oct,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:52:20 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Barrenetxea:2006:LNC}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{LeBoudec:2006:RTM,
author = "Jean-Yves {Le Boudec} and Milan Vojnovic",
title = "The random trip model: stability, stationary regime,
and perfect simulation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1153--1166",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We define `random trip', a generic mobility model for
random, independent node motions, which contains as
special cases: the random waypoint on convex or
nonconvex domains, random walk on torus, billiards,
city section, space graph, intercity and other models.
We show that, for this model, a necessary and
sufficient condition for a time-stationary regime to
exist is that the mean trip duration (sampled at trip
endpoints) is finite. When this holds, we show that the
distribution of node mobility state converges to the
time-stationary distribution, starting from the origin
of an arbitrary trip. For the special case of random
waypoint, we provide for the first time a proof and a
sufficient and necessary condition of the existence of
a stationary regime, thus closing a long standing
issue. We show that random walk on torus and billiards
belong to the random trip class of models, and
establish that the time-limit distribution of node
location for these two models is uniform, for any
initial distribution, even in cases where the speed
vector does not have circular symmetry. Using Palm
calculus, we establish properties of the
time-stationary regime, when the condition for its
existence holds. We provide an algorithm to sample the
simulation state from a time-stationary distribution at
time 0 (`perfect simulation'), without computing
geometric constants. For random waypoint on the sphere,
random walk on torus and billiards, we show that, in
the time-stationary regime, the node location is
uniform. Our perfect sampling algorithm is implemented
to use with ns-2, and is available to download from
\path=http://ica1www.epfl.ch/RandomTrip=.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobility models; random waypoint; simulation",
}
@Article{Konorski:2006:GTS,
author = "Jerzy Konorski",
title = "A game-theoretic study of {CSMA\slash CA} under a
backoff attack",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1167--1178",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "CSMA/CA, the contention mechanism of the IEEE 802.11
DCF medium access protocol, has recently been found
vulnerable to selfish backoff attacks consisting in
nonstandard configuration of the constituent backoff
scheme. Such attacks can greatly increase a selfish
station's bandwidth share at the expense of honest
stations applying a standard configuration. The paper
investigates the distribution of bandwidth among
anonymous network stations, some of which are selfish.
A station's obtained bandwidth share is regarded as a
payoff in a noncooperative CSMA/CA game. Regardless of
the IEEE 802.11 parameter setting, the payoff function
is found similar to a multiplayer Prisoners' Dilemma;
moreover, the number (though not the identities) of
selfish stations can be inferred by observation of
successful transmission attempts. Further, a repeated
CSMA/CA game is defined, where a station can toggle
between standard and nonstandard backoff configurations
with a view of maximizing a long-term utility. It is
argued that a desirable station strategy should yield a
fair, Pareto efficient, and subgame perfect Nash
equilibrium. One such strategy, called CRISP, is
described and evaluated.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc LAN; game theory; MAC protocol; selfish
behavior",
}
@Article{Chou:2006:CBA,
author = "Chun-Ting Chou and Kang G. Shin and Sai Shankar N.",
title = "Contention-based airtime usage control in multirate
{IEEE} 802.11 wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1179--1192",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a multirate wireless LAN, wireless/mobile stations
usually adapt their transmission rates to the channel
condition. It is difficult to control each station's
usage of network resources since the shared channel can
be overused by low transmission-rate stations. To solve
this problem, we propose a distributed control of
stations' airtime usage which (1) always guarantees
each station to receive a specified share of airtime,
and (2) keeps service for individual stations
unaffected by other stations' transmission rates. Such
airtime control enables service differentiation or
quality of service (QoS) support. Moreover, it can
achieve a higher overall system throughput. The
proposed airtime usage control exploits the Enhanced
Distributed Channel Access (EDCA) of the IEEE 802.11e
standard [1]. Two control mechanisms are proposed: one
based on controlling the station's arbitration
inter-frame space (AIFS) and the other based on the
contention window size. We show how the stations'
airtime usage is related to the AIFS and contention
window size parameters. Using this relation, two
analytical models are developed to determine the
optimal control parameters. Unlike the other heuristic
controls or analytical models, our model provides
handles or parameters for quantitative control of
stations' airtime usage. Our evaluation results show
that a precise airtime usage control can be achieved in
a multirate wireless LAN.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "medium access control; resource allocation; wireless
LAN",
}
@Article{Applegate:2006:MRR,
author = "David Applegate and Edith Cohen",
title = "Making routing robust to changing traffic demands:
algorithms and evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1193--1206",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Intra-domain traffic engineering can significantly
enhance the performance of large IP backbone networks.
Two important components of traffic engineering are
understanding the traffic demands and configuring the
routing protocols. These two components are
inter-linked, as it is widely believed that an accurate
view of traffic is important for optimizing the
configuration of routing protocols, and through that,
the utilization of the network. This basic premise,
however, seems never to have been quantified. How
important is accurate knowledge of traffic demands for
obtaining good utilization of the network? Since
traffic demand values are dynamic and illusive, is it
possible to obtain a routing that is `robust' to
variations in demands?We develop novel algorithms for
constructing optimal robust routings and for evaluating
the performance of any given routing on loosely
constrained rich sets of traffic demands. Armed with
these algorithms we explore these questions on a
diverse collection of ISP networks. We arrive at a
surprising conclusion: it is possible to obtain a
robust routing that guarantees a nearly optimal
utilization with a fairly limited knowledge of the
applicable traffic demands.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "oblivious routing; routing; traffic engineering",
}
@Article{Kohler:2006:OSA,
author = "Eddie Kohler and Jinyang Li and Vern Paxson and Scott
Shenker",
title = "Observed structure of addresses in {IP} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1207--1218",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the structure of addresses contained in
IPv4 traffic--specifically, the structural
characteristics of destination IP addresses seen on
Internet links, considered as a subset of the address
space. These characteristics have implications for
algorithms that deal with IP address aggregates, such
as routing lookups and aggregate-based congestion
control. Several example address structures are well
modeled by multifractal Cantor-like sets with two
parameters. This model may be useful for simulations
where realistic IP addresses are preferred. We also
develop concise characterizations of address
structures, including active aggregate counts and
discriminating prefixes. Our structural
characterizations are stable over short time scales at
a given site, and different sites have visibly
different characterizations, so that the
characterizations make useful `fingerprints' of the
traffic seen at a site. Also, changing traffic
conditions, such as worm propagation, significantly
alter these fingerprints.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "address space; address structures; multifractals;
network measurement",
}
@Article{Gueye:2006:CBG,
author = "Bamba Gueye and Artur Ziviani and Mark Crovella and
Serge Fdida",
title = "Constraint-based geolocation of {Internet} hosts",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1219--1232",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Geolocation of Internet hosts enables a new class of
location-aware applications. Previous measurement-based
approaches use reference hosts, called landmarks, with
a well-known geographic location to provide the
location estimation of a target host. This leads to a
discrete space of answers, limiting the number of
possible location estimates to the number of adopted
landmarks. In contrast, we propose Constraint-Based
Geolocation (CBG), which infers the geographic location
of Internet hosts using multilateration with distance
constraints to establish a continuous space of answers
instead of a discrete one. However, to use
multilateration in the Internet, the geographic
distances from the landmarks to the target host have to
be estimated based on delay measurements between these
hosts. This is a challenging problem because the
relationship between network delay and geographic
distance in the Internet is perturbed by many factors,
including queueing delays and the absence of
great-circle paths between hosts. CBG accurately
transforms delay measurements to geographic distance
constraints, and then uses multilateration to infer the
geolocation of the target host. Our experimental
results show that CBG outperforms previous geolocation
techniques. Moreover, in contrast to previous
approaches, our method is able to assign a confidence
region to each given location estimate. This allows a
location-aware application to assess whether the
location estimate is sufficiently accurate for its
needs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay measurement; geolocation; Internet;
multilateration; position measurement",
}
@Article{Shakkottai:2006:ENP,
author = "Srinivas Shakkottai and R. Srikant",
title = "Economics of network pricing with multiple {ISPs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1233--1245",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we examine how transit and customer
prices and quality of service are set in a network
consisting of multiple ISPs. Some ISPs may face an
identical set of circumstances in terms of potential
customer pool and running costs. We examine the
existence of equilibrium strategies in this situation
and show how positive profit can be achieved using
threat strategies with multiple qualities of service.
It is shown that if the number of ISPs competing for
the same customers is large then it can lead to price
wars. ISPs that are not co-located may not directly
compete for users, but are nevertheless involved in a
non-cooperative game of setting access and transit
prices for each other. They are linked economically
through a sequence of providers forming a hierarchy,
and we study their interaction by considering a
multi-stage game. We also consider the economics of
private exchange points and show that their viability
depends on fundamental limits on the demand and cost.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "internet economics; peering and transit; quality of
service; repeated games; Stackelberg games",
}
@Article{Wei:2006:FTM,
author = "David X. Wei and Cheng Jin and Steven H. Low and
Sanjay Hegde",
title = "{FAST TCP}: motivation, architecture, algorithms,
performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1246--1259",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We describe FAST TCP, a new TCP congestion control
algorithm for high-speed long-latency networks, from
design to implementation. We highlight the approach
taken by FAST TCP to address the four difficulties
which the current TCP implementation has at large
windows. We describe the architecture and summarize
some of the algorithms implemented in our prototype. We
characterize its equilibrium and stability properties.
We evaluate it experimentally in terms of throughput,
fairness, stability, and responsiveness.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "FAST TCP; implementation; Internet congestion control;
protocol design; stability analysis",
}
@Article{Han:2006:MPT,
author = "Huaizhong Han and Srinivas Shakkottai and C. V. Hollot
and R. Srikant and Don Towsley",
title = "Multi-path {TCP}: a joint congestion control and
routing scheme to exploit path diversity in the
{Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1260--1271",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of congestion-aware multi-path
routing in the Internet. Currently, Internet routing
protocols select only a single path between a source
and a destination. However, due to many policy routing
decisions, single-path routing may limit the achievable
throughput. In this paper, we envision a scenario where
multi-path routing is enabled in the Internet to take
advantage of path diversity. Using minimal congestion
feedback signals from the routers, we present a class
of algorithms that can be implemented at the sources to
stably and optimally split the flow between each
source-destination pair. We then show that the
connection-level throughput region of such multi-path
routing/congestion control algorithms can be larger
than that of a single-path congestion control scheme.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; multipath routing; Nyquist
stability; overlay networks",
}
@Article{Nace:2006:COM,
author = "Dritan Nace and Nhat-Linh Doan and Eric Gourdin and
Bernard Liau",
title = "Computing optimal max-min fair resource allocation for
elastic flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1272--1281",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the max-min fair resource
allocation problem as applied to elastic flows. We are
interested in computing the optimal max-min fair rate
allocation. The proposed approach is a linear
programming based one and allows the computation of
optimal routing paths with regard to max-min fairness,
in stable and known traffic conditions. We consider
nonbounded access rates, but we show how the proposed
approach can handle the case of upper-bounded access
rates. A proof of optimality and some computational
results are also presented.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "elastic flows; linear programming; max-min fairness;
optimization; resource allocation",
}
@Article{Wang:2006:AOF,
author = "Wei-Hua Wang and Marimuthu Palaniswami and Steven H.
Low",
title = "Application-oriented flow control: fundamentals,
algorithms and fairness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1282--1291",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper is concerned with flow control and resource
allocation problems in computer networks in which
real-time applications may have hard quality of service
(QoS) requirements. Recent optimal flow control
approaches are unable to deal with these problems since
QoS utility functions generally do not satisfy the
strict concavity condition in real-time applications.
For elastic traffic, we show that bandwidth allocations
using the existing optimal flow control strategy can be
quite unfair. If we consider different QoS requirements
among network users, it may be undesirable to allocate
bandwidth simply according to the traditional max-min
fairness or proportional fairness. Instead, a network
should have the ability to allocate bandwidth resources
to various users, addressing their real utility
requirements. For these reasons, this paper proposes a
new distributed flow control algorithm for multiservice
networks, where the application's utility is only
assumed to be continuously increasing over the
available bandwidth. In this, we show that the
algorithm converges, and that at convergence, the
utility achieved by each application is well balanced
in a proportionally (or max-min) fair manner.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; quality of service; real-time
application; resource allocation; utility max-min
fairness; utility proportional fairness",
}
@Article{Boucouvalas:2006:OIP,
author = "Anthony C. Boucouvalas and Pi Huang",
title = "{OBEX} over {IrDA}: performance analysis and
optimization by considering multiple applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1292--1301",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "OBEX (Object Exchange Protocol) is a session protocol
designed to exchange all kind of objects between
portable devices using different ad hoc wireless links
including IrDA and Bluetooth. This paper develops a
mathematical model for OBEX over the IrDA protocol
stack by considering multiple applications and presence
of bit errors. The model is also verified by simulation
results. We derive throughput equations and carry out
an optimization study focusing on four major
parameters: OBEX packet size, TinyTP (IrDA transport
layer) buffer size, IrLAP (IrDA link layer) frame and
window size. Equations are derived for the optimum
IrLAP window and frame sizes. Numerical results show
significant improvement on OBEX performance using the
optimized parameters. The major contribution of this
work is the modelling of OBEX including the low layer
protocols and optimization of the overall throughput by
appropriate parameter selection.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bluetooth; IrDA; OBEX; optimization",
}
@Article{Chakareski:2006:RER,
author = "Jacob Chakareski and Philip A. Chou",
title = "{RaDiO} edge: rate-distortion optimized proxy-driven
streaming from the network edge",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1302--1312",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses the problem of streaming
packetized media over a lossy packet network through an
intermediate proxy server to a client, in a
rate-distortion optimized way. The proxy, located at
the junction of the backbone network and the last hop
to the client, coordinates the communication between
the media server and the client using hybrid
receiver/sender-driven streaming in a rate-distortion
optimization framework. The framework enables the proxy
to determine at every instant which packets, if any, it
should either request from the media server or
(re)transmit directly to the client, in order to meet
constraints on the average transmission rates on the
backbone and the last hop while minimizing the average
end-to-end distortion. Performance gains are observed
over rate-distortion optimized sender-driven systems
for streaming packetized video content. The improvement
in performance depends on the quality of the network
path both in the backbone network and along the last
hop.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "audio coding; channel coding; edge-based streaming;
error control; Internet; Markov processes; multimedia
communication; optimal control; protocols; proxy
servers; rate-distortion; video coding",
}
@Article{Fan:2006:TTS,
author = "Xingzhe Fan and Kartikeya Chandrayana and Murat Arcak
and Shivkumar Kalyanaraman and John Ting-Yung Wen",
title = "A two-time-scale design for edge-based detection and
rectification of uncooperative flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1313--1322",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Existing Internet protocols rely on cooperative
behavior of end users. We present a control-theoretic
algorithm to counteract uncooperative users which
change their congestion control schemes to gain larger
bandwidth. This algorithm rectifies uncooperative
users; that is, forces them to comply with their fair
share, by adjusting the prices fed back to them. It is
to be implemented at the edge of the network (e.g., by
ISPs), and can be used with any congestion notification
policy deployed by the network. Our design achieves a
separation of time-scales between the network
congestion feedback loop and the price-adjustment loop,
thus recovering the fair allocation of bandwidth upon a
fast transient phase.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network congestion control; singular-perturbations;
uncooperative flow control",
}
@Article{Xie:2006:ILR,
author = "Feng Xie and Gang Feng and Chee Kheong Siew",
title = "The impact of loss recovery on congestion control for
reliable multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1323--1335",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most existing reliable multicast congestion control
(RMCC) mechanisms try to emulate TCP congestion control
behaviors for achieving TCP-compatibility. However,
different loss recovery mechanisms employed in reliable
multicast protocols, especially NAK-based
retransmission and local loss recovery mechanisms, may
lead to different behaviors and performance of
congestion control. As a result, reliable multicast
flows might be identified and treated as
non-TCP-friendly by routers in the network. It is
essential to understand those influences and take them
into account in the development and deployment of
reliable multicast services. In this paper, we study
the influences comprehensively through analysis,
modelling and simulations. We demonstrate that
NAK-based retransmission and/or local loss recovery
mechanisms are much more robust and efficient in
recovering from single or multiple packet losses within
a single round-trip time (RTT). For a better
understanding on the impact of loss recovery on RMCC,
we derive expressions for steady-state throughput of
NAK-based RMCC schemes, which clearly brings out the
throughput advantages of NAK-based RMCC over TCP Reno.
We also show that timeout effects have little impact on
shaping the performance of NAK-based RMCC schemes
except for extremely high loss rates (>0.2). Finally,
we use simulations to validate our findings and show
that local loss recovery may further increase the
throughput and deteriorate the fairness properties of
NAK-based RMCC schemes. These findings and insights
could provide useful recommendations for the design,
testing and deployment of reliable multicast protocols
and services.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; loss recovery; modelling; reliable
multicast; TCP-friendly",
}
@Article{Lorenz:2006:EQP,
author = "Dean H. Lorenz and Ariel Orda and Danny Raz and Yuval
Shavitt",
title = "Efficient {QoS} partition and routing of unicast and
multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1336--1347",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study problems related to supporting
unicast and multicast connections with quality of
service (QoS) requirements. We investigate the problem
of optimal routing and resource allocation in the
context of performance dependent costs. In this
context, each network element can offer several QoS
guarantees, each associated with a different cost. This
is a natural extension to the commonly used bi-criteria
model, where each link is associated with a single
delay and a single cost. This framework is simple yet
strong enough to model many practical interesting
networking problems. An important problems in this
framework is finding a good path for a connection that
minimizes the cost while retaining the end-to-end delay
requirement. Once such a path (or a tree, in the
multicast case) is found, one needs to partition the
end-to-end QoS requirements among the links of the path
(tree). We consider the case of general integer cost
functions (where delays and cost are integers). As the
related problem is NP complete, we concentrate on
finding efficient $ \epsilon $-approximation solutions.
We improve on recent previous results by Erg{\"u}n et
al., Lorenz and Orda, and Raz and Shavitt, both in
terms of generality as well as in terms of complexity
of the solution. In particular, we present novel
approximation techniques that yield the best known
complexity for the unicast QoS routing problem, and the
first approximation algorithm for the QoS partition
problem on trees, both for the centralized and
distributed cases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation; multicast; QoS; QoS-dependent costs;
resource allocation; routing",
}
@Article{Lin:2006:OBA,
author = "Xiaojun Lin and Ness B. Shroff",
title = "An optimization-based approach for {QoS} routing in
high-bandwidth networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1348--1361",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose an optimization-based
approach for Quality of Service (QoS) routing in
high-bandwidth networks. We view a network that employs
QoS routing as an entity that distributively optimizes
some global utility function. By solving the
optimization problem, the network is driven to an
efficient operating point. In earlier work, it has been
shown that when the capacity of the network is large,
this optimization takes on a simple form, and once the
solution to this optimization problem is found, simple
proportional QoS routing schemes will suffice. However,
this optimization problem requires global information.
We develop a distributed and adaptive algorithm that
can efficiently solve the optimization online. Compared
with existing QoS routing schemes, the proposed
optimization-based approach has the following
advantages: (1) the computation and communication
overhead can be greatly reduced without sacrificing
performance; (2) the operating characteristics of the
network can be analytically studied; and (3) the
desired operating point can be tuned by choosing
appropriate utility functions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "high-bandwidth networks; optimization-based approach;
QoS routing",
}
@Article{Ramabhadran:2006:SRR,
author = "Sriram Ramabhadran and Joseph Pasquale",
title = "The {Stratified Round Robin} scheduler: design,
analysis and implementation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1362--1373",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Stratified Round Robin is a fair-queueing packet
scheduler which has good fairness and delay properties,
and low quasi-$ O(1) $ o complexity. It is unique among
all other schedulers of comparable complexity in that
it provides a single packet delay bound that is
independent of the number of flows. Importantly, it is
also amenable to a simple hardware implementation, and
thus fills a current gap between scheduling algorithms
that have provably good performance and those that are
feasible and practical to implement in high-speed
routers. We present both analytical results and
simulations to demonstrate its performance
properties.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "high-speed router design; packet scheduling; quality
of service",
}
@Article{Rosenblum:2006:AFS,
author = "Michael Rosenblum and Constantine Caramanis and Michel
X. Goemans and Vahid Tarokh",
title = "Approximating fluid schedules in crossbar
packet-switches and {Banyan} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1374--1387",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a problem motivated by the desire to
provide flexible, rate-based, quality of service
guarantees for packets sent over input queued switches
and switch networks. Our focus is solving a type of
online traffic scheduling problem, whose input at each
time step is a set of desired traffic rates through the
switch network. These traffic rates in general cannot
be exactly achieved since they assume arbitrarily small
fractions of packets can be transmitted at each time
step. The goal of the traffic scheduling problem is to
closely approximate the given sequence of traffic rates
by a sequence of transmissions in which only whole
packets are sent. We prove worst-case bounds on the
additional buffer use, which we call backlog, that
results from using such an approximation. We first
consider the $ N \times N $, input queued, crossbar
switch. Our main result is an online packet-scheduling
algorithm using no speedup that guarantees backlog at
most $ (N + 1)^2 / 4 $ packets at each input port and
each output port. Upper bounds on worst-case backlog
have been proved for the case of constant fluid
schedules, such as the $ N^2 - 2 N + 2 $ bound of
Chang, Chen, and Huang (INFOCOM, 2000). Our main result
for the crossbar switch is the first, to our knowledge,
to bound backlog in terms of switch size $N$ for
arbitrary, time-varying fluid schedules, without using
speedup. Our main result for Banyan networks is an
exact characterization of the speedup required to
maintain bounded backlog, in terms of polytopes derived
from the network topology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "combinatorics; graph theory; network calculus;
packet-switching; scheduling",
}
@Article{Ali:2006:GSS,
author = "Maher Ali",
title = "Generalized sharing in survivable optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "14",
number = "6",
pages = "1388--1399",
month = dec,
year = "2006",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:08 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Shared path protection has been demonstrated to be a
very efficient survivability scheme for optical
networking. In this scheme, multiple backup paths can
share a given optical channel if their corresponding
primary routes are not expected to fail simultaneously.
The focus in this area has been the optimization of the
total channels (i.e., bandwidth) provisioned in the
network through the intelligent routing of primary and
backup routes. In this work, we extend the current path
protection sharing scheme and introduce the Generalized
Sharing Concept. In this concept, we allow for
additional sharing of important node devices. These
node devices (e.g., optical-electronic-optical
regenerators (OEOs), pure all-optical converters, etc.)
constitute the dominant cost factor in an optical
backbone network and the reduction of their number is
of paramount importance. For demonstration purposes, we
extend the concept of 1: $N$ shared path protection to
allow for the sharing of electronic regenerators needed
for coping with optical transmission impairments. Both
design and control plane issues are discussed through
numerical examples. Considerable cost reductions in
electronic budget are demonstrated.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical networks; shared protection",
}
@Article{Baughman:2007:CPP,
author = "Nathaniel E. Baughman and Marc Liberatore and Brian
Neil Levine",
title = "Cheat-proof playout for centralized and peer-to-peer
gaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "1--13",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We explore exploits possible for cheating in
real-time, multiplayer games for both client-server and
serverless architectures. We offer the first
formalization of cheating in online games and propose
an initial set of strong solutions. We propose a
protocol that has provable anti-cheating guarantees, is
provably safe and live, but suffers a performance
penalty. We then develop an extended version of this
protocol, called asynchronous synchronization, which
avoids the penalty, is serverless, offers provable
anti-cheating guarantees, is robust in the presence of
packet loss, and provides for significantly increased
communication performance. This technique is applicable
to common game features as well as clustering and
cell-based techniques for massively multiplayer games.
Specifically, we provide a zero-knowledge proof
protocol so that players are within a specific range of
each other, and otherwise have no notion of their
distance. Our performance claims are backed by analysis
using a simulation based on real game traces.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "gaming; multimedia communication; peer-to-peer
networking; security",
}
@Article{Kompella:2007:SAD,
author = "Ramana Rao Kompella and Sumeet Singh and George
Varghese",
title = "On scalable attack detection in the network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "14--25",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Current intrusion detection and prevention systems
seek to detect a wide class of network intrusions
(e.g., DoS attacks, worms, port scans) at network
vantage points. Unfortunately, even today, many IDS
systems we know of keep per-connection or per-flow
state to detect malicious TCP flows. Thus, it is hardly
surprising that these IDS systems have not scaled to
multigigabit speeds. By contrast, both router lookups
and fair queuing have scaled to high speeds using
aggregation via prefix lookups or DiffServ. Thus, in
this paper, we initiate research into the question as
to whether one can detect attacks without keeping
per-flow state. We will show that such aggregation,
while making fast implementations possible, immediately
causes two problems. First, aggregation can cause
behavioral aliasing where, for example, good behaviors
can aggregate to look like bad behaviors. Second,
aggregated schemes are susceptible to spoofing by which
the intruder sends attacks that have appropriate
aggregate behavior. We examine a wide variety of DoS
and scanning attacks and show that several categories
(bandwidth based, claim-and-hold, port-scanning) can be
scalably detected. In addition to existing approaches
for scalable attack detection, we propose a novel data
structure called partial completion filters (PCFs) that
can detect claim-and-hold attacks scalably in the
network. We analyze PCFs both analytically and using
experiments on real network traces to demonstrate how
we can tune PCFs to achieve extremely low false
positive and false negative probabilities.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data structures; denial of service; network attacks;
routers; scanning; streaming algorithms; syn flooding",
}
@Article{Ramaswamy:2007:HSP,
author = "Ramaswamy Ramaswamy and Tilman Wolf",
title = "High-speed prefix-preserving {IP} address
anonymization for passive measurement systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "26--39",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Passive network measurement and packet header trace
collection are vital tools for network operation and
research. To protect a user's privacy, it is necessary
to anonymize header fields, particularly IP addresses.
To preserve the correlation between IP addresses,
prefix-preserving anonymization has been proposed. The
limitations of this approach for a high-performance
measurement system are the need for complex
cryptographic computations and potentially large
amounts of memory. We propose a new prefix-preserving
anonymization algorithm, top-hash subtree-replicated
anonymization (TSA), that features three novel
improvements: precomputation, replicated subtrees, and
top hashing. TSA makes anonymization practical to be
implemented on network processors or dedicated logic at
Gigabit rates. The performance of TSA is compared with
a conventional cryptography based prefix-preserving
anonymization scheme which utilizes caching. TSA
performs better as it requires no online cryptographic
computation and a small number of memory lookups per
packet. Our analytic comparison of the susceptibility
to attacks between conventional anonymization and our
approach shows that TSA performs better for small scale
attacks and comparably for medium scale attacks. The
processing cost for TSA is reduced by two orders of
magnitude and the memory requirements are a few
Megabytes. The ability to tune the memory requirements
and security level makes TSA ideal for a broad range of
network systems with different capabilities.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anonymization; network measurement; privacy",
}
@Article{Wang:2007:DAS,
author = "Haining Wang and Cheng Jin and Kang G. Shin",
title = "Defense against spoofed {IP} traffic using hop-count
filtering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "40--53",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "IP spoofing has often been exploited by Distributed
Denial of Service (DDoS) attacks to: (1) conceal
flooding sources and dilute localities in flooding
traffic, and (2) coax legitimate hosts into becoming
reflectors, redirecting and amplifying flooding
traffic. Thus, the ability to filter spoofed IP packets
near victim servers is essential to their own
protection and prevention of becoming involuntary DoS
reflectors. Although an attacker can forge any field in
the IP header, he cannot falsify the number of hops an
IP packet takes to reach its destination. More
importantly, since the hop-count values are diverse, an
attacker cannot randomly spoof IP addresses while
maintaining consistent hop-counts. On the other hand,
an Internet server can easily infer the hop-count
information from the Time-to-Live (TTL) field of the IP
header. Using a mapping between IP addresses and their
hop-counts, the server can distinguish spoofed IP
packets from legitimate ones. Based on this
observation, we present a novel filtering technique,
called Hop-Count Filtering (HCF)--which builds an
accurate IP-to-hop-count (IP2HC) mapping table--to
detect and discard spoofed IP packets. HCF is easy to
deploy, as it does not require any support from the
underlying network. Through analysis using network
measurement data, we show that HCF can identify close
to 90\% of spoofed IP packets, and then discard them
with little collateral damage. We implement and
evaluate HCF in the Linux kernel, demonstrating its
effectiveness with experimental measurements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "DDoS attacks; hop-count; host-based; IP spoofing",
}
@Article{Jaiswal:2007:MCS,
author = "Sharad Jaiswal and Gianluca Iannaccone and Christophe
Diot and Jim Kurose and Don Towsley",
title = "Measurement and classification of out-of-sequence
packets in a {Tier-1} {IP} backbone",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "54--66",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a classification methodology and a
measurement study for out-of-sequence packets in TCP
connections going over the Sprint IP backbone.
Out-of-sequence packets can result from many events
including loss, looping, reordering, or duplication in
the network. It is important to quantify and understand
the causes of such out-of-sequence packets since it is
an indicator of the performance of a TCP connection,
and the quality of its end-end path. Our study is based
on passively observed packets from a point inside a
large backbone network--as opposed to actively sending
and measuring end-end probe traffic at the sender or
receiver. A new methodology is thus required to infer
the causes of a connection's out-of-sequence packets
using only measurements taken in the `middle' of the
connection's end-end path. We describe techniques that
classify observed out-of-sequence behavior based only
on the previously- and subsequently-observed packets
within a connection and knowledge of how TCP behaves.
We analyze numerous several-hour packet-level traces
from a set of OC-12 and OC-48 links for tens of
millions connections generated in nearly 7600 unique
ASes. We show that using our techniques, it is possible
to classify almost all out-of-sequence packets in our
traces and that we can quantify the uncertainty in our
classification. Our measurements show a relatively
consistent rate of out-of-sequence packets of
approximately 4\%. We observe that a majority of
out-of-sequence packets are retransmissions, with a
smaller percentage resulting from in-network
reordering.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "internet measurements; out-of-sequence packets;
passive measurements; TCP/IP performance",
}
@Article{Arifler:2007:FAA,
author = "Dogu Arifler and Gustavo {de Veciana} and Brian L.
Evans",
title = "A factor analytic approach to inferring congestion
sharing based on flow level measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "67--79",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet traffic primarily consists of packets from
elastic flows, i.e., Web transfers, file transfers, and
e-mail, whose transmissions are mediated via the
Transmission Control Protocol (TCP). In this paper, we
develop a methodology to process TCP flow measurements
in order to analyze throughput correlations among TCP
flow classes that can be used to infer congestion
sharing in the Internet. The primary contributions of
this paper are: (1) development of a technique for
processing flow records suitable for inferring
congested resource sharing; (2) evaluation of the use
of factor analysis on processed flow records to explore
which TCP flow classes might share congested resources;
and (3) validation of our inference methodology using
bootstrap methods and nonintrusive, flow level
measurements collected at a single network site. Our
proposal for using flow level measurements to infer
congestion sharing differs significantly from previous
research that has employed packet level measurements
for making inferences. Possible applications of our
method include network monitoring and root cause
analysis of poor performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "factor analysis; inference of congestion sharing;
network measurement",
}
@Article{Chi:2007:LFN,
author = "Caixia Chi and Dawei Huang and David Lee and XiaoRong
Sun",
title = "Lazy flooding: a new technique for information
dissemination in distributed network systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "80--92",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Flooding is a commonly used technique for network
resource and topology information dissemination in the
data communication networks. However, due to the
well-known $N$-squared problem it causes network delay
in response or even congestion. We propose a new
flooding technique, called Lazy Flooding; it floods
only when links reach a certain status. It
significantly cuts down the number of floods and thus
improves the data communication network response time.
On the other hand, it has negligible effect on the
network performance due to the selected flooding.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "flooding; link state advertisement; optical networks;
routing",
}
@Article{Baek:2007:SEB,
author = "Seung Jun Baek and Gustavo {De Veciana}",
title = "Spatial energy balancing through proactive multipath
routing in wireless multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "93--104",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the use of proactive
multipath routing to achieve energy-efficient operation
of ad hoc wireless networks. The focus is on optimizing
tradeoffs between the energy cost of spreading traffic
and the improved spatial balance of energy burdens. We
propose a simple scheme for multipath routing based on
spatial relationships among nodes. Then, combining
stochastic geometric and queueing models, we develop a
continuum model for such networks, permitting an
evaluation of different types of scenarios, i.e., with
and without energy replenishing and storage
capabilities. We propose a parameterized family of
energy balancing strategies and study the spatial
distributions of energy burdens based on their
associated second-order statistics. Our analysis and
simulations show the fundamental importance of the
tradeoff explored in this paper, and how its
optimization depends on the relative values of the
energy reserves/storage, replenishing rates, and
network load characteristics. For example, one of our
results shows that the degree of spreading should
roughly scale as the square root of the bits {\.c}
meters load offered by a session. Simulation results
confirm that proactive multipath routing decreases the
probability of energy depletion by orders of magnitude
versus that of a shortest path routing scheme when the
initial energy reserve is high.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Gaussian random field; M/GI/1 queue; sensor networks;
shot-noise process; stochastic geometry",
}
@Article{Paschalidis:2007:AOT,
author = "Ioannis Ch. Paschalidis and Wei Lai and David
Starobinski",
title = "Asymptotically optimal transmission policies for
large-scale low-power wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "105--118",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider wireless sensor networks with multiple
gateways and multiple classes of traffic carrying data
generated by different sensory inputs. The objective is
to devise joint routing, power control and transmission
scheduling policies in order to gather data in the most
efficient manner while respecting the needs of
different sensing tasks (fairness). We formulate the
problem as maximizing the utility of transmissions
subject to explicit fairness constraints and propose an
efficient decomposition algorithm drawing upon
large-scale decomposition ideas in mathematical
programming. We show that our algorithm terminates in a
finite number of iterations and produces a policy that
is asymptotically optimal at low transmission power
levels. Furthermore, we establish that the utility
maximization problem we consider can, in principle, be
solved in polynomial time. Numerical results show that
our policy is near-optimal, even at high power levels,
and far superior to the best known heuristics at low
power levels. We also demonstrate how to adapt our
algorithm to accommodate energy constraints and node
failures. The approach we introduce can efficiently
determine near-optimal transmission policies for
dramatically larger problem instances than an
alternative enumeration approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mathematical programming/optimization; routing;
transmission scheduling; wireless sensor networks",
}
@Article{Eriksson:2007:DDA,
author = "Jakob Eriksson and Michalis Faloutsos and Srikanth V.
Krishnamurthy",
title = "{DART}: dynamic address routing for scalable ad hoc
and mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "119--132",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is well known that the current ad hoc protocol
suites do not scale to work efficiently in networks of
more than a few hundred nodes. Most current ad hoc
routing architectures use flat static addressing and
thus, need to keep track of each node individually,
creating a massive overhead problem as the network
grows. Could dynamic addressing alleviate this problem?
In this paper, we argue that the use of dynamic
addressing can enable scalable routing in ad hoc
networks. We provide an initial design of a routing
layer based on dynamic addressing, and evaluate its
performance. Each node has a unique permanent
identifier and a transient routing address, which
indicates its location in the network at any given
time. The main challenge is dynamic address allocation
in the face of node mobility. We propose mechanisms to
implement dynamic addressing efficiently. Our initial
evaluation suggests that dynamic addressing is a
promising approach for achieving scalable routing in
large ad hoc and mesh networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; mesh networks; routing; scalability;
wireless networks",
}
@Article{Yi:2007:HHC,
author = "Yung Yi and Sanjay Shakkottai",
title = "Hop-by-hop congestion control over a wireless
multi-hop network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "133--144",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper focuses on congestion control over
multi-hop, wireless networks. In a wireless network, an
important constraint that arises is that due to the MAC
(Media Access Control) layer. Many wireless MACs use a
time-division strategy for channel access, where, at
any point in space, the physical channel can be
accessed by a single user at each instant of
time.\par
In this paper, we develop a fair hop-by-hop congestion
control algorithm with the MAC constraint being imposed
in the form of a channel access time constraint, using
an optimization-based framework. In the absence of
delay, we show that this algorithm are globally stable
using a Lyapunov-function-based approach. Next, in the
presence of delay, we show that the hop-by-hop control
algorithm has the property of spatial spreading. In
other words, focused loads at a particular spatial
location in the network get `smoothed' over space. We
derive bounds on the `peak load' at a node, both with
hop-by-hop control, as well as with end-to-end control,
show that significant gains are to be had with the
hop-by-hop scheme, and validate the analytical results
with simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "control theory; mathematical
programming/optimization",
}
@Article{Song:2007:CLA,
author = "Liang Song and Dimitrios Hatzinakos",
title = "A cross-layer architecture of wireless sensor networks
for target tracking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "145--158",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose the Low Energy Self-Organizing Protocol
(LESOP) for target tracking in dense wireless sensor
networks. A cross-layer design perspective is adopted
in LESOP for high protocol efficiency, where direct
interactions between the Application layer and the
Medium Access Control (MAC) layer are exploited. Unlike
the classical Open Systems Interconnect (OSI) paradigm
of communication networks, the Transport and Network
layers are excluded in LESOP to simplify the protocol
stack. A lightweight yet efficient target localization
algorithm is proposed and implemented, and a Quality of
Service (QoS) knob is found to control the tradeoff
between the tracking error and the network energy
consumption. Furthermore, LESOP serves as the first
example in demonstrating the migration from the OSI
paradigm to the Embedded Wireless Interconnect (EWI)
architecture platform, a two-layer efficient
architecture proposed here for wireless sensor
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "application layer; embedded wireless interconnect;
medium access control; open systems interconnect;
target tracking; wireless sensor networks",
}
@Article{Malone:2007:MDC,
author = "David Malone and Ken Duffy and Doug Leith",
title = "Modeling the 802.11 distributed coordination function
in nonsaturated heterogeneous conditions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "159--172",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Analysis of the 802.11 CSMA/CA mechanism has received
considerable attention recently. Bianchi presented an
analytic model under a saturated traffic assumption.
Bianchi's model is accurate, but typical network
conditions are nonsaturated and heterogeneous. We
present an extension of his model to a nonsaturated
environment. The model's predictions, validated against
simulation, accurately capture many interesting
features of nonsaturated operation. For example, the
model predicts that peak throughput occurs prior to
saturation. Our model allows stations to have different
traffic arrival rates, enabling us to address the
question of fairness between competing flows. Although
we use a specific arrival process, it encompasses a
wide range of interesting traffic types including, in
particular, VoIP.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "802.11; CSMA/CA; heterogeneous network; nonsaturated
traffic",
}
@Article{Fei:2007:PTR,
author = "Zongming Fei and Mengkun Yang",
title = "A proactive tree recovery mechanism for resilient
overlay multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "173--186",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Overlay multicast constructs a multicast delivery tree
among end hosts. Unlike traditional IP multicast, the
nonleaf nodes in the tree are normal end hosts, which
are potentially more susceptible to failures than
routers and may leave the multicast group voluntarily.
In these cases, all downstream nodes are affected.
Thus, an important problem for making overlay multicast
more dependable is how to recover from node departures
in order to minimize the disruption of service to those
affected nodes. In this paper, we propose a proactive
tree recovery mechanism to make the overlay multicast
resilient to these failures and unexpected events.
Rather than letting downstream nodes try to find a new
parent after a node departure, each non-leaf node
precalculates a parent-to-be for each of its children.
When this non-leaf node is gone, all its children can
find their respective new parents immediately. The
salient feature of the approach is that rescue plans
for multiple non-leaf nodes can work together for their
respective children when they fail or leave at the same
time. Extensive simulations demonstrate that our
proactive approach can recover from node departures
much faster than reactive methods, while the quality of
trees restored and the cost of recovery are
reasonable.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "failure recovery; overlay multicast; tree
restoration",
}
@Article{Kang:2007:MBE,
author = "Seong-Ryong Kang and Dmitri Loguinov",
title = "Modeling best-effort and {FEC} streaming of scalable
video in lossy network channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "187--200",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Video applications that transport delay-sensitive
multimedia over best-effort networks usually require
special mechanisms that can overcome packet loss
without using retransmission. In response to this
demand, forward-error correction (FEC) is often used in
streaming applications to protect video and audio data
in lossy network paths; however, studies in the
literature report conflicting results on the benefits
of FEC over best-effort streaming. To address this
uncertainty, we start with a baseline case that
examines the impact of packet loss on scalable
(FGS-like) video in best-effort networks and derive a
closed-form expression for the loss penalty imposed on
embedded coding schemes under several simple loss
models. Through this analysis, we find that the utility
(i.e., usefulness to the user) of unprotected video
converges to zero as streaming rates become high. We
then study FEC-protected video streaming, re-derive the
same utility metric, and show that for all values of
loss rate inclusion of FEC overhead substantially
improves the utility of video compared to the
best-effort case. We finish the paper by constructing a
dynamic controller on the amount of FEC that maximizes
the utility of scalable video and show that the
resulting system achieves a significantly better PSNR
quality than alternative fixed-overhead methods.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "FEC rate control; Markov-chain loss; MPEG-4 FGS;
utility of video; video streaming",
}
@Article{Xue:2007:FPS,
author = "Guoliang Xue and Arunabha Sen and Weiyi Zhang and Jian
Tang and Krishnaiya Thulasiraman",
title = "Finding a path subject to many additive {QoS}
constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "201--211",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A fundamental problem in quality-of-service (QoS)
routing is to find a path between a source-destination
node pair that satisfies two or more end-to-end QoS
constraints. We model this problem using a graph with
$n$ vertices and $m$ edges with $K$ additive QoS
parameters associated with each edge, for any constant
$ K \geq 2$. This problem is known to be NP-hard. Fully
polynomial time approximation schemes (FPTAS) for the
case of $ K = 2$ have been reported in the literature.
We concentrate on the general case and make the
following contributions. (1) We present a very simple $
O(K m + n \log n)$ time $K$-approximation algorithm
that can be used in hop-by-hop routing protocols. (2)
We present an FPTAS for one optimization version of the
QoS routing problem with a time complexity of $ O(m(n /
\epsilon)^{K - 1})$. (3) We present an FPTAS for
another optimization version of the QoS routing problem
with a time complexity of $ O(n \log n + m (H /
\epsilon)^{K - 1})$ when there exists an $H$-hop path
satisfying all QoS constraints. When $K$ is reduced to
2, our results compare favorably with existing
algorithms. The results of this paper hold for both
directed and undirected graphs. For ease of
presentation, undirected graph is used.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "efficient approximation algorithms; multiple additive
constraints; QoS routing",
}
@Article{Lee:2007:EPS,
author = "Yong Lee and Jianyu Lou and Junzhou Luo and Xiaojun
Shen",
title = "An efficient packet scheduling algorithm with deadline
guarantees for input-queued switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "212--225",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Input-queued (IQ) switches overcome the scalability
problem suffered by output-queued switches. In order to
provide differential quality of services (QoS), we need
to efficiently schedule a set of incoming packets so
that every packet can be transferred to its destined
output port before its deadline. If no such a schedule
exists, we wish to find one that allows a maximum
number of packets to meet their deadlines. Recently,
this problem has been proved to be NP-complete if three
or more distinct deadlines (classes) are present in the
set. In this paper, we propose a novel algorithm named
Flow-based Iterative Packet Scheduling (FIPS) for this
scheduling problem. A key component in FIPS is a
non-trivial algorithm that solves the problem for the
case where two classes are present in the packet set.
By repeatedly applying the algorithm for two classes,
we solve the general case of an arbitrary number of
classes more efficiently. Applying FIPS to a
frame-based model effectively achieves differential QoS
provision in IQ switches. Using simulations, we have
compared FIPS performance with five well-known existing
heuristic algorithms including Earliest-Deadline-First
(EDF), Minimum-Laxity-First (MLF) and their variants.
The simulation results demonstrate that our new
algorithm solves the deadline guaranteed packet
scheduling problem with a much higher success rate and
a much lower packet drop ratio than all other
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "input-queued switch; network flow; packet scheduling;
quality of service; real time scheduling",
}
@Article{Fayoumi:2007:SMB,
author = "Ayman G. Fayoumi and Anura P. Jayasumana",
title = "A surjective-mapping based model for optical
shared-buffer cross-connect",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "226--233",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A Surjective-Mapping based Model (SMM) is developed to
evaluate the performance of a slotted optical
shared-buffer cross-connect. The model is simple,
accurate, and yet provides comprehensive performance
characteristics of the switch. The model also overcomes
the limitations of traditional Markovian based models
in evaluating moderate to large switches, associated
with the explosion of number of states. The model is
verified using simulation results for different switch
sizes and different numbers of delay lines. The model
enables dimensioning the switch architecture to meet
the target performance. Performance of optical
shared-buffer cross-connect is analyzed in detail, in
terms of blocking probability, delay distribution, and
delay line utilization.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "combinatorics; optical communication; packet
switching; shared memory; simulations",
}
@Article{Zhang:2007:LOW,
author = "Zhenghao Zhang and Yuanyuan Yang",
title = "On-line optimal wavelength assignment in {WDM}
networks with shared wavelength converter pool",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "1",
pages = "234--245",
month = feb,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:53:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study on-line wavelength assignment
in wavelength-routed WDM networks under both unicast
and multicast traffic where nodes in the networks have
wavelength conversion ability. Since wavelength
converters are still expensive and difficult to
implement, we consider the case where nodes in networks
have only a limited number of converters that are
shared by all input channels. We study the problem of
setting up connections in such networks using minimum
number of wavelength converters. For unicast traffic,
we first study the problem of setting up a lightpath on
a given link-path with minimum number of conversions.
We give a simple algorithm that solves it in $ O(t k) $
time where $t$ is the number of links on the path and
$k$ is the number of wavelengths per fiber, as compared
to the best known existing method that needs to
construct an auxiliary graph and apply the Dijkstra's
algorithm. We also consider the problem of setting up a
lightpath while using wavelength converters at nodes
with fewer available converters only when necessary,
and give an $ O(t k)$ time algorithm. We then
generalize this technique to WDM networks with
arbitrary topologies and give an algorithm that sets up
an optimal lightpath network-wide in $ O(N k + L k)$
time, where $N$ and $L$ are the number of nodes and
links in the network, respectively. We also consider
multicast traffic in this paper. Finding an optimal
multicast light-tree is known to be NP-hard and is
usually solved by first finding a link-tree then
finding a light-tree on the link-tree. Finding an
optimal link-tree is also NP-hard and has been
extensively studied. Thus, we focus on the second
problem which is to set up a light-tree on a given
link-tree with minimum number of conversions. We
propose a new multicast conversion model with which the
output of the wavelength converter is split-table to
save the usage of converters. We show that under this
model the problem of setting up an optimal light-tree
is NP-hard and then give efficient heuristics to solve
it approximately.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multicast; on-line algorithms; optical networks;
routing; shared wavelength converter pool; unicast;
wavelength assignment; wavelength conversion;
wavelength division multiplexing (WDM)",
}
@Article{Feamster:2007:NWP,
author = "Nick Feamster and Jennifer Rexford",
title = "Network-wide prediction of {BGP} routes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "253--266",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents provably correct algorithms for
computing the outcome of the BGP route-selection
process for each router in a network, without
simulating the complex details of BGP message passing.
The algorithms require only static inputs that can be
easily obtained from the routers: the BGP routes
learned from neighboring domains, the import policies
configured on the BGP sessions, and the internal
topology. Solving the problem would be easy if the
route-selection process were deterministic and every
router received all candidate BGP routes. However, two
important features of BGP--the Multiple Exit
Discriminator (MED) attribute and route
reflectors--violate these properties. After presenting
a simple route-prediction algorithm for networks that
do not use these features, we present algorithms that
capture the effects of the MED attribute and route
reflectors in isolation. Then, we explain why the
interaction between these two features precludes
efficient route prediction. These two features also
create difficulties for the operation of BGP itself,
leading us to suggest improvements to BGP that achieve
the same goals as MED and route reflection without
introducing the negative side effects.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "networks; protocols; routing",
}
@Article{DiBattista:2007:CTR,
author = "Giuseppe {Di Battista} and Thomas Erlebach and
Alexander Hall and Maurizio Patrignani and Maurizio
Pizzonia and Thomas Schank",
title = "Computing the types of the relationships between
autonomous systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "267--280",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the problem of computing the types of
the relationships between Internet Autonomous Systems.
We refer to the model introduced by Gao [IEEE/ACM
TRANSACTIONS ON NETWORKING, 9(6):733-645, 2001] and
Subramanian et al. (IEEE Infocom, 2002) that bases the
discovery of such relationships on the analysis of the
AS paths extracted from the BGP routing tables. We
characterize the time complexity of the above problem,
showing both NP-completeness results and efficient
algorithms for solving specific cases. Motivated by the
hardness of the general problem, we propose
approximation algorithms and heuristics based on a
novel paradigm and show their effectiveness against
publicly available data sets. The experiments provide
evidence that our algorithms perform significantly
better than state-of-the-art heuristics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; Internet; routing",
}
@Article{Ji:2007:CHS,
author = "Ping Ji and Zihui Ge and Jim Kurose and Don Towsley",
title = "A comparison of hard-state and soft-state signaling
protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "281--294",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "One of the key infrastructure components in all
telecommunication networks, ranging from the telephone
network to VC-oriented data networks to the Internet,
is its signaling system. Two broad approaches towards
signaling can be identified: so-called hard-state and
soft-state approaches. Despite the fundamental
importance of signaling, our understanding of these
approaches--their pros and cons and the circumstances
in which they might best be employed--is mostly
anecdotal (and, occasionally, religious). In this
paper, we compare and contrast a variety of signaling
approaches ranging from `pure' soft state to soft-state
approaches augmented with explicit state removal and/or
reliable signaling, to a `pure' hard state approach. We
develop an analytic model that allows us to quantify
state inconsistency in single- and multiple-hop
signaling scenarios, and the `cost' (both in terms of
signaling overhead and application-specific costs
resulting from state inconsistency) associated with a
given signaling approach and its parameters (e.g.,
state refresh and removal timers). Among the class of
soft-state approaches, we find that a soft-state
approach coupled with explicit removal substantially
improves the degree of state consistency while
introducing little additional signaling message
overhead. The addition of reliable explicit
setup/update/removal allows the soft-state approach to
achieve comparable (and sometimes better) consistency
than that of the hard-state approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication system signaling; hard-state;
performance evaluation; soft-state",
}
@Article{Jelenkovic:2007:SWN,
author = "Predrag R. Jelenkovi{\'c} and Petar
Mom{\v{c}}ilovi{\'c} and Mark S. Squillante",
title = "Scalability of wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "295--308",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates the existence of scalable
protocols that can achieve the capacity limit of $ c
\sqrt {N} $ per source-destination pair in a large
wireless network of $N$ nodes when the buffer space of
each node does not grow with the size of the network
$N$. It is shown that there is no end-to-end protocol
capable of carrying out the limiting throughput of $ c
\sqrt {N}$ with nodes that have constant buffer space.
In other words, this limit is achievable only with
devices whose buffers grow with the size of the
network. On the other hand, the paper establishes that
there exists a protocol which realizes a slightly
smaller throughput of $ c \sqrt {N \log N}$ when
devices have constant buffer space. Furthermore, it is
shown that the required buffer space can be very small,
capable of storing just a few packets. This is
particularly important for wireless sensor networks
where devices have limited resources. Finally, from a
mathematical perspective, the paper furthers our
understanding of the difficult problem of analyzing
large queueing networks with finite buffers for which,
in general, no explicit solutions are available.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc wireless networks; finite-buffer queueing
networks; large-scale networks; local cooperation;
scaling laws; wireless sensor networks",
}
@Article{Ng:2007:TAI,
author = "Ping Chung Ng and Soung Chang Liew",
title = "Throughput analysis of {IEEE802.11} multi-hop ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "309--322",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In multi-hop ad hoc networks, stations may pump more
traffic into the networks than can be supported,
resulting in high packet-loss rate, re-routing
instability and unfairness problems. This paper shows
that controlling the offered load at the sources can
eliminate these problems. To verify the simulation
results, we set up a real 6-node multi-hop network. The
experimental measurements confirm the existence of the
optimal offered load. In addition, we provide an
analysis to estimate the optimal offered load that
maximizes the throughput of a multi-hop traffic flow.
We believe this is a first paper in the literature to
provide a quantitative analysis (as opposed to
simulation) for the impact of hidden nodes and signal
capture on sustainable throughput. The analysis is
based on the observation that a large-scale 802.11
network with hidden nodes is a network in which the
carrier-sensing capability breaks down partially. Its
performance is therefore somewhere between that of a
carrier-sensing network and that of an Aloha network.
Indeed, our analytical closed-form solution has the
appearance of the throughput equation of the Aloha
network. Our approach allows one to identify whether
the performance of an 802.11 network is hidden-node
limited or spatial-reuse limited.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; capacity; IEEE 802.11; multi-hop
networks; performance analysis; wireless networks",
}
@Article{Boggia:2007:FBC,
author = "Gennaro Boggia and Pietro Camarda and Luigi Alfredo
Grieco and Saverio Mascolo",
title = "Feedback-based control for providing real-time
services with the 802.11e {MAC}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "323--333",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The 802.11e working group has recently proposed the
hybrid coordination function (HCF) to provide service
differentiation for supporting real-time transmissions
over 802.11 WLANs. The HCF is made of a
contention-based channel access, known as enhanced
distributed coordination access, and of a HCF
controlled channel access (HCCA), which requires a
Hybrid Coordinator for bandwidth allocation to nodes
hosting applications with QoS requirements. The 802.11e
proposal includes a simple scheduler providing a
Constant Bit Rate service, which is not well suited for
bursty media flows. This paper proposes two
feedback-based bandwidth allocation algorithms to be
used within the HCCA, which have been referred to as
feedback based dynamic scheduler (FBDS) and
proportional-integral (PI)-FBDS. These algorithms have
been designed with the objective of providing services
with bounded delays. Given that the 802.11e standard
allows queue lengths to be fed back, a control
theoretic approach has been employed to design the
FBDS, which exploits a simple proportional controller,
and the PI-FBDS, which implements a
proportional-integral controller. Proposed algorithms
can be easily implemented since their computational
complexities scale linearly with the number of traffic
streams. Moreover, a call admission control scheme has
been proposed as an extension of the one described in
the 802.11e draft. Performance of the proposed
algorithms have been theoretically analyzed and
computer simulations, using the ns-2 simulator, have
been carried out to compare their behaviors in
realistic scenarios where video, voice, and FTP flows,
coexist at various network loads.\par
Simulation results have shown that, unlike the simple
scheduler of the 802.11e draft, both FBDS and PI-FBDS
are able to provide services with real-time
constraints. However, while the FBDS admits a smaller
quota of traffic streams than the simple scheduler,
PI-FBDS allows the same quota of traffic that would be
admitted using the simple scheduler, but still
providing delay bound guarantees.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "qos; real-time applications; wireless networks",
}
@Article{Liu:2007:MLS,
author = "Hai Liu and Xiaohua Jia and Peng-Jun Wan and Chih-Wei
Yi and S. Kami Makki and Niki Pissinou",
title = "Maximizing lifetime of sensor surveillance systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "334--345",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses the maximal lifetime scheduling
problem in sensor surveillance systems. Given a set of
sensors and targets in an area, a sensor can watch only
one target at a time, our task is to schedule sensors
to watch targets and forward the sensed data to the
base station, such that the lifetime of the
surveillance system is maximized, where the lifetime is
the duration that all targets are watched and all
active sensors are connected to the base station. We
propose an optimal solution to find the target-watching
schedule for sensors that achieves the maximal
lifetime. Our solution consists of three steps: (1)
computing the maximal lifetime of the surveillance
system and a workload matrix by using the linear
programming technique; (2) decomposing the workload
matrix into a sequence of schedule matrices that can
achieve the maximal lifetime; and (3) determining the
sensor surveillance trees based on the above obtained
schedule matrices, which specify the active sensors and
the routes to pass sensed data to the base station.
This is the first time in the literature that the
problem of maximizing lifetime of sensor surveillance
systems has been formulated and the optimal solution
has been found.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "energy efficiency; lifetime; scheduling; sensor
network; surveillance system",
}
@Article{Camtepe:2007:CDK,
author = "Seyit A. {\c{C}}amtepe and B{\"u}lent Yener",
title = "Combinatorial design of key distribution mechanisms
for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "346--358",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Secure communications in wireless sensor networks
operating under adversarial conditions require
providing pairwise (symmetric) keys to sensor nodes. In
large scale deployment scenarios, there is no priory
knowledge of post deployment network configuration
since nodes may be randomly scattered over a hostile
territory. Thus, shared keys must be distributed before
deployment to provide each node a key-chain. For large
sensor networks it is infeasible to store a unique key
for all other nodes in the key-chain of a sensor node.
Consequently, for secure communication either two nodes
have a key in common in their key-chains and they have
a wireless link between them, or there is a path,
called key-path, among these two nodes where each pair
of neighboring nodes on this path have a key in common.
Length of the key-path is the key factor for efficiency
of the design.\par
This paper presents novel deterministic and hybrid
approaches based on Combinatorial Design for deciding
how many and which keys to assign to each key-chain
before the sensor network deployment. In particular,
Balanced Incomplete Block Designs (BIBD) and
Generalized Quadrangles (GQ) are mapped to obtain
efficient key distribution schemes. Performance and
security properties of the proposed schemes are studied
both analytically and computationally.\par
Comparison to related work shows that the combinatorial
approach produces better connectivity with smaller
key-chain sizes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "combinatorial design theory; generalized quadrangles
(GQ); key management; key pre-distribution
(deterministic and hybrid); key-chains; security in
wireless sensor networks (WSN); symmetric balanced
incomplete block design (BIBD)",
}
@Article{Nelakuditi:2007:FLR,
author = "Srihari Nelakuditi and Sanghwan Lee and Yinzhe Yu and
Zhi-Li Zhang and Chen-Nee Chuah",
title = "Fast local rerouting for handling transient link
failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "359--372",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Link failures are part of the day-to-day operation of
a network due to many causes such as maintenance,
faulty interfaces, and accidental fiber cuts. Commonly
deployed link state routing protocols such as OSPF
react to link failures through global link state
advertisements and routing table recomputations causing
significant forwarding discontinuity after a failure.
Careful tuning of various parameters to accelerate
routing convergence may cause instability when the
majority of failures are transient. To enhance failure
resiliency without jeopardizing routing stability, we
propose a local rerouting based approach called failure
insensitive routing. The proposed approach prepares for
failures using interface-specific forwarding, and upon
a failure, suppresses the link state advertisement and
instead triggers local rerouting using a backwarding
table. With this approach, when no more than one link
failure notification is suppressed, a packet is
guaranteed to be forwarded along a loop-free path to
its destination if such a path exists. This paper
demonstrates the feasibility, reliability, and
stability of our approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fast rerouting; interface-specific forwarding;
transient failures",
}
@Article{Fahmy:2007:COM,
author = "Sonia Fahmy and Minseok Kwon",
title = "Characterizing overlay multicast networks and their
costs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "373--386",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Overlay networks among cooperating hosts have recently
emerged as a viable solution to several challenging
problems, including multicasting, routing, content
distribution, and peer-to-peer services.
Application-level overlays, however, incur a
performance penalty over router-level solutions. This
paper quantifies and explains this performance penalty
for overlay multicast trees via: (1) Internet
experimental data; (2) simulations; and (3) theoretical
models. We compare a number of overlay multicast
protocols with respect to overlay tree structure, and
underlying network characteristics. Experimental data
and simulations illustrate that the mean number of hops
and mean per-hop delay between parent and child hosts
in overlay trees generally decrease as the level of the
host in the overlay tree increases. Overlay multicast
routing strategies, overlay host distribution, and
Internet topology characteristics are identified as
three primary causes of the observed phenomenon. We
show that this phenomenon yields overlay tree cost
savings: Our results reveal that the normalized cost $
L(n) / U(n) $ is $ \infty n^{0.9} $ for small $n$,
where $ L(n)$ is the total number of hops in all
overlay links, $ U(n)$ is the average number of hops on
the source to receiver unicast paths, and $n$ is the
number of members in the overlay multicast session.
This can be compared to an IP multicast cost
proportional to $ n^{0.6}$ to $ n^{0.8}$.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "economies of scale; group communication; Internet
multicast; overlay multicast; overlay networks",
}
@Article{Bozinovski:2007:MAS,
author = "Marjan Bozinovski and Hans P. Schwefel and Ramjee
Prasad",
title = "Maximum availability server selection policy for
efficient and reliable session control systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "387--399",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There has been a rapid growth of services based on
session control. Session-based services comprise
multimedia conferences, Internet telephone calls,
instant messaging, and similar applications consisting
of one or more media types such as audio and video.
Deployment examples include session control services as
part of the IP multimedia subsystem (IMS), in the
third-generation mobile networks. High service
dependability in session control systems is achieved by
introducing redundancy, e.g., through reliable server
pooling (RSerPool) or clustering. Namely, session
control servers are multiplied in server sets.
Performance of such replicated session control servers
is quantified by transaction control time. Thus,
reducing transaction control time enhances performance.
Server selection policies (SSP) are crucial in
achieving this goal. The maximum availability (MA) SSP
is proposed to improve session control performance in
scenarios with server and communication failures. Based
on a status vector, MA aims at maximizing the
probability of successful transaction with the current
transmission, thereby minimizing the average number of
attempted servers until success. MA is applicable in a
broad range of IP-based systems and services, and it is
independent of the fault-tolerant platform. A simple
protocol extension is proposed in order to integrate MA
into the RSerPool fault-tolerant architecture. In
addition, an analytic model is derived based on certain
system model assumptions. Analytic and simulation
results show that transaction control time is
considerably reduced with MA as opposed to when using
traditional round robin.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fault-tolerance; performance; server selection
policies (SSP); session control",
}
@Article{Alicherry:2007:SPP,
author = "Mansoor Alicherry and Randeep Bhatia",
title = "Simple pre-provisioning scheme to enable fast
restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "400--412",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Supporting fast restoration for general mesh
topologies with minimal network over-build is a
technically challenging problem. Traditionally,
ring-based SONET networks have offered close to 50 ms
restoration at the cost of requiring 100\% over-build.
Recently, fast (local) reroute has gained momentum in
the context of MPLS networks. Fast reroute, when
combined with pre-provisioning of protection capacities
and bypass tunnels, enables faster restoration times in
mesh networks. Pre-provisioning has the additional
advantage of greatly simplifying network routing and
signaling. Thus, even for protected connections, online
routing can now be oblivious to the offered protection,
and may only involve single shortest path
computations.\par
In this paper, we are interested in the problem of
reserving the least amount of the network capacity for
protection, while guaranteeing fast (local)
reroute-based restoration for all the supported
connections. We show that the problem is NP-complete,
and we present efficient approximation algorithms for
the problem. The solution output by our algorithms is
guaranteed to use at most twice the protection
capacity, compared to any optimal solution. These
guarantees are provided even when the protection is for
multiple link failures. In addition, the total amount
of protection capacity reserved by these algorithms is
just a small fraction of the amount reserved by
existing ring-based schemes (e.g., SONET), especially
on dense networks. The presented algorithms are
computationally efficient, and can even be implemented
on the network elements. Our simulation, on some
standard core networks, show that our algorithms work
well in practice as well.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; fast shared restoration;
local reroute; MPLS; optical; pre-provisioning",
}
@Article{Banner:2007:MRA,
author = "Ron Banner and Ariel Orda",
title = "Multipath routing algorithms for congestion
minimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "413--424",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Unlike traditional routing schemes that route all
traffic along a single path, multipath routing
strategies split the traffic among several paths in
order to ease congestion. It has been widely recognized
that multipath routing can be fundamentally more
efficient than the traditional approach of routing
along single paths. Yet, in contrast to the single-path
routing approach, most studies in the context of
multipath routing focused on heuristic methods. We
demonstrate the significant advantage of optimal (or
near optimal) solutions. Hence, we investigate
multipath routing adopting a rigorous (theoretical)
approach. We formalize problems that incorporate two
major requirements of multipath routing. Then, we
establish the intractability of these problems in terms
of computational complexity. Finally, we establish
efficient solutions with proven performance
guarantees.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "computer networks; congestion avoidance; routing
protocols",
}
@Article{Stauffer:2007:PHD,
author = "Alexandre O. Stauffer and Valmir C. Barbosa",
title = "Probabilistic heuristics for disseminating information
in networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "425--435",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of disseminating a piece of
information through all the nodes of a network, given
that it is known originally only to a single node. In
the absence of any structural knowledge on the network,
other than the nodes' neighborhoods, this problem is
traditionally solved by flooding all the network's
edges. We analyze a recently introduced probabilistic
algorithm for flooding and give an alternative
probabilistic heuristic that can lead to some
cost-effective improvements, like better trade-offs
between the message and time complexities involved. We
analyze the two algorithms, both mathematically and by
means of simulations, always within a random-graph
framework and considering relevant node-degree
distributions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "heuristic flooding; probabilistic flooding; random
networks",
}
@Article{Chang:2007:CFS,
author = "Nicholas B. Chang and Mingyan Liu",
title = "Controlled flooding search in a large network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "436--449",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the problem of searching
for a node or an object (i.e., piece of data, file,
etc.) in a large network. Applications of this problem
include searching for a destination node in a mobile ad
hoc network, querying for a piece of desired data in a
wireless sensor network, and searching for a shared
file in an unstructured peer-to-peer network. We
consider the class of controlled flooding search
strategies where query/search packets are broadcast and
propagated in the network until a preset time-to-live
(TTL) value carried in the packet expires. Every
unsuccessful search attempt, signified by a timeout at
the origin of the search, results in an increased TTL
value (i.e., larger search area) and the same process
is repeated until the object is found. The primary goal
of this study is to find search strategies (i.e.,
sequences of TTL values) that will minimize the cost of
such searches associated with packet transmissions.
Assuming that the probability distribution the object
location is not known a priori, we derive search
strategies that minimize the search cost in the
worst-case, via a performance measure in the form of
the competitive ratio between the average search cost
of a strategy and that of an omniscient observer. This
ratio is shown in prior work to be asymptotically (as
the network size grows to infinity) lower bounded by 4
among all deterministic search strategies. In this
paper, we show that by using randomized strategies
(i.e., successive TTL values are chosen from certain
probability distributions rather than deterministic
values), this ratio is asymptotically lower bounded by
e. We derive an optimal strategy that achieves this
lower bound, and discuss its performance under other
criteria. We further introduce a class of randomized
strategies that are sub-optimal but potentially more
useful in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "best worst-case performance; competitive ratio;
controlled flooding search; query and search;
randomized strategy; time-to-live (TTL); wireless
networks",
}
@Article{Ioannou:2007:PHP,
author = "Aggelos Ioannou and Manolis G. H. Katevenis",
title = "Pipelined heap (priority queue) management for
advanced scheduling in high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "450--461",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Per-flow queueing with sophisticated scheduling is one
of the methods for providing advanced quality of
service (QoS) guarantees. The hardest and most
interesting scheduling algorithms rely on a common
computational primitive, implemented via priority
queues. To support such scheduling for a large number
of flows at OC-192 (10 Gb/s) rates and beyond,
pipelined management of the priority queue is needed.
Large priority queues can be built using either
calendar queues or heap data structures; heaps feature
smaller silicon area than calendar queues. We present
heap management algorithms that can be gracefully
pipelined; they constitute modifications of the
traditional ones. We discuss how to use pipelined heap
managers in switches and routers and their
cost-performance tradeoffs. The design can be
configured to any heap size, and, using 2-port 4-wide
SRAMs, it can support initiating a new operation on
every clock cycle, except that an insert operation or
one idle (bubble) cycle is needed between two
successive delete operations. We present a pipelined
heap manager implemented in synthesizable Verilog form,
as a core integratable into ASICs, along with cost and
performance analysis information. For a 16K entry
example in 0.13-$ \mu $ m CMOS technology, silicon area
is below 10 mm$^2$ (less than 8\% of a typical ASIC
chip) and performance is a few hundred million
operations per second. We have verified our design by
simulating it against three heap models of varying
abstraction.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "high-speed network scheduling; pipelined hard-ware
heap; priority queue; synthesizable core; weighted fair
queueing; weighted round robin",
}
@Article{Lu:2007:MPC,
author = "Haibin Lu and Sartaj Sahni",
title = "{$ O(\log W) $} multidimensional packet
classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "462--472",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We use a collection of hash tables to represent a
multidimensional packet classification table. These
hash tables are derived from a trie-representation of
the multidimensional classifier. The height of this
trie is $ O(W) $, where $W$ is the sum of the maximum
possible length, in bits, of each of the fields of a
filter. The leaves at level $i$ of the trie together
with markers for some of the leaves at levels $j$ such
that $ j > i$ are stored in a hash table $ H_i$. The
placement of markers is such that a binary search of
the $ H_i$'s successfully locates the highest-priority
filter that matches any given packet. The number of
hash tables equals the trie height, $ O(W)$. Hence, a
packet may be classified by performing $ O(\log W)$
hash-table lookups. So the expected lookup-complexity
of our data structure for multidimensional packet
classification is $ O(\log W)$. Our proposed scheme
affords a memory advantage over the $ O(\log W)$ 1-D
scheme of Waldvogel et al. For multidimensional packet
classification, our proposed scheme provides both a
time and memory advantage over the extended
grid-of-tries scheme of Baboescu et al.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "binary search on levels; expected complexity;
multidimensional packet classification",
}
@Article{Brosh:2007:AHA,
author = "Eli Brosh and Asaf Levin and Yuval Shavitt",
title = "Approximation and heuristic algorithms for
minimum-delay application-layer multicast trees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "2",
pages = "473--484",
month = apr,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:54:43 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper we investigate the problem of finding
minimum-delay application-layer multicast trees, such
as the trees constructed in overlay networks. It is
accepted that shortest path trees are not a good
solution for the problem since such trees can have
nodes with very large degree, termed high-load nodes.
The load on these nodes makes them a bottleneck in the
distribution tree, due to computation load and access
link bandwidth constraints. Many previous solutions
limited the maximum degree of the nodes by introducing
arbitrary constraints. In this work, we show how to
directly map the node load to the delay penalty at the
application host, and create a new model that captures
the trade offs between the desire to select shortest
path trees and the need to constrain the load on the
hosts. In this model the problem is shown to be
NP-hard. We therefore present an approximation
algorithm and an alternative heuristic algorithm. Our
heuristic algorithm is shown by simulations to be
scalable for large group sizes, and produces results
that are very close to optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; overlay networks;
peer-to-peer communications",
}
@Article{Soule:2007:EDT,
author = "Augustin Soule and Antonio Nucci and Rene L. Cruz and
Emilio Leonardi and Nina Taft",
title = "Estimating dynamic traffic matrices by using viable
routing changes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "485--498",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper we propose a new approach for dealing
with the ill-posed nature of traffic matrix estimation.
We present three solution enhancers: an algorithm for
deliberately changing link weights to obtain additional
information that can make the underlying linear system
full rank; a cyclo-stationary model to capture both
long-term and short-term traffic variability, and a
method for estimating the variance of
origin-destination (OD) flows. We show how these three
elements can be combined into a comprehensive traffic
matrix estimation procedure that dramatically reduces
the errors compared to existing methods. We demonstrate
that our variance estimates can be used to identify the
elephant OD flows, and we thus propose a variant of our
algorithm that addresses the problem of estimating only
the heavy flows in a traffic matrix. One of our key
findings is that by focusing only on heavy flows, we
can simplify the measurement and estimation procedure
so as to render it more practical. Although there is a
tradeoff between practicality and accuracy, we find
that increasing the rank is so helpful that we can
nevertheless keep the average errors consistently below
the 10\% carrier target error rate. We validate the
effectiveness of our methodology and the intuition
behind it using commercial traffic matrix data from
Sprint's Tier-1 backbone.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network tomography; SNMP; traffic engineering; traffic
matrix estimation",
}
@Article{Taylor:2007:CPC,
author = "David E. Taylor and Jonathan S. Turner",
title = "{ClassBench}: a packet classification benchmark",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "499--511",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet classification is an enabling technology for
next generation network services and often a
performance bottleneck in high-performance routers. The
performance and capacity of many classification
algorithms and devices, including TCAMs, depend upon
properties of filter sets and query patterns. Despite
the pressing need, no standard performance evaluation
tools or filter sets are publicly available. In
response to this problem, we present ClassBench, a
suite of tools for benchmarking packet classification
algorithms and devices. ClassBench includes a Filter
Set Generator that produces synthetic filter sets that
accurately model the characteristics of real filter
sets. Along with varying the size of the filter sets,
we provide high-level control over the composition of
the filters in the resulting filter set. The tool suite
also includes a Trace Generator that produces a
sequence of packet headers to exercise packet
classification algorithms with respect to a given
filter set. Along with specifying the relative size of
the trace, we provide a simple mechanism for
controlling locality of reference. While we have
already found ClassBench to be very useful in our own
research, we seek to eliminate the significant access
barriers to realistic test vectors for researchers and
initiate a broader discussion to guide the refinement
of the tools and codification of a formal benchmarking
methodology. (The ClassBench tools are publicly
available at the following site:
\path=http://www.arl.wustl.edu/~det3/ClassBench/=.)",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication systems; computer network performance;
packet classification; packet switching",
}
@Article{Mehyar:2007:ADA,
author = "Mortada Mehyar and Demetri Spanos and John Pongsajapan
and Steven H. Low and Richard M. Murray",
title = "Asynchronous distributed averaging on communication
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "512--520",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See correction \cite{Kriegleder:2014:CAA}.",
abstract = "Distributed algorithms for averaging have attracted
interest in the control and sensing literature.
However, previous works have not addressed some
practical concerns that will arise in actual
implementations on packet-switched communication
networks such as the Internet. In this paper, we
present several implementable algorithms that are
robust to asynchronism and dynamic topology changes.
The algorithms are completely distributed and do not
require any global coordination. In addition, they can
be proven to converge under very general asynchronous
timing assumptions. Our results are verified by both
simulation and experiments on Planetlab, a real-world
TCP/IP network. We also present some extensions that
are likely to be useful in applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous computation; distributed averaging",
}
@Article{Koutsopoulos:2007:JOA,
author = "Iordanis Koutsopoulos and Leandros Tassiulas",
title = "Joint optimal access point selection and channel
assignment in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "521--532",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless cellular networks or in other networks
with single-hop communication, the fundamental access
control problem pertains to access point (AP) selection
and channel allocation for each user. For users in the
coverage area of one AP, this involves only channel
allocation. However, users that belong in the
intersection of coverage areas of more than one AP can
select the appropriate AP to establish connection and
implicitly affect the channel assignment procedure. We
address the joint problem of AP selection and channel
assignment with the objective to satisfy a given user
load vector with the minimum number of channels. Our
major finding is that the joint problem reduces to
plain channel allocation in a cellular network that
emerges from the original one after executing an
iterative and provably convergent clique load balancing
algorithm. For linear cellular networks, our approach
leads to minimum number of required channels to serve a
given load vector. For 2-D cellular networks, the same
approach leads to a heuristic algorithm with a
suboptimal solution due to the fact that clique loads
cannot be balanced. Numerical results demonstrate the
performance benefits of our approach in terms of
blocking probability in a dynamic scenario with
time-varying number of connection requests. The
presented approach constitutes the basis for addressing
more composite resource allocation problems in
different context.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access point (AP) assignment; channel allocation; load
balancing; wireless access",
}
@Article{Sabharwal:2007:OSU,
author = "Ashutosh Sabharwal and Ahmad Khoshnevis and Edward
Knightly",
title = "Opportunistic spectral usage: bounds and a multi-band
{CSMA\slash CA} protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "533--545",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the gains from opportunistic
spectrum usage when neither sender or receiver are
aware of the current channel conditions in different
frequency bands. Hence to select the best band for
sending data, nodes first need to measure the channel
in different bands which takes time away from sending
actual data. We analyze the gains from opportunistic
band selection by deriving an optimal skipping rule,
which balances the throughput gain from finding a good
quality band with the overhead of measuring multiple
bands. We show that opportunistic band skipping is most
beneficial in low signal to noise scenarios, which are
typically the cases when the node throughput in
single-band (no opportunism) system is the minimum. To
study the impact of opportunism on network throughput,
we devise a CSMA/CA protocol, Multi-band Opportunistic
Auto Rate (MOAR), which implements the proposed
skipping rule on a per node pair basis. The proposed
protocol exploits both time and frequency diversity,
and is shown to result in typical throughput gains of
20\% or more over a protocol which only exploits time
diversity, Opportunistic Auto Rate (OAR).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "802.11; capacity bounds; CSMA/CA; measurement
overhead; multi-channel; opportunistic access",
}
@Article{Sundaresan:2007:UML,
author = "Karthikeyan Sundaresan and Raghupathy Sivakumar",
title = "A unified {MAC} layer framework for ad-hoc networks
with smart antennas",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "546--559",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Smart antennas represent a broad variety of antennas
that differ in their performance and transceiver
complexity. The superior capabilities of smart
antennas, however, can be leveraged only through
appropriately designed higher layer network protocols,
including at the medium access control (MAC) layer.
Although several related works have considered such
tailored protocols, they do so in the context of
specific antenna technologies. In this paper, we
explore the possibility for a unified approach to
medium access control in ad hoc networks with smart
antennas. We first present a unified representation of
the PHY layer capabilities of the different types of
smart antennas, and their relevance to MAC layer
design. We then define a unified MAC problem
formulation, and derive unified MAC algorithms (both
centralized and distributed) from the formulation.
Finally, using the algorithms developed, we investigate
the relative performance trade-offs of the different
technologies under varying network conditions. We also
analyze theoretically the performance bounds of the
different smart antenna technologies when the available
gains are exploited for rate increase and communication
range increase.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; medium access control; smart
antennas",
}
@Article{Bejerano:2007:FLB,
author = "Yigal Bejerano and Seung-Jae Han and Li Li",
title = "Fairness and load balancing in wireless {LANs} using
association control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "560--573",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The traffic load of wireless LANs is often unevenly
distributed among the access points (APs), which
results in unfair bandwidth allocation among users. We
argue that the load imbalance and consequent unfair
bandwidth allocation can be greatly reduced by
intelligent association control. In this paper, we
present an efficient solution to determine the user-AP
associations for max-min fair bandwidth allocation. We
show the strong correlation between fairness and load
balancing, which enables us to use load balancing
techniques for obtaining optimal max-min fair bandwidth
allocation. As this problem is NP-hard, we devise
algorithms that achieve constant-factor approximation.
In our algorithms, we first compute a fractional
association solution, in which users can be associated
with multiple APs simultaneously. This solution
guarantees the fairest bandwidth allocation in terms of
max-min fairness. Then, by utilizing a rounding method,
we obtain the integral solution from the fractional
solution. We also consider time fairness and present a
polynomial-time algorithm for optimal integral
solution. We further extend our schemes for the on-line
case where users may join and leave dynamically. Our
simulations demonstrate that the proposed algorithms
achieve close to optimal load balancing (i.e., max-min
fairness) and they outperform commonly used
heuristics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; IEEE 802.11 WLANs; load
balancing; max-min fairness",
}
@Article{Vuran:2007:MAM,
author = "Mehmet C. Vuran and Ian F. Akyildiz",
title = "{A-MAC}: adaptive medium access control for next
generation wireless terminals",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "574--587",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Next Generation (NG) wireless networks are envisioned
to provide high bandwidth to mobile users via bandwidth
aggregation over heterogeneous wireless architectures.
NG wireless networks, however, impose challenges due to
their architectural heterogeneity in terms of different
access schemes, resource allocation techniques as well
as diverse quality of service requirements. These
heterogeneities must be captured and handled
dynamically as mobile terminals roam between different
wireless architectures. However, to address these
challenges, the existing proposals require either a
significant modification in the network structure and
in base stations or a completely new architecture,
which lead to integration problems in terms of
implementation costs, scalability and backward
compatibility. Thus, the integration of the existing
medium access schemes, e.g., CSMA, TDMA and CDMA,
dictates an adaptive and seamless medium access control
(MAC) layer that can achieve high network utilization
and meet diverse Quality of Service (QoS)
requirements.\par
In this paper, an adaptive medium access control
(A-MAC) layer is proposed to address the
heterogeneities posed by the NG wireless networks.
A-MAC introduces a two-layered MAC framework that
accomplishes the adaptivity to both architectural
heterogeneities and diverse QoS requirements. A novel
virtual cube concept is introduced as a unified metric
to model heterogeneous access schemes and capture their
behavior. Based on the Virtual Cube concept, A-MAC
provides architecture-independent decision and QoS
based scheduling algorithms for efficient multinetwork
access. A-MAC performs seamless medium access to
multiple networks without requiring any additional
modifications in the existing network structures. It is
shown via extensive simulations that A-MAC provides
adaptivity to the heterogeneities in NG wireless
networks and achieves high performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "adaptive medium access control; heterogeneous
networks; heterogeneous QoS requirements; next
generation wireless networks; virtual cube concept",
}
@Article{Kumar:2007:NIF,
author = "Anurag Kumar and Eitan Altman and Daniele Miorandi and
Munish Goyal",
title = "New insights from a fixed-point analysis of single
cell {IEEE} 802.11 {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "588--601",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study a fixed-point formalization of the well-known
analysis of Bianchi. We provide a significant
simplification and generalization of the analysis. In
this more general framework, the fixed-point solution
and performance measures resulting from it are studied.
Uniqueness of the fixed point is established. Simple
and general throughput formulas are provided. It is
shown that the throughput of any flow will be bounded
by the one with the smallest transmission rate. The
aggregate throughput is bounded by the reciprocal of
the harmonic mean of the transmission rates. In an
asymptotic regime with a large number of nodes,
explicit formulas for the collision probability, the
aggregate attempt rate, and the aggregate throughput
are provided. The results from the analysis are
compared with ns 2 simulations and also with an exact
Markov model of the backoff process. It is shown how
the saturated network analysis can be used to obtain
TCP transfer throughputs in some cases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CSMA/CA; performance of MAC protocols; wireless
networks",
}
@Article{Alparslan:2007:GRM,
author = "Denizhan N. Alparslan and Khosrow Sohraby",
title = "A generalized random mobility model for wireless ad
hoc networks and its analysis: one-dimensional case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "602--615",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless ad hoc networks, the ability to
analytically characterize the spatial distribution of
terminals plays a key role in understanding fundamental
network QoS measures such as throughput per source to
destination pair, probability of successful
transmission, and connectivity. Consequently, mobility
models that are general enough to capture the major
characteristics of a realistic movement profile, and
yet are simple enough to formulate its long-run
behavior, are highly desirable.\par
We propose a generalized random mobility model capable
of capturing several mobility scenarios and give a
mathematical framework for its exact analysis over
one-dimensional mobility terrains. The model provides
the flexibility to capture hotspots where mobiles
accumulate with higher probability and spend more time.
The selection process of hotspots is random and
correlations between the consecutive hotspot decisions
are successfully modeled. Furthermore, the times spent
at the destinations can be dependent on the location of
destination point, the speed of movement can be a
function of distance that is being traveled, and the
acceleration characteristics of vehicles can be
incorporated into the model. Our solution framework
formulates the model as a semi-Markov process using a
special discretization technique. We provide long-run
location and speed distributions by closed-form
expressions for one-dimensional regions (e.g., a
highway).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; long-run analysis; mobility modeling;
semi-Markov processes",
}
@Article{Alparslan:2007:TDM,
author = "Denizhan N. Alparslan and Khosrow Sohraby",
title = "Two-dimensional modeling and analysis of generalized
random mobility models for wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "616--629",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most important characteristics of wireless ad hoc
networks, such as link distance distribution,
connectivity, and network capacity are dependent on the
long-run properties of the mobility profiles of
communicating terminals. Therefore, the analysis of the
mobility models proposed for these networks becomes
crucial. The contribution of this paper is to provide
an analytical framework that is generalized enough to
perform the analysis of realistic random movement
models over two-dimensional regions. The synthetic
scenarios that can be captured include hotspots where
mobiles accumulate with higher probability and spend
more time, and take into consideration location and
displacement dependent speed distributions. By the
utilization of the framework to the random waypoint
mobility model, we derive an approximation to the
spatial distribution of terminals over rectangular
regions. We validate the accuracy of this approximation
via simulation, and by comparing the marginals with
proven results for one-dimensional regions, we find out
that the quality of the approximation is insensitive to
the proportion between dimensions of the terrain.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; long-run analysis; mobility modeling;
two-dimensional regions",
}
@Article{Lee:2007:MCN,
author = "Junsoo Lee and Stephan Bohacek and Jo{\~a}o P.
Hespanha and Katia Obraczka",
title = "Modeling communication networks with hybrid systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "630--643",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces a general hybrid systems
framework to model the flow of traffic in communication
networks. The proposed models use averaging to
continuously approximate discrete variables such as
congestion window and queue size. Because averaging
occurs over short time intervals, discrete events such
as the occurrence of a drop and the consequent reaction
by congestion control can still be captured. This
modeling framework, thus, fills a gap between purely
packet-level and fluid-based models, faithfully
capturing the dynamics of transient phenomena and yet
providing significant flexibility in modeling various
congestion control mechanisms, different queueing
policies, multicast transmission, etc. The modeling
framework is validated by comparing simulations of the
hybrid models against packet-level simulations. It is
shown that the probability density functions produced
by the ns-2 network simulator match closely those
obtained with hybrid models. Moreover, a complexity
analysis supports the observation that in networks with
large per-flow bandwidths, simulations using hybrid
models require significantly less computational
resources than ns-2 simulations. Tools developed to
automate the generation and simulation of hybrid
systems models are also presented. Their use is
showcased in a study, which simulates TCP flows with
different roundtrip times over the Abilene backbone.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; data communication networks;
hybrid systems; simulation; TCP; UDP",
}
@Article{Leonard:2007:LBN,
author = "Derek Leonard and Zhongmei Yao and Vivek Rai and
Dmitri Loguinov",
title = "On lifetime-based node failure and stochastic
resilience of decentralized peer-to-peer networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "644--656",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To model P2P networks that are commonly faced with
high rates of churn and random departure decisions by
end-users, this paper investigates the resilience of
random graphs to lifetime-based node failure and
derives the expected delay before a user is forcefully
isolated from the graph and the probability that this
occurs within his/her lifetime. Using these metrics, we
show that systems with heavy-tailed lifetime
distributions are more resilient than those with
light-tailed (e.g., exponential) distributions and that
for a given average degree, $k$-regular graphs exhibit
the highest level of fault tolerance. As a practical
illustration of our results, each user in a system with
$ n = 100$ billion peers, 30-minute average lifetime,
and 1-minute node-replacement delay can stay connected
to the graph with probability $ 1 - 1 / n$ using only 9
neighbors. This is in contrast to 37 neighbors required
under previous modeling efforts. We finish the paper by
observing that many P2P networks are almost surely
(i.e., with probability $ 1 - o(1)$) connected if they
have no isolated nodes and derive a simple model for
the probability that a P2P system partitions under
churn.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "lifetime node failure; network disconnection;
peer-to-peer networks; stochastic resilience; user
isolation",
}
@Article{Neely:2007:LDT,
author = "Michael J. Neely and Eytan Modiano and Yuan-Sheng
Cheng",
title = "Logarithmic delay for {$ N \times N $} packet switches
under the crossbar constraint",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "657--668",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the fundamental delay bounds for
scheduling packets in an $ N \times N $ packet switch
operating under the crossbar constraint. Algorithms
that make scheduling decisions without considering
queue backlog are shown to incur an average delay of at
least $ O(N) $. We then prove that $ O(\log (N)) $
delay is achievable with a simple frame based algorithm
that uses queue backlog information. This is the best
known delay bound for packet switches, and is the first
analytical proof that sublinear delay is achievable in
a packet switch with random inputs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optimal control; scheduling; stochastic queueing
analysis",
}
@Article{Christin:2007:ECB,
author = "Nicolas Christin and J{\"o}rg Liebeherr and Tarek
Abdelzaher",
title = "Enhancing class-based service architectures with
adaptive rate allocation and dropping mechanisms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "669--682",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Class-based service differentiation can be realized
without resource reservation, admission control and
traffic policing. However, the resulting service
guarantees are only relative, in the sense that
guarantees given to a flow class at any time are
expressed with reference to the service given to other
flow classes. While it is, in principle, not feasible
to provision for absolute guarantees (i.e., to assure
lower bounds on service metrics at all times) without
admission control and/or traffic policing, we will show
in this paper that such a service can be reasonably
well emulated using adaptive rate allocation and
dropping mechanisms at the link schedulers of routers.
We name the resulting type of guarantees best-effort
bounds. We propose mechanisms for link schedulers of
routers that achieve these and other guarantees by
adjusting the drop rates and the service rate
allocations of traffic classes to current load
conditions. The mechanisms are rooted in control theory
and employ adaptive feedback loops. We demonstrate that
these mechanisms can realize many recently proposed
approaches to class-based service differentiation. The
effectiveness of the proposed mechanisms are evaluated
in measurement experiments of a kernel-level
implementation in FreeBSD PC-routers with multiple 100
Mbps Ethernet interfaces, complemented with simulations
of larger scale networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "best-effort bounds; buffer management; feedback
control; scheduling; service differentiation",
}
@Article{Krithikaivasan:2007:ABT,
author = "Balaji Krithikaivasan and Yong Zeng and Kaushik Deka
and Deep Medhi",
title = "{ARCH}-based traffic forecasting and dynamic bandwidth
provisioning for periodically measured nonstationary
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "683--696",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network providers are often interested in providing
dynamically provisioned bandwidth to customers based on
periodically measured nonstationary traffic while
meeting service level agreements (SLAs). In this paper,
we propose a dynamic bandwidth provisioning framework
for such a situation. In order to have a good sense of
nonstationary periodically measured traffic data,
measurements were first collected over a period of
three weeks excluding the weekends in three different
months from an Internet access link. To characterize
the traffic data rate dynamics of these data sets, we
develop a seasonal AutoRegressive Conditional
Heteroskedasticity (ARCH) based model with the
innovation process (disturbances) generalized to the
class of heavy-tailed distributions. We observed a
strong empirical evidence for the proposed model. Based
on the ARCH-model, we present a probability-hop
forecasting algorithm, an augmented forecast mechanism
using the confidence-bounds of the mean forecast value
from the conditional forecast distribution. For
bandwidth estimation, we present different bandwidth
provisioning schemes that allocate or deallocate the
bandwidth based on the traffic forecast generated by
our forecasting algorithm. These provisioning schemes
are developed to allow trade off between the
underprovisioning and the utilization, while addressing
the overhead cost of updating bandwidth. Based on
extensive studies with three different data sets, we
have found that our approach provides a robust dynamic
bandwidth provisioning framework for real-world
periodically measured nonstationary traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "autoregressive conditional heteroskedasticity;
bandwidth provisioning; heavy-tailedness; nonstationary
traffic; probability-hop forecasting",
}
@Article{Chen:2007:MFS,
author = "Cheng Chen and Zheng Guo Li and Yeng Chai Soh",
title = "{MRF}: a framework for source and destination based
bandwidth differentiation service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "697--708",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we shall generalize the concepts of
fairness, TCP-friendliness and TCP-compatibility such
that more source adaptation schemes can be designed to
support diverse applications over the Internet. A
simple but efficient framework, in the form of a
monotonic response function (MRF), is proposed for the
analysis and the design of memoryless window-based
source adaptation protocols by using these concepts. We
first derive a necessary and sufficient condition for
step-wise convergence to the weighted fairness. It is
then used to construct increase-decrease policies. The
requirements of our increase-decrease policy are less
conservative than those of the CYRF (Choose Your
Response Function) that was proposed in [1]. Our MRF is
suitable for transmission control protocol (TCP) and
user datagram protocol (UDP), and can be used to design
TCP-friendly and multimedia-friendly source adaptation
schemes. Meanwhile, our MRF can be applied to provide
bandwidth differentiation service without any change to
the router of the existing Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth differentiation service; convergence;
Lyapunov function; multimedia-friendliness; source
adaptation; switched control; TCP-friendliness;
weighted fairness",
}
@Article{Tornatore:2007:WND,
author = "Massimo Tornatore and Guido Maier and Achille
Pattavina",
title = "{WDM} network design by {ILP} models based on flow
aggregation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "709--720",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Planning and optimization of WDM networks has raised
much interest among the research community in the last
years. Integer Linear Programming (ILP) is the most
used exact method to perform this task and many studies
have been published concerning this issue.
Unfortunately, many works have shown that, even for
small networks, the ILP formulations can easily
overwhelm the capabilities of today state-of-the-art
computing facilities. So in this paper we focus our
attention on ILP model computational efficiency in
order to provide a more effective tool in view of
direct planning or other benchmarking applications. Our
formulation exploits flow aggregation and consists in a
new ILP formulation that allows us to reach optimal
solutions with less computational effort compared to
other ILP approaches. This formulation applies to
multifiber mesh networks with or without wavelength
conversion. After presenting the formulation we discuss
the results obtained in the optimization of case-study
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "design methodology; integer programming; optical fiber
communication; wavelength division multiplexing",
}
@Article{Xin:2007:BAD,
author = "Chunsheng Xin",
title = "Blocking analysis of dynamic traffic grooming in mesh
{WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "3",
pages = "721--733",
month = jun,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:55:34 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic grooming in wavelength division multiplexing
(WDM) optical networks routes and consolidates
sub-wavelength connections onto lightpaths, to improve
network utilization and reduce cost. It can be
classified into static or dynamic, depending on whether
the connections are given in advance or randomly
arrive/ depart. In this paper, an analytical model is
developed for dynamic traffic grooming, allowing
heterogeneous data rates for sub-wavelength
connections, arbitrary alternate routing in both
logical and physical topologies, and arbitrary
wavelength conversion. The accuracy of the model has
been verified by numerical results from simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical network; performance analysis; reduced load
approximation; traffic grooming",
}
@Article{Banner:2007:PTN,
author = "Ron Banner and Ariel Orda",
title = "The power of tuning: a novel approach for the
efficient design of survivable networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "737--749",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Current survivability schemes typically offer two
degrees of protection, namely full protection (from a
single failure) or no protection at all. Full
protection translates into rigid design constraints,
i.e., the employment of disjoint paths. We introduce
the concept of tunable survivability that bridges the
gap between full and no protection. First, we establish
several fundamental properties of connections with
tunable survivability. With that at hand, we devise
efficient polynomial (optimal) connection establishment
schemes for both $ 1 \colon 1 $ and $ 1 + 1 $
protection architectures. Then, we show that the
concept of tunable survivability gives rise to a novel
hybrid protection architecture, which offers improved
performance over the standard $ 1 \colon 1 $ and $ 1 +
1 $ architectures. Next, we investigate some related
QoS extensions. Finally, we demonstrate the advantage
of tunable survivability over full survivability. In
particular, we show that, by just slightly alleviating
the requirement of full survivability, we obtain major
improvements in terms of the `feasibility' as well as
the `quality' of the solution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "path restoration/protection; routing; survivability",
}
@Article{Ho:2007:GSN,
author = "Kwok Shing Ho and Kwok Wai Cheung",
title = "Generalized survivable network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "750--760",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Two important requirements for future backbone
networks are full survivability against link failures
and dynamic bandwidth provisioning. We demonstrate how
these two requirements can be met by introducing a new
survivable network concept called the Generalized
Survivable Network (GSN), which has the special
property that it remains survivable no matter how
traffic is provisioned dynamically, as long as the
input and output constraints at the nodes are fixed. A
rigorous mathematical framework for designing the GSN
is presented. In particular, we focus on the GSN
Capacity Planning Problem, which finds the edge
capacities for a given physical network topology with
the input/output constraints at the nodes. We employ
fixed single-path routing which leads to wide-sense
nonblocking GSNs. We show how the initial, infeasible
formal mixed integer linear programming formulation can
be transformed into a more feasible problem using the
duality transformation. A procedure for finding the
realizable lower bound for the cost is also presented.
A two-phase approach is proposed for solving the
GSNCPP. We have carried out numerical computations for
ten networks with different topologies and found that
the cost of a GSN is only a fraction (from 39\% to
97\%) more than the average cost of a static survivable
network. The framework is applicable to survivable
network planning for ASTN/ASON, VPN, and IP networks as
well as bandwidth-on-demand resource allocation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ASON; ASTN; IP network; network design; nonblocking
network; survivable network; VPN",
}
@Article{Teixeira:2007:TBT,
author = "Renata Teixeira and Timothy G. Griffin and Mauricio G.
C. Resende and Jennifer Rexford",
title = "{TIE} breaking: tunable interdomain egress selection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "761--774",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a large backbone network, the routers often have
multiple egress points they could use to direct traffic
toward an external destination. Today's routers select
the `closest' egress point, based on the intradomain
routing configuration, in a practice known as
early-exit or hot-potato routing. In this paper, we
argue that hot-potato routing is restrictive,
disruptive, and convoluted and propose an alternative
called TIE (Tunable Interdomain Egress selection). TIE
is a flexible mechanism that allows routers to select
the egress point for each destination prefix based on
both the intradomain topology and the goals of the
network administrators. In fact, TIE is designed from
the start with optimization in mind, to satisfy diverse
requirements for traffic engineering and network
robustness. We present two example optimization
problems that use integer-programming and
multicommodity-flow techniques, respectively, to tune
the TIE mechanism to satisfy networkwide objectives.
Experiments with traffic, topology, and routing data
from two backbone networks demonstrate that our
solution is both simple (for the routers) and
expressive (for the network administrators).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BGP; egress-point selection; Internet routing; network
operations and management",
}
@Article{Yang:2007:NNI,
author = "Xiaowei Yang and David Clark and Arthur W. Berger",
title = "{NIRA}: a new inter-domain routing architecture",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "775--788",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In today's Internet, users can choose their local
Internet service providers (ISPs), but once their
packets have entered the network, they have little
control over the overall routes their packets take.
Giving a user the ability to choose between
provider-level routes has the potential of fostering
ISP competition to offer enhanced service and improving
end-to-end performance and reliability. This paper
presents the design and evaluation of a new Internet
routing architecture (NIRA) that gives a user the
ability to choose the sequence of providers his packets
take. NIRA addresses a broad range of issues, including
practical provider compensation, scalable route
discovery, efficient route representation, fast route
fail-over, and security. NIRA supports user choice
without running a global link-state routing protocol.
It breaks an end-to-end route into a sender part and a
receiver part and uses address assignment to represent
each part. A user can specify a route with only a
source and a destination address, and switch routes by
switching addresses. We evaluate NIRA using a
combination of network measurement, simulation, and
analysis. Our evaluation shows that NIRA supports user
choice with low overhead.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "inter-domain routing; Internet architecture; routing;
source routing; user-controlled routing",
}
@Article{Nucci:2007:ILW,
author = "Antonio Nucci and Supratik Bhattacharyya and Nina Taft
and Christophe Diot",
title = "{IGP} link weight assignment for operational {Tier-1}
backbones",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "789--802",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Intradomain routing protocols, such as IS-IS or OSPF,
associate a weight (or cost) with each link to compute
traffic routes. Proposed methods for selecting link
weights largely ignore two practical issues, that of
service-level agreement (SLA) requirements and of
failures. Optimizing the routing configuration, without
bounding the SLA, could severely violate this
requirement, which is one of the most important
vehicles used by carriers to attract new customers.
Since most failures are short-lived, it is much more
practical not to have to change weight settings during
these episodes. In this paper we propose a Tabu-search
heuristic for choosing link weights that takes into
account both SLA requirements and link failures. Our
algorithm selects link weights that still perform well,
without having to be changed, even under failure
events. To validate the heuristic, we develop a lower
bound based on a formal integer linear program (ILP)
model, and show that our heuristic solution is within
10\% of the optimal ILP lower bound. We study the
performance of the heuristic using two operational
Tier-1 backbones. Our results illustrate two tradeoffs,
between link utilization and the SLA provided, and
between performance under failures versus performance
without failures. We find that performance under
transient failures can be dramatically improved at the
expense of a small degradation during normal network
operation (i.e., no failures), while simultaneously
satisfying SLA requirements. We use our algorithm
inside a prototype tool to conduct a case study and
illustrate how systematic link weight selection can
facilitate topology planning.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "failures; interior gateway protocol (IGP) routing;
intermediate system to intermediate system (IS-IS)
protocol; open shortest path first (OSPF) protocol;
optimization; robustness; tabu search; traffic
engineering",
}
@Article{Rai:2007:RMP,
author = "Smita Rai and Omkar Deshpande and Canhui Ou and
Charles U. Martel and Biswanath Mukherjee",
title = "Reliable multipath provisioning for high-capacity
backbone mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "803--812",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate reliable multipath provisioning of
traffic in high-capacity backbone mesh networks, e.g.,
next-generation SONET/SDH networks supporting virtual
concatenation (VCAT). VCAT enables a connection to be
inversely multiplexed on to multiple paths, a feature
that may lead to significantly improved performance
over conventional single-path provisioning. Other mesh
networks such as those employing optical
wavelength-division multiplexing (WDM) and
multiprotocol label switching (MPLS) can also benefit
from this multipath provisioning approach. We propose
effective multipath bandwidth as the metric to
provision a connection while satisfying its reliability
requirements (measured in terms of availability). We
demonstrate that effective multipath bandwidth provides
more flexibility and lower blocking probability without
the cost and the complexity associated with traditional
protection schemes developed for optical WDM and MPLS
networks. We also investigate the practical problem of
provisioning effective multipath bandwidth with cost
constraints. We analyze the tractability of the problem
and present a heuristic which results in significantly
reduced number of blocked connections due to cost
constraints.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "degraded service; effective multipath bandwidth;
flexible provisioning; multiconstrained paths;
multipath provisioning; virtual concatenation (VCAT)",
}
@Article{Movsichoff:2007:EEO,
author = "Bernardo A. Movsichoff and Constantino M. Lagoa and
Hao Che",
title = "End-to-end optimal algorithms for integrated {QoS},
traffic engineering, and failure recovery",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "813--823",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses the problem of optimal quality of
service (QoS), traffic engineering (TE) and failure
recovery (FR) in computer networks by introducing novel
algorithms that only use source inferrable information.
More precisely, optimal data rate adaptation and load
balancing laws are provided which are applicable to
networks where multiple paths are available and
multiple classes of service (CoS) are to be provided.
Different types of multiple paths are supported,
including point-to-point multiple paths,
point-to-multipoint multiple paths, and multicast
trees. In particular, it is shown that the algorithms
presented only need a minimal amount of information for
optimal control, i.e., whether a path is congested or
not. Hence, the control laws provided in this paper
allow source inferred congestion detection without the
need for explicit congestion feedback from the network.
The proposed approach is applicable to utility
functions of a very general form and endows the network
with the important property of robustness with respect
to node/link failures; i.e., upon the occurrence of
such a failure, the presented control laws reroute
traffic away from the inoperative node/link and
converge to the optimal allocation for the `reduced'
network. The proposed control laws set the foundation
for the development of highly scalable feature-rich
traffic control protocols at the IP, transport, or
higher layers with provable global stability and
convergence properties.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed traffic control; failure recovery;
optimization; QoS; sliding mode control; traffic
engineering",
}
@Article{Tang:2007:EHC,
author = "Ao Tang and Jiantao Wang and Steven H. Low and Mung
Chiang",
title = "Equilibrium of heterogeneous congestion control:
existence and uniqueness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "824--837",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "When heterogeneous congestion control protocols that
react to different pricing signals share the same
network, the resulting equilibrium may no longer be
interpreted as a solution to the standard utility
maximization problem. We prove the existence of
equilibrium in general multiprotocol networks under
mild assumptions. For almost all networks, the
equilibria are locally unique, finite, and odd in
number. They cannot all be locally stable unless there
is a globally unique equilibrium. Finally, we show that
if the price mapping functions, which map link prices
to effective prices observed by the sources, are
sufficiently similar, then global uniqueness is
guaranteed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; equilibrium analysis;
heterogeneous protocols; optimization",
}
@Article{Zhang:2007:DIS,
author = "Yueping Zhang and Seong-Ryong Kang and Dmitri
Loguinov",
title = "Delay-independent stability and performance of
distributed congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "838--851",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent research efforts to design better Internet
transport protocols combined with scalable Active Queue
Management (AQM) have led to significant advances in
congestion control. One of the hottest topics in this
area is the design of discrete congestion control
algorithms that are asymptotically stable under
heterogeneous feedback delay and whose control
equations do not explicitly depend on the RTTs of
end-flows. In this paper, we first prove that
single-link congestion control methods with a stable
radial Jacobian remain stable under arbitrary feedback
delay (including heterogeneous directional delays) and
that the stability condition of such methods does not
involve any of the delays. We then extend this result
to generic networks with fixed consistent bottleneck
assignments and max-min network feedback. To
demonstrate the practicality of the obtained result, we
change the original controller in Kelly et al.'s work
['Rate Control for communication networks: Shadow
prices, proportional fairness and stability,' Journal
of the Operational Research Society, vol. 49, no. 3,
pp. 237-252, March 1998] to become robust under random
feedback delay and fixed constants of the control
equation. We call the resulting framework Max-min Kelly
Control (MKC) and show that it offers smooth sending
rate, exponential convergence to efficiency, and fast
convergence to fairness, all of which make it appealing
for future high-speed networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic stability; congestion control;
heterogeneous delay",
}
@Article{Rhee:2007:LEB,
author = "Injong Rhee and Lisong Xu",
title = "Limitations of equation-based congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "852--865",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study limitations of an equation-based congestion
control protocol, called TCP-Friendly Rate Control
(TFRC). It examines how the three main factors that
determine TFRC throughput, namely, the TCP-friendly
equation, loss event rate estimation, and delay
estimation, can influence the long-term throughput
imbalance between TFRC and TCP. Especially, we show
that different sending rates of competing flows cause
these flows to experience different loss event rates.
There are several fundamental reasons why TFRC and TCP
flows have different average sending rates, from the
first place. Earlier work shows that the convexity of
the TCP-friendly equation used in TFRC causes the
sending rate difference. We report two additional
reasons in this paper: (1) the convexity of $ 1 / x $
where $x$ is a loss event period and (2) different
retransmission timeout period (RTO) estimations of TCP
and TFRC. These factors can be the reasons for TCP and
TFRC to experience initially different sending rates.
But we find that the loss event rate difference due to
the differing sending rates greatly amplifies the
initial throughput difference; in some extreme cases,
TFRC uses around 20 times more, or sometimes 10 times
less, bandwidth than TCP. Despite these factors
influencing the throughput difference, we also find
that simple heuristics can greatly mitigate the
problem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; equation-based rate control",
}
@Article{Shorten:2007:QPN,
author = "Robert N. Shorten and Douglas J. Leith",
title = "On queue provisioning, network efficiency and the
transmission control protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "866--877",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a sender side modification
to TCP to accommodate small network buffers. We exploit
the fact that the manner in which network buffers are
provisioned is intimately related to the manner in
which TCP operates. However, rather than designing
buffers to accommodate the TCP AIMD algorithm, as is
the traditional approach in network design, we suggest
simple modifications to the AIMD algorithm to
accommodate buffers of any size in the network. We
demonstrate that networks with small buffers can be
designed that transport TCP traffic in an efficient
manner while retaining fairness and friendliness with
standard TCP traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "AIMD; buffer sizing; TCP",
}
@Article{Zhao:2007:NBR,
author = "Yanping Zhao and Derek L. Eager and Mary K. Vernon",
title = "Network bandwidth requirements for scalable on-demand
streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "878--891",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Previously proposed streaming protocols using
broadcast or multicast are able to deliver multimedia
files on-demand with required server bandwidth that
grows much slower than linearly with request rate, or
with the inverse of client start-up delay. The same
efficiencies can be achieved for network bandwidth if
delivery is over a true broadcast channel. This paper
considers the required network bandwidth for on-demand
streaming over multicast delivery trees. We consider
both simple canonical delivery trees, and more complex
cases in which delivery trees are constructed using
both existing and new algorithms for randomly generated
network topologies and client site locations. Results
in this paper quantify the potential savings from use
of multicast trees that are configured to minimize
network bandwidth rather than the latency to the
content server. Further, we determine the network
bandwidth usage of particular immediate service and
periodic broadcast on-demand streaming protocols. The
periodic broadcast protocol is able to simultaneously
achieve close to the minimum possible network and
server bandwidth usage.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multicast; multimedia; on-demand streaming;
performance evaluation; periodic broadcast; scalable
delivery",
}
@Article{Wang:2007:LBP,
author = "Xiaoming Wang and Dmitri Loguinov",
title = "Load-balancing performance of consistent hashing:
asymptotic analysis of random node join",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "892--905",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Balancing of structured peer-to-peer graphs, including
their zone sizes, has recently become an important
topic of distributed hash table (DHT) research. To
bring analytical understanding into the various
peer-join mechanisms based on consistent hashing, we
study how zone-balancing decisions made during the
initial sampling of the peer space affect the resulting
zone sizes and derive several asymptotic bounds for the
maximum and minimum zone sizes that hold with high
probability. Several of our results contradict those of
prior work and shed new light on the theoretical
performance limitations of consistent hashing. We use
simulations to verify our models and compare the
performance of the various methods using the example of
recently proposed de Bruijn DHTs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic bounds; balls-into-bins; consistent
hashing; load balancing; peer-to-peer (P2P)",
}
@Article{Wang:2007:PIT,
author = "Pi-Chung Wang and Chun-Liang Lee and Chia-Tai Chan and
Hung-Yi Chang",
title = "Performance improvement of two-dimensional packet
classification by filter rephrasing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "906--917",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet classification categorizes incoming packets
into multiple forwarding classes in a router based on
predefined filters. It is important in fulfilling the
requirements of differentiated services. To achieve
fast packet classification, a new approach, namely
`filter rephrasing,' is proposed to encode the original
filters by exploiting the hierarchical property of the
filters. Filter rephrasing could dramatically reduce
the search and storage complexity incurred in packet
classification. We incorporate a well-known
scheme-rectangle search-with filter rephrasing to
improve the lookup speed by at least a factor of 2 and
decreases 70\% of the storage expenses. As compared
with other existing schemes, the proposed scheme
exhibits a better balance between speed, storage, and
computation complexity. Consequently, the scalable
effect of filter rephrasing is suitable for backbone
routers with a great number of filters.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "firewalls; forwarding; packet classification; quality
of service (QoS)",
}
@Article{Liu:2007:QTF,
author = "Xiliang Liu and Kaliappa Ravindran and Dmitri
Loguinov",
title = "A queueing-theoretic foundation of available bandwidth
estimation: single-hop analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "918--931",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most existing available-bandwidth measurement
techniques are justified using a constant-rate fluid
cross-traffic model. To achieve a better understanding
of the performance of current bandwidth measurement
techniques in general traffic conditions, this paper
presents a queueing-theoretic foundation of single-hop
packet-train bandwidth estimation under bursty arrivals
of discrete cross-traffic packets. We analyze the
statistical mean of the packet-train output dispersion
and its mathematical relationship to the input
dispersion, which we call the probing-response curve.
This analysis allows us to prove that the single-hop
response curve in bursty cross-traffic deviates from
that obtained under fluid cross traffic of the same
average intensity and to demonstrate that this may lead
to significant measurement bias in certain estimation
techniques based on fluid models. We conclude the paper
by showing, both analytically and experimentally, that
the response-curve deviation vanishes as the
packet-train length or probing packet size increases,
where the vanishing rate is decided by the burstiness
of cross-traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "active measurement; bandwidth estimation; packet-pair
sampling",
}
@Article{Cohen:2007:GQA,
author = "Reuven Cohen and Liran Katzir",
title = "A generic quantitative approach to the scheduling of
synchronous packets in a shared uplink wireless
channel",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "932--943",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The scheduling logic at the base station of a shared
wireless medium supports time-dependent (synchronous)
applications by allocating timely transmission grants.
To this end, it must take into account not only the
deadlines of the pending packets, but also the channel
conditions for each potential sender, the requirements
of nonsynchronous applications, and the packet
retransmission strategy. With respect to these factors,
we identify three scheduling scenarios and show that
the scheduler logic faces a different challenge in
addressing each of them. We then present a generic
scheduling algorithm that translates all the factors
relevant to each scenario into a common profit
parameter, and selects the most profitable transmission
instances.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile communications; scheduling; wireless",
}
@Article{Fodor:2007:BBP,
author = "G{\'a}bor Fodor and Mikl{\'o}s Telek",
title = "Bounding the blocking probabilities in multirate
{CDMA} networks supporting elastic services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "944--956",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Several previous contributions have proposed
calculation methods that can be used to determine the
steady state (and from it the blocking probabilities)
of code-division multiple-access (CDMA) systems. This
present work extends the classical Kaufman-Roberts
formula such that it becomes applicable in CDMA systems
in which elastic services with state-dependent
instantaneous bit rate and average-bit-rate-dependent
residency time are supported. Our model captures the
effect of soft blocking, that is, an arriving session
may be blocked in virtually all system states but with
a state dependent probability. The core of this method
is to approximate the original irreversible Markov
chain with a reversible one and to give lower and upper
bounds on the so-called partially blocking macro states
of the state space. We employ this extended formula to
establish lower and upper bounds on the steady state
and the classwise blocking probabilities.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CDMA networks; elastic traffic; Kaufman-Roberts
formula; reversible Markov chains; soft blocking",
}
@Article{Cao:2007:WSD,
author = "Xiaojun Cao and Vishal Anand and Chunming Qiao",
title = "Waveband switching for dynamic traffic demands in
multigranular optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "957--968",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Waveband switching (WBS) in conjunction with
multigranular optical cross-connect (MG-OXC)
architectures can reduce the cost and complexity of
OXCs. In this paper, we study the performance of
different MG-OXC architectures under dynamic traffic.
In the case with online incremental traffic, we compare
two MG-OXC architectures in terms of the blocking
probability of new lightpath requests and study the
impact of port counts and traffic loads. We develop an
online Integer Linear Programming model (On-ILP), which
minimizes the number of used ports and the request
blocking probability, given a fixed number of
wavelengths and MG-OXC architecture. The On-ILP
optimizes the routing of new lightpaths so as to
maximize lightpath grouping and reduce the port count
given that existing traffic cannot be rearranged. We
also propose a new efficient heuristic algorithm,
called Maximum Overlap Ratio (MOR) to satisfy
incremental traffic and compare it with the On-ILP,
first-fit, and random-fit algorithms. Our results and
analysis indicate that using WBS with MG-OXCs can
reduce the size (and, hence, the cost) of switching
fabrics compared to using ordinary OXCs. Based on the
results and observations in the incremental traffic
case, we further study the performance of a particular
MG-OXC architecture under fully dynamic or fluctuating
traffic. Our simulations show that the proposed
heuristic algorithm waveband assignment with path
graph, which groups wavelengths to bands and uses
wavelength converters efficiently under fluctuating
traffic, significantly out-performs other heuristic
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "integer linear programming (ILP); multigranular (MG);
optical cross-connects; waveband switching; wavelength
division multiplexing (WDM)",
}
@Article{Ngo:2007:OSN,
author = "Hung Q. Ngo and Dazhen Pan and Yuanyuan Yang",
title = "Optical switching networks with minimum number of
limited-range wavelength converters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "4",
pages = "969--979",
month = aug,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:56:37 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of determining the minimum number
of limited-range wavelength converters needed to
construct strictly, wide-sense, and rearrangeably
nonblocking optical cross-connects for both unicast and
multicast traffic patterns. We give the exact formula
to compute this number for rearrangeably and wide-sense
nonblocking cross-connects under both the unicast and
multicast cases. We also give optimal cross-connect
constructions with respect to the number of
limited-range wavelength converters.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-connects; limited-range wavelength conversion;
optical switching networks;
wavelength-division-multiplexing (WDM)",
}
@Article{Sharma:2007:DCT,
author = "Gaurav Sharma and Ravi Mazumdar and Ness B. Shroff",
title = "Delay and capacity trade-offs in mobile ad hoc
networks: a global perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "981--992",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Since the original work of Grossglauser and Tse, which
showed that mobility can increase the capacity of an ad
hoc network, there has been a lot of interest in
characterizing the delay-capacity relationship in ad
hoc networks. Various mobility models have been studied
in the literature, and the delay-capacity relationships
under those models have been characterized. The results
indicate that there are trade-offs between the delay
and capacity, and that the nature of these trade-offs
is strongly influenced by the choice of the mobility
model. Some questions that arise are: (i) How
representative are these mobility models studied in the
literature? (ii) Can the delay-capacity relationship be
significantly different under some other `reasonable'
mobility model? (iii) What sort of delay-capacity
trade-off are we likely to see in a real world
scenario? In this paper, we take the first step toward
answering some of these questions. In particular, we
analyze, among others, the mobility models studied in
recent related works, under a unified framework. We
relate the nature of delay-capacity trade-off to the
nature of node motion, thereby providing a better
understanding of the delay-capacity relationship in ad
hoc networks in comparison to earlier works.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad-hoc networks; capacity; delay; mobility;
throughput; trade-offs; wireless",
}
@Article{La:2007:DPD,
author = "Richard J. La and Yijie Han",
title = "Distribution of path durations in mobile ad hoc
networks and path selection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "993--1006",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the issue of path selection in multihop
wireless networks with the goal of identifying a scheme
that can select a path with the largest expected
duration. To this end, we first study the distribution
of path duration. We show that, under a set of mild
conditions, when the hop count along a path is large,
the distribution of path duration can be well
approximated by an exponential distribution even when
the distributions of link durations are dependent and
heterogeneous. Second, we investigate the statistical
relation between a path duration and the durations of
the links along the path. We prove that the parameter
of the exponential distribution, which determines the
expected duration of the path, is related to the link
durations only through their means and is given by the
sum of the inverses of the expected link durations.
Based on our analytical results, we propose a scheme
that can be implemented with existing routing protocols
and select the paths with the largest expected
durations. We evaluate the performance of the proposed
scheme using ns-2 simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile ad hoc networks; routing control; stochastic
analysis",
}
@Article{Qiao:2007:IAT,
author = "Daji Qiao and Sunghyun Choi and Kang G. Shin",
title = "Interference analysis and transmit power control in
{IEEE 802.11a/h} wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1007--1020",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Reducing the energy consumption by wireless
communication devices is perhaps the most important
issue in the widely deployed and dramatically growing
IEEE 802.11 WLANs (wireless local area networks). TPC
(transmit power control) has been recognized as one of
the effective ways to achieve this goal. In this paper,
we study the emerging 802.11a/h systems that provide a
structured means to support intelligent TPC. Based on a
rigorous analysis of the relationship among different
radio ranges and TPC's effects on the interference, we
present an optimal low-energy transmission strategy,
called MiSer, which is deployed in the format of
RTS-CTS(strong)-Data(MiSer)-Ack. The key idea of MiSer
is to combine TPC with PHY (physical layer) rate
adaptation and compute offline an optimal rate-power
combination table, then at runtime, a wireless station
determines the most energy-efficient transmission
strategy for each data frame transmission by a simple
table lookup. Simulation results show MiSer's clear
superiority to other two-way or four-way frame exchange
mechanisms in terms of energy conservation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IEEE 802.11a/h; interference analysis; MiSer; PHY rate
adaptation; TPC; transmit power control",
}
@Article{Lin:2007:AOE,
author = "Longbi Lin and Ness B. Shroff and R. Srikant",
title = "Asymptotically optimal energy-aware routing for
multihop wireless networks with renewable energy
sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1021--1034",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we develop a model to characterize the
performance of multihop radio networks in the presence
of energy constraints and design routing algorithms to
optimally utilize the available energy. The energy
model allows us to consider different types of energy
sources in heterogeneous environments. The proposed
algorithm is shown to achieve a competitive ratio
(i.e., the ratio of the performance of any offline
algorithm that has knowledge of all past and future
packet arrivals to the performance of our online
algorithm) that is asymptotically optimal with respect
to the number of nodes in the network. The algorithm
assumes no statistical information on packet arrivals
and can easily be incorporated into existing routing
schemes (e.g., proactive or on-demand methodologies) in
a distributed fashion. Simulation results confirm that
the algorithm performs very well in terms of maximizing
the throughput of an energy-constrained network.
Further, a new threshold-based scheme is proposed to
reduce the routing overhead while incurring only
minimum performance degradation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "competitive analysis; energy-aware routing;
mathematical programming/optimization; simulations",
}
@Article{Karnik:2007:DOS,
author = "Aditya Karnik and Anurag Kumar",
title = "Distributed optimal self-organization in ad hoc
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1035--1045",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This work is motivated by the idea of using randomly
deployed wireless networks of miniature smart sensors
to serve as distributed instrumentation. In such
applications, often the objective of the sensor network
is to repeatedly compute and, if required, deliver to
an observer some result based on the values measured at
the sensors. We argue that in such applications it is
important for the sensors to self-organize in a way
that optimizes network throughput. We identify and
discuss two main problems of optimal self-organization:
(1) building an optimal topology, and (2) tuning
network access parameters, such as the transmission
attempt rate. We consider a simple random access model
for sensor networks and formulate these problems as
optimization problems. We then present centralized as
well as distributed algorithms for solving them.
Results show that the performance improvement is
substantial and implementation of such optimal
self-organization techniques may be worth the
additional complexity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed stochastic algorithms; self-organization;
wireless sensor networks",
}
@Article{Patil:2007:MRQ,
author = "Shailesh Patil and Gustavo {De Veciana}",
title = "Managing resources and quality of service in
heterogeneous wireless systems exploiting opportunism",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1046--1058",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose a novel class of opportunistic scheduling
disciplines to handle mixes of real-time and
best-effort traffic at a wireless access point. The
objective is to support probabilistic service rate
guarantees to real-time sessions while still achieving
opportunistic throughput gains across users and traffic
types. We are able to show a `tight' stochastic lower
bound on the service a real-time session would receive
assuming that the users possibly heterogeneous capacity
variations are known or estimated, and are fast fading
across slots. Such bounds are critical to enabling
predictable quality of service and thus the development
of complementary resource management and admission
control strategies. Idealized simulation results show
that the scheme can achieve 80\%-90\% of the maximum
system throughput capacity while satisfying the quality
of service (QoS) requirements for real-time traffic,
and that the degradation in system throughput is slow
in the number of real-time users, i.e., inter- and
intra-class opportunism are being properly exploited.
We note however, that there is a tradeoff between
strictness of QoS requirements and the overall system
throughput one can achieve. Thus if QoS requirements on
real-time traffic are very tight, one would need to
simply give priority to real-time traffic, and in the
process lose the throughput gains of opportunism.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multi-user diversity; quality of service; scheduling",
}
@Article{Schweller:2007:RSE,
author = "Robert Schweller and Zhichun Li and Yan Chen and Yan
Gao and Ashish Gupta and Yin Zhang and Peter A. Dinda
and Ming-Yang Kao and Gokhan Memik",
title = "Reversible sketches: enabling monitoring and analysis
over high-speed data streams",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1059--1072",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A key function for network traffic monitoring and
analysis is the ability to perform aggregate queries
over multiple data streams. Change detection is an
important primitive which can be extended to construct
many aggregate queries. The recently proposed sketches
are among the very few that can detect heavy changes
online for high speed links, and thus support various
aggregate queries in both temporal and spatial domains.
However, it does not preserve the keys (e.g., source IP
address) of flows, making it difficult to reconstruct
the desired set of anomalous keys.\par
To address this challenge, we propose the reversible
sketch data structure along with reverse hashing
algorithms to infer the keys of culprit flows. There
are two phases. The first operates online, recording
the packet stream in a compact representation with
negligible extra memory and few extra memory accesses.
Our prototype single FPGA board implementation can
achieve a throughput of over 16 Gb/s for 40-byte packet
streams (the worst case). The second phase identifies
heavy changes and their keys from the representation in
nearly real time. We evaluate our scheme using traces
from large edge routers with OC-12 or higher links.
Both the analytical and experimental results show that
we are able to achieve online traffic monitoring and
accurate change/intrusion detection over massive data
streams on high speed links, all in a manner that
scales to large key space size. To the best of our
knowledge, our system is the first to achieve these
properties simultaneously.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Radunovic:2007:UFM,
author = "Bozidar Radunovi{\'c} and Jean-Yves {Le Boudec}",
title = "A unified framework for max-min and min-max fairness
with applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1073--1083",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Max-min fairness is widely used in various areas of
networking. In every case where it is used, there is a
proof of existence and one or several algorithms for
computing it; in most, but not all cases, they are
based on the notion of bottlenecks. In spite of this
wide applicability, there are still examples, arising
in the context of wireless or peer-to-peer networks,
where the existing theories do not seem to apply
directly. In this paper, we give a unifying treatment
of max-min fairness, which encompasses all existing
results in a simplifying framework, and extend its
applicability to new examples. First, we observe that
the existence of max-min fairness is actually a
geometric property of the set of feasible allocations.
There exist sets on which max-min fairness does not
exist, and we describe a large class of sets on which a
max-min fair allocation does exist. This class
contains, but is not limited to the compact, convex
sets of R$^N$. Second, we give a general purpose
centralized algorithm, called Max-min Programming, for
computing the max-min fair allocation in all cases
where it exists (whether the set of feasible
allocations is in our class or not). Its complexity is
of the order of $N$ linear programming steps in R$^N$,
in the case where the feasible set is defined by linear
constraints. We show that, if the set of feasible
allocations has the free disposal property, then
Max-min Programming reduces to a simpler algorithm,
called Water Filling, whose complexity is much lower.
Free disposal corresponds to the cases where a
bottleneck argument can be made, and Water Filling is
the general form of all previously known centralized
algorithms for such cases. All our results apply
mutatis mutandis to min-max fairness. Our results apply
to weighted, unweighted and util-max-min and min-max
fairness. Distributed algorithms for the computation of
max-min fair allocations are outside the scope of this
paper.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "best-effort traffic; elastic traffic; mathematical
programming/optimization; max-min fairness; system
design",
}
@Article{Chen:2007:ABS,
author = "Yan Chen and David Bindel and Han Hee Song and Randy
H. Katz",
title = "Algebra-based scalable overlay network monitoring:
algorithms, evaluation, and applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1084--1097",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Overlay network monitoring enables distributed
Internet applications to detect and recover from path
outages and periods of degraded performance within
seconds. For an overlay network with $n$ end hosts,
existing systems either require $ O(n^2)$ measurements,
and thus lack scalability, or can only estimate the
latency but not congestion or failures. Our earlier
extended abstract [Y. Chen, D. Bindel, and R. H. Katz,
`Tomography-based overlay network monitoring,'
Proceedings of the ACM SIGCOMM Internet Measurement
Conference (IMC), 2003] briefly proposes an algebraic
approach that selectively monitors $k$ linearly
independent paths that can fully describe all the $
O(n^2)$ paths. The loss rates and latency of these $k$
paths can be used to estimate the loss rates and
latency of all other paths. Our scheme only assumes
knowledge of the underlying IP topology, with links
dynamically varying between lossy and normal. In this
paper, we improve, implement, and extensively evaluate
such a monitoring system. We further make the following
contributions: (i) scalability analysis indicating that
for reasonably large $n$ (e.g., 100), the growth of $k$
is bounded as $ O(n \log n)$, (ii) efficient adaptation
algorithms for topology changes, such as the addition
or removal of end hosts and routing changes, (iii)
measurement load balancing schemes, (iv) topology
measurement error handling, and (v) design and
implementation of an adaptive streaming media system as
a representative application. Both simulation and
Internet experiments demonstrate we obtain highly
accurate path loss rate estimation while adapting to
topology changes within seconds and handling topology
errors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamics; load balancing; network measurement and
monitoring; numerical linear algebra; overlay;
scalability",
}
@Article{Jin:2007:PPC,
author = "Yasong Jin and Soshant Bali and Tyrone E. Duncan and
Victor S. Frost",
title = "Predicting properties of congestion events for a
queueing system with {fBm} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1098--1108",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In packet networks, congestion events tend to persist,
producing large delays and long bursts of consecutive
packet loss resulting in perceived performance
degradations. The length and rate of these events have
a significant effect on network quality of service
(QoS). The packet delay resulting from these congestion
events also influences QoS. In this paper a technique
for predicting these properties of congestion events in
the presence of fractional Brownian motion (fBm)
traffic is developed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Internet; network congestion; networks; quality of
service",
}
@Article{Li:2007:EET,
author = "Yee-Ting Li and Douglas Leith and Robert N. Shorten",
title = "Experimental evaluation of {TCP} protocols for
high-speed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1109--1122",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present experimental results
evaluating the performance of the scalable-TCP, HS-TCP,
BIC-TCP, FAST-TCP, and H-TCP proposals in a series of
benchmark tests. In summary, we find that both
Scalable-TCP and FAST-TCP consistently exhibit
substantial unfairness, even when competing flows share
identical network path characteristics. Scalable-TCP,
HS-TCP, FAST-TCP, and BIC-TCP all exhibit much greater
RTT unfairness than does standard TCP, to the extent
that long RTT flows may be completely starved of
bandwidth. Scalable-TCP, HS-TCP, and BIC-TCP all
exhibit slow convergence and sustained unfairness
following changes in network conditions such as the
start-up of a new flow. FAST-TCP exhibits complex
convergence behavior.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "evaluation of TCP protocols; high-speed networks; TCP
congestion control",
}
@Article{Bonaventure:2007:ASM,
author = "Olivier Bonaventure and Clarence Filsfils and Pierre
Fran{\c{c}}ois",
title = "Achieving sub-50 milliseconds recovery upon {BGP}
peering link failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1123--1135",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent measurements show that BGP peering links can
fail as frequently as intradomain links and usually for
short periods of time. We propose a new fast-reroute
technique where routers are prepared to react quickly
to interdomain link failures. For each of its
interdomain links, a router precomputes a protection
tunnel, i.e., an IP tunnel to an alternate nexthop
which can reach the same destinations as via the
protected link. We propose a BGP-based auto-discovery
technique that allows each router to learn the
candidate protection tunnels for its links. Each router
selects the best protection tunnels for its links and
when it detects an interdomain link failure, it
immediately encapsulates the packets to send them
through the protection tunnel. Our solution is
applicable for the links between large transit ISPs and
also for the links between multi-homed stub networks
and their providers. Furthermore, we show that
transient forwarding loops (and thus the corresponding
packet losses) can be avoided during the routing
convergence that follows the deactivation of a
protection tunnel in BGP/MPLS VPNs and in IP networks
using encapsulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BGP; computer network reliability; fast recovery;
routing",
}
@Article{Riedl:2007:ROI,
author = "Anton Riedl and Dominic A. Schupke",
title = "Routing optimization in {IP} networks utilizing
additive and concave link metrics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1136--1148",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Routing optimization provides network operators with a
powerful method for traffic engineering. Its general
objective is to distribute traffic flows evenly across
available network resources in order to avoid network
congestion and quality of service degradation.\par
In this paper we consider routing optimization based on
conventional routing protocols where packets are
forwarded hop-by-hop in a destination-based manner.
Unlike other work in this area, we consider routing
protocols, which are able to take into account concave
routing metrics in addition to additive ones. The
concave link metric introduces an additional degree of
freedom for routing optimization, thus, increasing its
optimization potential. We present and evaluate a
mixed-integer programming model, which works on these
metrics. This model unifies the optimization for
single-metric and dual-metric routing concepts and also
includes the consideration of multipath routing.
Furthermore, we propose a heuristic algorithm usable
for larger network instances.\par
Numerical results indicate that employment of both the
dual-metric concept and multipath routing can achieve
considerably better utilization results than
default-configured single-metric routing. A significant
finding is that metric-based routing optimization with
two link metrics often comes close to the results
obtainable by optimization of arbitrarily configurable
routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "genetic algorithm; Internet; mixed integer
programming; routing optimization; traffic
engineering",
}
@Article{Zhao:2007:SDS,
author = "Yanping Zhao and Derek L. Eager and Mary K. Vernon",
title = "Scalable on-demand streaming of nonlinear media",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1149--1162",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A conventional video file contains a single
temporally-ordered sequence of video frames. Clients
requesting on-demand streaming of such a file receive
(all or intervals of) the same content. For popular
files that receive many requests during a file playback
time, scalable streaming protocols based on multicast
or broadcast have been devised. Such protocols require
server and network bandwidth that grow much slower than
linearly with the file request rate.\par
This paper considers `nonlinear' video content in which
there are parallel sequences of frames. Clients
dynamically select which branch of the video they wish
to follow, sufficiently ahead of each branch point so
as to allow the video to be delivered without jitter.
An example might be `choose-your-own-ending' movies.
With traditional scalable delivery architectures such
as movie theaters or TV broadcasting, such
personalization of the delivered video content is very
difficult or impossible. It becomes feasible, in
principle at least, when the video is streamed to
individual clients over a network. For on-demand
streaming of nonlinear media, this paper analyzes the
minimal server bandwidth requirements, and proposes and
evaluates practical scalable delivery protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hierarchical stream merging; nonlinear media;
on-demand streaming; performance evaluation; periodic
broadcast",
}
@Article{Li:2007:MTO,
author = "Jikai Li and Chunming Qiao and Jinhui Xu and Dahai
Xu",
title = "Maximizing throughput for optical burst switching
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1163--1176",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In optical burst switching (OBS) networks, a key
problem is to schedule as many bursts as possible on
wavelength channels so that the throughput is maximized
and the burst loss is minimized. Most of the current
research on OBS has been concentrated on reducing burst
loss in an `average-case' sense, and little effort has
been devoted to understanding the worst case
performance. Since OBS itself is an open-loop control
system, it may exhibit a worst case behavior when
adversely synchronized. On the other hand, most
commercial systems require an acceptable worst case
performance.\par
In this paper, we use competitive analysis to analyze
the worst case performance of a large set of scheduling
algorithms, called best-effort online scheduling
algorithms, for OBS networks and establish a number of
interesting upper and lower bounds on the performance
of such algorithms. Our analysis shows that the
performance of any best-effort online algorithm is
closely related to a few factors, such as the range of
offset time, maximum-to-minimum burst-length ratio, and
the number of data channels. A surprising discovery is
that the worst case performance of any best-effort
online scheduling algorithm is primarily determined by
the maximum-to-minimum burst-length ratio, followed by
the range of offset time. Furthermore, if all bursts
have the same burst length and offset time, all
best-effort online scheduling algorithms generate the
same optimal solution, regardless of how different they
may look. Our analysis can also be extended to some
non-best-effort online scheduling algorithms, such as
the well-known Horizon algorithm, and establish similar
bounds. Based on the analytic results, we give
guidelines for several widely discussed OBS problems,
including burst assembly, offset time setting, and
scheduling algorithm design, and propose a new channel
reservation protocol called virtual fixed offset-time
(VFO) to improve the worst case performance. Our
simulation shows that VFO can also reduce the average
burst loss rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "OBS; scheduling; worst case",
}
@Article{Zhang:2007:AAP,
author = "Jing Zhang and Keyao Zhu and Hui Zang and Norman S.
Matloff and Biswanath Mukherjee",
title = "Availability-aware provisioning strategies for
differentiated protection services in
wavelength-convertible {WDM} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1177--1190",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In an optical WDM mesh network, different protection
schemes (such as dedicated or shared protection) can be
used to improve the service availability against
network failures. However, in order to satisfy a
connection's service-availability requirement in a
cost-effective and resource-efficient manner, we need a
systematic mechanism to select a proper protection
scheme for each connection request while provisioning
the connection. In this paper, we propose to use
connection availability as a metric to provide
differentiated protection services in a
wavelength-convertible WDM mesh network.\par
We develop a mathematical model to analyze the
availabilities of connections with different protection
modes (i.e., unprotected, dedicated protected, or
shared protected). In the shared-protection case, we
investigate how a connection's availability is affected
by backup resource sharing. The sharing might cause
backup resource contention between several connections
when multiple simultaneous (or overlapping) failures
occur in the network. Using a continuous-time Markov
model, we derive the conditional probability for a
connection to acquire backup resources in the presence
of backup resource contention. Through this model, we
show how the availability of a shared-protected
connection can be quantitatively computed.\par
Based on the analytical model, we develop provisioning
strategies for a given set of connection demands in
which an appropriate, possibly different, level of
protection is provided to each connection according to
its predefined availability requirement, e.g., 0.999,
0.997. We propose integer linear programming (ILP) and
heuristic approaches to provision the connections cost
effectively while satisfying the connections'
availability requirements. The effectiveness of our
provisioning approaches is demonstrated through
numerical examples. The proposed provisioning
strategies inherently facilitate the service
differentiation in optical WDM mesh networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "availability; connection provisioning; differentiated
services; optical mesh network; protection; service
reliability; WDM",
}
@Article{Zhang:2007:NAM,
author = "Zhenghao Zhang and Yuanyuan Yang",
title = "A novel analytical model for switches with shared
buffer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1191--1203",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Switches with a shared buffer have lower packet loss
probabilities than other types of switches when the
sizes of the buffers are the same. In the past, the
performance of shared buffer switches has been studied
extensively. However, due to the strong dependencies of
the output queues in the buffer, it is very difficult
to find a good analytical model. Existing models are
either accurate but have exponential complexities or
not very accurate. In this paper, we propose a novel
analytical model called the Aggregation model for
switches with shared buffer. The model is based on the
idea of induction: first find the behavior of two
queues, then aggregate them into one block; then find
the behavior of three queues while regarding two of the
queues as one block, then aggregate the three queues
into one block; then aggregate four queues, and so on.
When all queues have been aggregated, the behavior of
the entire switch will be found. This model has perfect
accuracies under all tested conditions and has
polynomial complexity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "aggregation; analytical model; Markov chain; shared
buffer; switches",
}
@Article{Huang:2007:MPK,
author = "Dijiang Huang and Manish Mehta and Appie van de
Liefvoort and Deep Medhi",
title = "Modeling pairwise key establishment for random key
predistribution in large-scale sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "5",
pages = "1204--1215",
month = oct,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:57:26 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Sensor networks are composed of a large number of low
power sensor devices. For secure communication among
sensors, secret keys are required to be established
between them. Considering the storage limitations and
the lack of post-deployment configuration information
of sensors, RandomKey Predistribution schemes have been
proposed. Due to limited number of keys, sensors can
only share keys with a subset of the neighboring
sensors. Sensors then use these neighbors to establish
pairwise keys with the remaining neighbors. In order to
study the communication overhead incurred due to
pairwise key establishment, we derive probability
models to design and analyze pairwise key establishment
schemes for large-scale sensor networks. Our model
applies the binomial distribution and a modified
binomial distribution and analyzes the key path length
in a hop-by-hop fashion. We also validate our models
through a systematic validation procedure. We then show
the robustness of our results and illustrate how our
models can be used for addressing sensor network design
problems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "random key distributions; security; sensor networks",
}
@Article{Le:2007:EAQ,
author = "Long Le and Jay Aikat and Kevin Jeffay and F. Donelson
Smith",
title = "The effects of active queue management and explicit
congestion notification on {Web} performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1217--1230",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present an empirical study of the effects of active
queue management (AQM) and explicit congestion
notification (ECN) on the distribution of response
times experienced by users browsing the Web. Three
prominent AQM designs are considered: the Proportional
Integral (PI) controller, the Random Exponential
Marking (REM) controller, and Adaptive Random Early
Detection (ARED). The effects of these AQM designs were
studied with and without ECN. Our primary measure of
performance is the end-to-end response time for HTTP
request-response exchanges. Our major results are as
follows.\par
\item If ECN is not supported, ARED operating in
byte-mode was the best performing design, providing
better response time performance than drop-tail
queueing at offered loads above 90\% of link capacity.
However, ARED operating in packet-mode (with or without
ECN) was the worst performing design, performing worse
than drop-tail queueing.\par
\item ECN support is beneficial to PI and REM. With
ECN, PI and REM were the best performing designs,
providing significant improvement over ARED operating
in byte-mode. In the case of REM, the benefit of ECN
was dramatic. Without ECN, response time performance
with REM was worse than drop-tail queueing at all loads
considered.\par
\item ECN was not beneficial to ARED. Under current ECN
implementation guidelines, ECN had no effect on ARED
performance. However, ARED performance with ECN
improved significantly after re versing a guideline
that was intended to police unresponsive flows.
Overall, the best ARED performance was achieved without
ECN.\par
\item Whether or not the improvement in response times
with AQM is significant, depends heavily on the range
of round-trip times (RTTs) experienced by flows. As the
variation in flows' RTT increases, the impact of AQM
and ECN on response-time performance is reduced.\par
We conclude that AQM can improve application and
network performance for Web or Web-like workloads. In
particular, it appears likely that with AQM and ECN,
provider links may be operated at near saturation
levels without significant degradation in
user-perceived performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Voice:2007:SMP,
author = "Thomas Voice",
title = "Stability of multi-path dual congestion control
algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1231--1239",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates fair, scalable, stable
congestion controls which achieve high bandwidth
utilization over networks operating multi-path routing.
It aims to take advantage of path diversity to achieve
efficient bandwidth allocation without causing
instability.\par
We develop a multi-path extension to the dual
algorithm, which takes into consideration path
diversity when evaluating fairness. This algorithm is
shown to be globally stable in the absence of
propagation delays and a sufficient condition for local
stability, for the case when heterogeneous propagation
delays are present, is found. The sufficient condition
we present is decentralized in the following sense: the
gain parameter for each dynamic variable is restricted
by the average round-trip time of packets passing
through the link or source it represents, but not by
the round-trip times of any other packets. This leads
to a highly scalable parameter choice scheme. Gain
parameters are calculated from local information which
is independent of the state of the algorithm, and our
delay stability condition is satisfied.\par
The models considered apply to networks consisting of
arbitrary interconnections of sources and links with
arbitrary heterogeneous propagation delays.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic routing; flow control; resource allocation;
stability",
}
@Article{Hande:2007:DRA,
author = "Prashanth Hande and Shengyu Zhang and Mung Chiang",
title = "Distributed rate allocation for inelastic flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1240--1253",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A common assumption behind most of the recent research
on network rate allocation is that traffic flows are
elastic, which means that their utility functions are
concave and continuous and that there is no hard limit
on the rate allocated to each flow. These critical
assumptions lead to the tractability of the analytic
models for rate allocation based on network utility
maximization, but also limit the applicability of the
resulting rate allocation protocols. This paper focuses
on inelastic flows and removes these restrictive and
often invalid assumptions.\par
First, we consider nonconcave utility functions, which
turn utility maximization into difficult, nonconvex
optimization problems. We present conditions under
which the standard price-based distributed algorithm
can still converge to the globally optimal rate
allocation despite nonconcavity of utility functions.
In particular, continuity of price-based rate
allocation at all the optimal prices is a sufficient
condition for global convergence of rate allocation by
the standard algorithm, and continuity at at least one
optimal price is a necessary condition. We then show
how to provision link capacity to guarantee convergence
of the standard distributed algorithm. Second, we model
real-time flow utilities as discontinuous functions. We
show how link capacity can be provisioned to allow
admission of all real-time flows, then propose a
price-based admission control heuristics when such link
capacity provisioning is impossible, and finally
develop an optimal distributed algorithm to allocate
rates between elastic and real-time flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity provisioning; congestion control; inelastic
flow; network control by pricing; network utility
maximization; optimization; resource allocation",
}
@Article{Bridges:2007:CET,
author = "Patrick G. Bridges and Gary T. Wong and Matti Hiltunen
and Richard D. Schlichting and Matthew J. Barrick",
title = "A configurable and extensible transport protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1254--1265",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The ability to configure transport protocols from
collections of smaller software modules allows the
characteristics of the protocol to be customized for a
specific application or network technology. This paper
describes a configurable transport protocol system
called CTP in which microprotocols implementing
individual attributes of transport can be combined into
a composite protocol that realizes the desired overall
functionality. In addition to describing the overall
architecture of CTP and its microprotocols, this paper
also presents experiments on both local area and wide
area platforms that illustrate the flexibility of CTP
and how its ability to match more closely application
needs can result in better application performance. The
prototype implementation of CTP has been built using
the C version of the Cactus microprotocol composition
framework running on Linux.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "configuration; customization; extensibility; transport
protocol",
}
@Article{Feamster:2007:IAE,
author = "Nick Feamster and Ramesh Johari and Hari
Balakrishnan",
title = "Implications of autonomy for the expressiveness of
policy routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1266--1279",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Thousands of competing autonomous systems must
cooperate with each other to provide global Internet
connectivity. Each autonomous system (AS) encodes
various economic, business, and performance decisions
in its routing policy. The current interdomain routing
system enables each AS to express policy using rankings
that determine how each router in the AS chooses among
different routes to a destination, and filters that
determine which routes are hidden from each neighboring
AS. Because the Internet is composed of many
independent, competing networks, the interdomain
routing system should provide autonomy, allowing
network operators to set their rankings independently,
and to have no constraints on allowed filters. This
paper studies routing protocol stability under these
conditions. We first demonstrate that `next-hop
rankings,' commonly used in practice, may not ensure
routing stability. We then prove that, when providers
can set rankings and filters autonomously, guaranteeing
that the routing system will converge to a stable path
assignment imposes strong restrictions on the rankings
ASes are allowed to choose. We discuss the implications
of these results for the future of interdomain
routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "automony; BGP; interdomain routing; policy; safety",
}
@Article{Francois:2007:ATL,
author = "Pierre Fran{\c{c}}ois and Olivier Bonaventure",
title = "Avoiding transient loops during the convergence of
link-state routing protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1280--1292",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "When using link-state protocols such as OSPF or IS-IS,
forwarding loops can occur transiently when the routers
adapt their forwarding tables as a response to a
topological change. In this paper, we present a
mechanism that lets the network converge to its optimal
forwarding state without risking any transient loops
and the related packet loss. The mechanism is based on
an ordering of the updates of the forwarding tables of
the routers. Our solution can be used in the case of a
planned change in the state of a set of links and in
the case of unpredictable changes when combined with a
local protection scheme. The supported topology changes
are link transitions from up to down, down to up, and
updates of link metrics. Finally, we show by
simulations that sub-second loop-free convergence is
possible on a large Tier-1 ISP network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "link-state routing protocols; loop avoidance; network
reliability; routing; routing convergence",
}
@Article{Retvari:2007:SPR,
author = "G{\'a}bor R{\'e}tv{\'a}ri and J{\'o}zsef J.
B{\'\i}r{\'o} and Tibor Cinkler",
title = "On shortest path representation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1293--1306",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Lately, it has been proposed to use shortest path
first routing to implement Traffic Engineering in IP
networks. The idea is to set the link weights so that
the shortest paths, and the traffic thereof, follow the
paths designated by the operator. Clearly, only certain
shortest path representable path sets can be used in
this setting, that is, paths which become shortest
paths over some appropriately chosen positive,
integer-valued link weights. Our main objective in this
paper is to distill and unify the theory of shortest
path representability under the umbrella of a novel
flow-theoretic framework. In the first part of the
paper, we introduce our framework and state a
descriptive necessary and sufficient condition to
characterize shortest path representable paths.
Unfortunately, traditional methods to calculate the
corresponding link weights usually produce a bunch of
superfluous shortest paths, often leading to congestion
along the unconsidered paths. Thus, the second part of
the paper is devoted to reducing the number of paths in
a representation to the bare minimum. To the best of
our knowledge, this is the first time that an algorithm
is proposed, which is not only able to find a minimal
representation in polynomial time, but also assures
link weight integrality. Moreover, we give a necessary
and sufficient condition to the existence of a
one-to-one mapping between a path set and its shortest
path representation. However, as revealed by our
simulation studies, this condition seems overly
restrictive and instead, minimal representations prove
much more beneficial",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "linear programming; shortest path routing; traffic
engineering",
}
@Article{Xiao:2007:ANS,
author = "Jin Xiao and Raouf Boutaba",
title = "Assessing network service profitability: modeling from
market science perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1307--1320",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network service providers regularly conduct network
planning and upgrade processes to keep their businesses
profitable. The effectiveness of a network
upgrade/planning decision is intrinsically tied to the
ability of a provider to retain and grow its customer
population. This paper examines the crucial linkage
between network performance, customer satisfaction and
profitability of network service, and presents an
analytical modeling approach from market science
perspective. We derive a generalized forecasting model
that projects service profitability from the underlying
network service infrastructure and the subscriber
population. Through simulation studies and analysis, we
show how such approach captures key factors and trends
influencing service profitability and how it can
significantly improve current network planning and
upgrade processes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "economics; network applications and services; network
design and planning",
}
@Article{Beimel:2007:ROE,
author = "Amos Beimel and Shlomi Dolev and Noam Singer",
title = "{RT} oblivious erasure correcting",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1321--1332",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An erasure correcting scheme is rateless if it is
designed to tolerate any pattern of packet loss and
reveal the transmitted information after a certain
number of packets is received. On the one hand,
transmission schemes that use rateless erasure
correcting schemes do not usually use a feedback
channel. However, they may require significant amount
of additional processing by both the sender and the
receiver. On the other hand, automatic repeated request
protocols use a feedback channel to assist the sender,
and do not usually require information processing. In
this work we present a combined approach, where a lean
feedback channel is used to assist the sender to
efficiently transmit the information. Our Real-Time
oblivious approach minimizes the processing time and
the memory requirements of the receiver and, therefore,
fits a variety of receiving devices. In addition, the
transmission is real-time where the expected number of
original packets revealed when a packet is received is
approximately the same throughout the entire
transmission process. We use our end-to-end scheme as a
base for broadcast (and multicast) schemes. An overlay
tree structure is used to convey the information to a
large number of receivers. Moreover, the receivers may
download the information from a number of senders or
even migrate from one sender to another.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ARQ; combinatorics; data-link; information theory;
stochastic processes; transport layer",
}
@Article{Eryilmaz:2007:FRA,
author = "Atilla Eryilmaz and R. Srikant",
title = "Fair resource allocation in wireless networks using
queue-length-based scheduling and congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1333--1344",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of allocating resources (time
slots, frequency, power, etc.) at a base station to
many competing flows, where each flow is intended for a
different receiver. The channel conditions may be
time-varying and different for different receivers. It
is well-known that appropriately chosen queue-length
based policies are throughput-optimal while other
policies based on the estimation of channel statistics
can be used to allocate resources fairly (such as
proportional fairness) among competing users. In this
paper, we show that a combination of queue-length-based
scheduling at the base station and congestion control
implemented either at the base station or at the end
users can lead to fair resource allocation and
queue-length stability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; m-weighted fairness; proportional
fairness; throughput-optimal scheduling; wireless
networks",
}
@Article{Hajiaghayi:2007:POF,
author = "Mohammad Taghi Hajiaghayi and Nicole Immorlica and
Vahab S. Mirrokni",
title = "Power optimization in fault-tolerant topology control
algorithms for wireless multi-hop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1345--1358",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In ad hoc wireless networks, it is crucial to minimize
power consumption while maintaining key network
properties. This work studies power assignments of
wireless devices that minimize power while maintaining
$k$-fault tolerance. Specifically, we require all links
established by this power setting be symmetric and form
a $k$-vertex connected subgraph of the network graph.
This problem is known to be NP-hard. We show current
heuristic approaches can use arbitrarily more power
than the optimal solution. Hence, we seek approximation
algorithms for this problem. We present three
approximation algorithms. The first algorithm gives an
$ O(k \alpha)$-approximation where $ \alpha $ is the
best approximation factor for the related problem in
wired networks (the best $ \alpha $ so far is $ O(\log
k)$.) With a more careful analysis, we show our second
(slightly more complicated) algorithm is an $
O(k)$-approximation. Our third algorithm assumes that
the edge lengths of the network graph form a metric. In
this case, we present simple and practical distributed
algorithms for the cases of 2- and 3-connectivity with
constant approximation factors. We generalize this
algorithm to obtain an $ O(k^{2c + 2})$-approximation
for general $k$-connectivity ($ 2 \leq c \leq 4$ is the
power attenuation exponent). Finally, we show that
these approximation algorithms compare favorably with
existing heuristics. We note that all algorithms
presented in this paper can be used to minimize power
while maintaining $k$-edge connectivity with guaranteed
approximation factors. Recently, different set of
authors used the notion of $k$-connectivity and the
results of this paper to deal with the fault-tolerance
issues for static wireless network settings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad hoc networks; approximation algorithms; graph
model; graph properties; power conservation; topology
control",
}
@Article{Madan:2007:MOT,
author = "Ritesh Madan and Shuguang Cui and Sanjay Lall and
Andrea J. Goldsmith",
title = "Modeling and optimization of transmission schemes in
energy-constrained wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1359--1372",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a wireless sensor network with energy
constraints. We model the energy consumption in the
transmitter circuit along with that for data
transmission. We model the bottom three layers of the
traditional networking stack--the link layer, the
medium access control (MAC) layer, and the routing
layer. Using these models, we consider the optimization
of transmission schemes to maximize the network
lifetime. We first consider the optimization of a
single layer at a time, while keeping the other layers
fixed. We make certain simplifying assumptions to
decouple the layers and formulate optimization problems
to compute a strategy that maximizes the network
lifetime. We then extend this approach to cross-layer
optimization of time division multiple access (TDMA)
wireless sensor networks. In this case, we construct
optimization problems to compute the optimal
transmission schemes to an arbitrary degree of accuracy
and efficiently. We then consider networks with
interference, and propose methods to compute
approximate solutions to the resulting optimization
problems. We give numerical examples that illustrate
the computational approaches as well as the benefits of
cross-layer design in wireless sensor networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-layer design; energy efficiency; network
lifetime; optimization; wireless sensor networks",
}
@Article{Yang:2007:DOC,
author = "Yaling Yang and Jun Wang and Robin Kravets",
title = "Distributed optimal contention window control for
elastic traffic in single-cell wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1373--1386",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a theoretical study on distributed
contention window control algorithms for achieving
arbitrary bandwidth allocation policies and efficient
channel utilization. By modeling different bandwidth
allocation policies as an optimal contention window
assignment problem, we design a general and fully
distributed contention window control algorithm, called
General Contention window Adaptation (GCA), and prove
that it converges to the solution of the contention
window assignment problem. By examining the stability
of GCA, we identify the optimal stable point that
maximizes channel utilization and provide solutions to
control the stable point near the optimal point. Due to
the generality of GCA, our work provides a theoretical
foundation to analyze existing and design new
contention window control algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic bandwidth allocation; fairness; LAN;
wireless",
}
@Article{Yang:2007:IMC,
author = "Xiangying Yang and Gustavo {De Veciana}",
title = "Inducing multiscale clustering using multistage {MAC}
contention in {CDMA} ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1387--1400",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes a new principle for designing MAC
protocols for CDMA-based ad hoc networks-inducing
spatial clustering in contending
transmitters/receivers. We first highlight the
advantages of CDMA in handling quality of service (QoS)
requirements, enhancing energy efficiency, and enabling
spatial multiplexing of bursty traffic. Then, based on
stochastic geometric models and simulation, we show how
idealized contention resolution among randomly
distributed nodes results in clustering of successful
transmitters and receivers, in turn leading to
efficient spatial reuse. This motivates the central
idea of the paper which is to explicitly induce
clustering among contending nodes to achieve even
better spatial reuse. We propose two distributed
mechanisms to realize such clustering and show
substantial capacity gains over simple random
access/ALOHA-like and even RTS/CTS-based protocols. We
examine under what regimes such gains can be achieved,
and how clustering and contention resolution mechanisms
should be optimized to do so. We propose the design of
ad hoc networks supporting hop-by-hop relaying on
different spatial scales. By allowing nodes to relay
beyond the set of nearest neighbors using varying
transmission distances (scales), one can reduce the
number of hops between a source and destination so as
to meet end-to-end delay requirements. To that end we
propose a multi-scale MAC clustering and power control
mechanism to support transmissions with different
ranges while achieving high spatial reuse. The
considerations, analysis and simulations included in
this paper suggest that the principle of inducing
spatial clustering in contention has substantial
promise towards achieving high spatial reuse, QoS, and
energy efficiency in CDMA ad hoc networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad hoc network; CDMA; clustering; contention; MAC",
}
@Article{Luo:2007:DRS,
author = "Huiyu Luo and Gregory J. Pottie",
title = "Designing routes for source coding with explicit side
information in sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1401--1413",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the problem of designing
routes for source coding with explicit side information
(i.e., with side information at both the encoder and
the decoder) in sensor networks. Two difficulties in
constructing such data-centric routes are the lack of
reasonably practical data aggregation models and the
high computational complexity resulting from the
coupling of routing and in-network data fusion. Our
data aggregation model is built upon the observation
that in many physical situations the side information
providing the most coding gain comes from a small
number of nearby sensors. Based on this model, we
formulate an optimization problem to minimize the
communication cost, and show that finding the exact
solution of this problem is NP-hard. Subsequently, two
suboptimal algorithms are proposed. One is inspired by
the balanced trees that have small total weights and
reasonable distance from each sensor to the fusion
center [6]. The other separately routes the explicit
side information to achieve cost minimization. Bounds
on the worst-case performance ratios of two methods to
the optimal solution are derived for a special class of
rate models, and simulations are conducted to shed
light on their average behaviors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data-centric routing; maximum weight branching;
NP-hardness; shortest path tree; source coding; Steiner
tree",
}
@Article{Bosio:2007:RPW,
author = "Sandro Bosio and Antonio Capone and Matteo Cesana",
title = "Radio planning of wireless local area networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1414--1427",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper we propose mathematical models to tackle
the WLAN planning problem. Our approach aims at
maximizing network efficiency by taking into account
the inter-AP domain interference and the access
mechanism. Both the single-channel and the
multiple-channel WLAN planning problems are considered.
We give different formulations which capture at
different levels of detail the effect of interference
on the network efficiency. In order to evaluate the
quality of the proposed models, we obtain the optimal
solutions for synthetic network instances, and propose
heuristics to get suboptimal solutions in a reasonable
computing time. We show that the networks planned
according to our approach feature higher efficiency
than the ones planned using classical models, like the
minimum-cardinality set covering problem (SCP), by
privileging network solutions with low-power APs
installed. The achieved gain reaches 167\% in
particular network scenarios. Moreover, we test the
obtained solutions through simulation and real-life
testbed implementation; both analyses show that the
networks planned with the proposed approaches are the
ones with the highest saturation throughput with
respect to those configurations obtained with SCP.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "local search; mathematical programming; radio
planning; wireless local area networks (WLANs)",
}
@Article{Raghunath:2007:MBC,
author = "Satish Raghunath and K. K. Ramakrishnan and Shivkumar
Kalyanaraman",
title = "Measurement-based characterization of {IP VPNs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1428--1441",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Virtual Private Networks (VPNs) provide secure and
reliable communication between customer sites. With the
increase in number and size of VPNs, providers need
efficient provisioning techniques that adapt to
customer demand by leveraging a good understanding of
VPN properties.\par
In this paper, we analyze two important properties of
VPNs that impact provisioning: (1) structure of
customer endpoint (CE) interactions and (2) temporal
characteristics of CE-CE traffic. We deduce these
properties by computing traffic matrices from SNMP
measurements. We find that existing traffic matrix
estimation techniques are not readily applicable to the
VPN scenario due to the scale of the problem and
limited measurement information. We begin by
formulating a scalable technique that makes the most
out of existing measurement information and provides
good estimates for common VPN structures. We then use
this technique to analyze SNMP measurement information
from a large IP VPN service provider.\par
We find that even with limited measurement information
(no per-VPN data for the core) we can estimate traffic
matrices for a significant fraction of VPNs, namely,
those constituting the `Hub-and-Spoke' category. In
addition, the ability to infer the structure of VPNs
holds special significance for provisioning tasks
arising from topology changes, link failures and
maintenance. We are able to provide a classification of
VPNs by structure and identify CEs that act as hubs of
communication and hence require prioritized treatment
during restoration and provisioning.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "estimation; provisioning; traffic engineering; traffic
matrix; virtual private network (VPN)",
}
@Article{Li:2007:NCE,
author = "Chengzhi Li and Almut Burchard and J{\"o}rg
Liebeherr",
title = "A network calculus with effective bandwidth",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1442--1453",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper establishes a link between two principal
tools for the analysis of network traffic, namely,
effective bandwidth and network calculus. It is shown
that a general version of effective bandwidth can be
expressed within the framework of a probabilistic
version of the network calculus, where both arrivals
and service are specified in terms of probabilistic
bounds. By formulating well-known effective bandwidth
expressions in terms of probabilistic envelope
functions, the developed network calculus can be
applied to a wide range of traffic types, including
traffic that has self-similar characteristics. As
applications, probabilistic lower bounds are presented
on the service given by three different scheduling
algorithms: Static Priority, Earliest Deadline First,
and Generalized Processor Sharing. Numerical examples
show the impact of specific traffic models and
scheduling algorithms on the multiplexing gain in a
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "effective bandwidth; network calculus; QoS;
statistical multiplexing",
}
@Article{Valente:2007:EGS,
author = "Paolo Valente",
title = "Exact {GPS} simulation and optimal fair scheduling
with logarithmic complexity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1454--1466",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Generalized Processor Sharing (GPS) is a fluid
scheduling policy providing perfect fairness over both
constant-rate and variable-rate links. The minimum
deviation (lead\slash lag) with respect to the GPS
service achievable by a packet scheduler is one maximum
packet size. To the best of our knowledge, the only
packet scheduler guaranteeing the minimum deviation is
Worst-case Fair Weighted Fair Queueing (WF$^2$ Q),
which requires on-line GPS simulation. Existing
algorithms to perform GPS simulation have $ O(N)$
worst-case computational complexity per packet
transmission ($N$ being the number of competing flows).
Hence, WF$^2$ Q has been charged for $ O(N)$ complexity
too. However it has been proven that the lower bound
complexity to guarantee $ O(1)$ deviation is $ \Omega
(\log N)$, yet a scheduler achieving such a result has
remained elusive so far.\par
In this paper, we present L-GPS, an algorithm that
performs exact GPS simulation with $ O(\log N)$
worst-case complexity and small constants. As such it
improves the complexity of all the packet schedulers
based on GPS simulation. We also present L-WF$^2$ Q, an
implementation of WF$^2$ Q based on L-GPS. L-WF$^2$ Q
has $ O(\log N)$ complexity with small constants, and,
since it achieves the minimum possible deviation, it
does match the aforementioned complexity lower bound.
Furthermore, both L-GPS and L-WF$^2$ Q comply with
constant-rate as well as variable-rate links. We assess
the effectiveness of both algorithms by simulating
real-world scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "complexity theory; scheduling; tree data structures",
}
@Article{Hao:2007:FME,
author = "Fang Hao and Murali Kodialam and T. V. Lakshman and
Shantidev Mohanty",
title = "Fast, memory efficient flow rate estimation using
runs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1467--1477",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Per-flow network traffic measurements are needed for
effective network traffic management, network
performance assessment, and detection of anomalous
network events such as incipient denial-of-service
(DoS) attacks. Explicit measurement of per-flow traffic
statistics is difficult in backbone networks because
tracking the possibly hundreds of thousands of flows
needs correspondingly large high-speed memories. To
reduce the measurement overhead, many previous papers
have proposed the use of random sampling and this is
also used in commercial routers (Cisco's NetFlow). Our
goal is to develop a new scheme that has very low
memory requirements and has quick convergence to within
a pre-specified accuracy. We achieve this by use of a
novel approach based on sampling two-runs to estimate
per-flow traffic. (A flow has a two-run when two
consecutive samples belong to the same flow). Sampling
two-runs automatically biases the samples towards the
larger flows thereby making the estimation of these
sources more accurate. This biased sampling leads to
significantly smaller memory requirement compared to
random sampling schemes. The scheme is very simple to
implement and performs extremely well.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IP flow statistics; traffic measurement; two run",
}
@Article{Lian:2007:FEP,
author = "Jie Lian and Kshirasagar Naik and Gordon B. Agnew",
title = "A framework for evaluating the performance of cluster
algorithms for hierarchical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1478--1489",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Table-driven routing algorithms in flat networks have
the scalability problem due to the need for global
topology updates. To reduce update cost, networks are
hierarchically organized. Clustering algorithms
organize flat networks into hierarchical networks. One
important problem, which has not been adequately
addressed so far, is to evaluate how good a clustering
algorithm is. In other words, it is useful to know what
the desired properties of hierarchical networks are. In
this paper, we address this issue by considering the
routing update cost, which can be measured by the total
routing table size and the variance of cluster size
distribution. We provide a set of desired properties of
clustering algorithms. Applying these properties to the
cluster structure generated by an algorithm, we can
determine how good a clustering algorithm is.
Specifically, we discuss how to choose appropriate
number of hierarchy levels, number of clusters, and
cluster size distribution, such that the topology
update cost is minimized. The desired properties
obtained from the analysis can be used as guidelines in
the design of clustering algorithms for table-driven
hierarchical networks. We apply the idea developed in
this paper to evaluate three routing algorithms, namely
the lowest ID algorithm, the maximum degree algorithm,
and the variable degree clustering algorithm. We show
how the variable degree clustering algorithm, which
takes into account these desired properties, improves
routing performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "clustering algorithm; hierarchical network; network
performance; peer-to-peer (P2P) network; routing",
}
@Article{Lee:2007:DAS,
author = "Patrick P. C. Lee and Vishal Misra and Dan
Rubenstein",
title = "Distributed algorithms for secure multipath routing in
attack-resistant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1490--1501",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To proactively defend against intruders from readily
jeopardizing single-path data sessions, we propose a
distributed secure multipath solution to route data
across multiple paths so that intruders require much
more resources to mount successful attacks. Our work
exhibits several important properties that include: (1)
routing decisions are made locally by network nodes
without the centralized information of the entire
network topology; (2) routing decisions minimize
throughput loss under a single-link attack with respect
to different session models; and (3) routing decisions
address multiple link attacks via lexicographic
optimization. We devise two algorithms termed the
Bound-Control algorithm and the Lex-Control algorithm,
both of which provide provably optimal solutions.
Experiments show that the Bound-Control algorithm is
more effective to prevent the worst-case single-link
attack when compared to the single-path approach, and
that the Lex-Control algorithm further enhances the
Bound-Control algorithm by countering severe
single-link attacks and various types of multi-link
attacks. Moreover, the Lex-Control algorithm offers
prominent protection after only a few execution rounds,
implying that we can sacrifice minimal routing
protection for significantly improved algorithm
performance. Finally, we examine the applicability of
our proposed algorithms in a specialized defensive
network architecture called the attack-resistant
network and analyze how the algorithms address
resiliency and security in different network
settings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "attack-resistant networks; maximum-flow problems;
multipath routing; optimization; preflow-push;
resilience; security",
}
@Article{Yin:2007:BAA,
author = "Heng Yin and Haining Wang",
title = "Building an application-aware {IPsec} policy system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1502--1513",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As a security mechanism at the network-layer, the IP
security protocol (IPsec) has been available for years,
but its usage is limited to Virtual Private Networks
(VPNs). The end-to-end security services provided by
IPsec have not been widely used. To bring the IPsec
services into wide usage, a standard IPsec API is a
potential solution. However, the realization of a
user-friendly IPsec API involves many modifications on
the current IPsec and Internet Key Exchange (IKE)
implementations. An alternative approach is to
configure application-specific IPsec policies, but the
current IPsec policy system lacks the knowledge of the
context of applications running at upper layers, making
it infeasible to configure application-specific
policies in practice.\par
In this paper, we propose an application-aware IPsec
policy system on the existing IPsec/IKE infrastructure,
in which a socket monitor running in the application
context reports the socket activities to the
application policy engine. In turn, the engine
translates the application policies into the underlying
security policies, and then writes them into the IPsec
Security Policy Data-base (SPD) via the existing IPsec
policy management interface. We implement a prototype
in Linux (Kernel 2.6) and evaluate it in our testbed.
The experimental results show that the overhead of
policy translation is insignificant, and the overall
system performance of the enhanced IPsec is comparable
to those of security mechanisms at upper layers.
Configured with the application-aware IPsec policies,
both secured applications at upper layers and legacy
applications can transparently obtain IP security
enhancements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication system security; computer network
security",
}
@Article{Sun:2007:HGA,
author = "Yan Sun and K. J. Ray Liu",
title = "Hierarchical group access control for secure multicast
communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1514--1526",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many group communications require a security
infrastructure that ensures multiple levels of access
control for group members. While most existing group
key management schemes are designed for single level
access control, we present a multi-group key management
scheme that achieves hierarchical group access control.
Particularly, we design an integrated key graph that
maintains keying material for all members with
different access privileges. It also incorporates new
functionalities that are not present in conventional
multicast key management, such as user relocation on
the key graph. Analysis is performed to evaluate the
storage and communication overhead associated key
management. Comprehensive simulations are performed for
various application scenarios where users statistical
behavior is modelled using a discrete Markov chain.
Compared with applying existing key management schemes
directly to the hierarchical access control problem,
the proposed scheme significantly reduces the overhead
associated with key management and achieves better
scalability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access control; communication system privacy; system
design",
}
@Article{Salido:2007:EBE,
author = "Javier Salido and Loukas Lazos and Radha Poovendran",
title = "Energy and bandwidth-efficient key distribution in
wireless ad hoc networks: a cross-layer approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1527--1540",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We address the problem of resource-efficient access
control for group communications in wireless ad hoc
networks. Restricting the access to group data can be
reduced to the problem of securely distributing
cryptographic keys to group members, known as the key
distribution problem (KDP). We examine the KDP under
four metrics: (a) member key storage, (b) group
controller (GC) transmissions, (c) multicast group (MG)
update messages, and (d) average update energy. For
each metric, we formulate an optimization problem and
show that the KDP has unique solutions for metrics (a)
and (b), while is NP-complete for (c) and (d). We
propose a cross-layer heuristic algorithm called VP3
that bounds member key storage, and GC transmissions,
while significantly reducing the energy and bandwidth
consumption of the network. We define the notion of
path divergence as a measure of bandwidth efficiency of
multicasting, and establish an analytical worst-case
bound for it. Finally, we propose On-line VP3, which
dynamically updates the key assignment structure
according to the dynamics of the communication group in
a resource-efficient way.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad hoc; key distribution; key management; multicast;
secure group communication; security",
}
@Article{Leonardi:2007:OSR,
author = "Emilio Leonardi and Marco Mellia and Marco Ajmone
Marsan and Fabio Neri",
title = "Optimal scheduling and routing for maximum network
throughput",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1541--1554",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper we consider packet networks loaded by
admissible traffic patterns, i.e., by traffic patterns
that, if optimally routed, do not overload network
resources. We prove that simple distributed dynamic
routing and scheduling algorithms based upon link state
information can achieve the same network throughput as
optimal centralized routing and scheduling algorithms
with complete traffic information.\par
Our proofs apply the stochastic Lyapunov function
methodology to a flow-level abstract model of the
network, and consider elastic traffic, i.e., we assume
that flows can adapt their transmission rates to
network conditions, thus resembling traffic engineering
and quality-of-service approaches being currently
proposed for IP networks.\par
Although the paper mainly brings a theoretical
contribution, such dynamic routing and scheduling
algorithms can be implemented in a distributed way.
Moreover we prove that maximum throughput is achieved
also in case of temporary mismatches between the actual
links state and the link state information used by the
routing algorithm. This is a particularly relevant
aspect, since any distributed implementation of a
routing algorithm requires a periodic exchange of link
state information among nodes, and this implies delays,
and thus time periods in which the current link costs
are not known.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic stability; computer network performance;
Lyapunov methods",
}
@Article{Komolafe:2007:HFR,
author = "Olufemi Komolafe and David Harle",
title = "An holistic framework for regular virtual topology
design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1555--1564",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A bifurcated approach is typically adopted to the
regular virtual topology design problem. By exploiting
key metrics that affect optimization solutions, it is
shown that easily computed parameters, pertaining to
the spread in inter-nodal distances and the spread in
inter-nodal traffic, are descriptive and appropriate
means to characterize problem inputs, the physical
topology and the traffic matrix. The juxtaposition
between these parameters and the optimization results
is explored, culminating in the development of a novel
holistic framework for regular virtual topology design.
This framework offers the possibility of simplifying
regular virtual topology design by presenting the
different traditional design approaches as being
nuances of a single overarching problem and suggesting
criteria for choosing the most expedient design
approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "combinatorial optimization; graph theory;
multi-processor interconnection architectures; regular
virtual topology design; WDM networks",
}
@Article{Hamza:2007:WOI,
author = "Haitham S. Hamza and Jitender S. Deogun",
title = "{WDM} optical interconnects: a balanced design
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1565--1578",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we develop a new design approach to
wavelength division multiplexing (WDM) optical
interconnects with the objective of designing
cost-effective and scalable interconnects. Our design
philosophy strikes a balance between switching and
conversion costs, and requires wavelength conversion
only between two fixed and predefined wavelengths. The
proposed design approach exploits the potential of the
wavelength exchange optical crossbar (WOC)--a device
that can switch signals simultaneously and seamlessly
both in space and wavelength domains. We propose a
novel crossbar switch that minimizes hardware and
control complexity and use it as a building block for
developing a new class of three-stage Clos-like WDM
optical interconnects. The design space of the proposed
interconnect is characterized and its hardware
complexity is analyzed. We also show that the proposed
crossbar switch and the new class of WDM interconnects
admit most existing routing algorithms with simple
modifications. In addition, we show that our design
approach can be generalized to develop a class of
$k$-stage $ N \times N$ interconnects, $ 3 k \leq 2
\log 2 N - 1$.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Clos network; crossbar switch; optical interconnects;
wavelength converter; wavelength division multiplexing
(WDM); wavelength exchange optical crossbar (WOC)",
}
@Article{Cholda:2007:RAO,
author = "Piotr Cho{\l}da and Andrzej Jajszczyk",
title = "Reliability assessment of optical p-cycles",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1579--1592",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Two recovery techniques suited for the Next Generation
Internet are studied: traditional protection rings
(BLSRs) and a novel, preconfigured protection cycles
($p$-cycles) technique. Theoretical formulas describing
the reliability function as well as Mean Time to
Failure are derived. On the basis of our analysis, we
show that $p$-cycles should not be used in wide-area
networks since their reliability performance is outside
the desired bounds.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "availability; mean time to failure; p-cycles;
reliability",
}
@Article{Shalom:2007:EAM,
author = "Mordechai Shalom and Shmuel Zaks",
title = "A $ 10 / 7 + \epsilon $ approximation for minimizing
the number of {ADMs} in {SONET} rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1593--1602",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "SONET add/drop multiplexers (ADMs) are dominant cost
factors in WDM SONET rings. Whereas most previous
papers on the topic concentrated on the number of
wavelengths assigned to a given set of lightpaths, more
recent papers argue that the number of ADMs is a more
realistic cost measure. Some of these works discuss
various heuristic algorithms for this problem, and the
best known result is a 3/2 approximation in Calinescu
and Wan, 2002. Through the study of the relation
between this problem and the problem of finding maximum
disjoint rings in a given set of lightpaths we manage
to shed more light onto this problem and to develop a
10/7 + $ \epsilon $ approximation for it.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "add-drop multiplexer (ADM); optical networks;
wavelength assignment; wavelength division multiplexing
(WDM)",
}
@Article{Abel:2007:DIN,
author = "Fran{\c{c}}ois Abel and Cyriel Minkenberg and Ilias
Iliadis and Ton Engbersen and Mitchell Gusat and
Ferdinand Gramsamer and Ronald P. Luijten",
title = "Design issues in next-generation merchant switch
fabrics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1603--1615",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet-switch fabrics with widely varying
characteristics are currently deployed in the domains
of both communications and computer interconnection
networks. For economical reasons, it would be highly
desirable that a single switch fabric could accommodate
the needs of a variety of heterogeneous services and
applications from both domains. In this paper, we
consider the current requirements, technological
trends, and their implications on the design of an ASIC
chipset for a merchant switch fabric. We then identify
the architecture upon which such a suitable and generic
switch fabric could be based, and we present the
general characteristics of an implementation of this
switching fabric within the bounds of current
state-of-the-art technology. To our knowledge, this is
the first attempt to design a chipset that can be used
for both communications and computer interconnection
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "buffered crossbar; combined Input and crosspoint
Queueing (CICQ); interconnection networks; packet
switching",
}
@Article{Luo:2007:CSS,
author = "Hongbin Luo and Hongfang Yu and Lemin Li",
title = "Comments on {`Segment shared protection in mesh
communication networks with bandwidth guaranteed
tunnels'}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "15",
number = "6",
pages = "1616--1616",
month = dec,
year = "2007",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:58:21 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Ho:2004:SSP}.",
abstract = "In this Comment, two typos in Ho et al., 2004,
`Segment Shared Protection in Mesh Communication
Networks With Bandwidth Guaranteed Tunnels', are
pointed out. These typos may puzzle readers or prevent
them from correctly understand this paper. In the
second part of this Comment, we present corrections to
the typos.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "segment shared protection (SSP); survivable routing;
working and protection paths",
}
@Article{Keralapura:2008:RCC,
author = "Ram Keralapura and Chen-Nee Chuah and Nina Taft and
Gianluca Iannaccone",
title = "Race conditions in coexisting overlay networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "1--14",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "By allowing end hosts to make independent routing
decisions at the application level, different overlay
networks may unintentionally interfere with each other.
This paper describes how multiple similar or dissimilar
overlay networks could experience race conditions,
resulting in oscillations (in both route selection and
network load) and cascading reactions. We pinpoint the
causes for synchronization and derive an analytic
formulation for the synchronization probability of two
overlays. Our model indicates that the probability of
synchronization is non-negligible across a wide range
of parameter settings, thus implying that the ill
effects of synchronization should not be ignored. Using
the analytical model, we find an upper bound on the
duration of traffic oscillations. We also show that the
model can be easily extended to include a large number
of co-existing overlays. We validate our model through
simulations that are designed to capture the transient
routing behavior of both the IP- and overlay-layers. We
use our model to study the effects of factors such as
path diversity (measured in round trip times) and
probing aggressiveness on these race conditions.
Finally, we discuss the implications of our study on
the design of path probing process in overlay networks
and examine strategies to reduce the impact of race
conditions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "interaction between multiple overlay networks; race
conditions; synchronization; traffic oscillations",
}
@Article{Goodrich:2008:PPM,
author = "Michael T. Goodrich",
title = "Probabilistic packet marking for large-scale {IP}
traceback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "15--24",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents an approach to IP traceback based
on the probabilistic packet marking paradigm. Our
approach, which we call randomize-and-link, uses large
checksum cords to `link' message fragments in a way
that is highly scalable, for the checksums serve both
as associative addresses and data integrity verifiers.
The main advantage of these checksum cords is that they
spread the addresses of possible router messages across
a spectrum that is too large for the attacker to easily
create messages that collide with legitimate
messages.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "associate addresses; checksum cords; denial of service
(DDOS); distributed; IP; probabilistic packet marking;
traceback",
}
@Article{Shavitt:2008:HEI,
author = "Yuval Shavitt and Tomer Tankel",
title = "Hyperbolic embedding of {Internet} graph for distance
estimation and overlay construction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "25--36",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Estimating distances in the Internet has been studied
in the recent years due to its ability to improve the
performance of many applications, e.g., in the
peer-to-peer realm. One scalable approach to estimate
distances between nodes is to embed the nodes in some
$d$ dimensional geometric space and to use the pair
distances in this space as the estimate for the real
distances. Several algorithms were suggested in the
past to do this in low dimensional Euclidean
spaces.\par
It was noted in recent years that the Internet
structure has a highly connected core and long
stretched tendrils, and that most of the routing paths
between nodes in the tendrils pass through the core.
Therefore, we suggest in this work, to embed the
Internet distance metric in a hyperbolic space where
routes are bent toward the center. We found that if the
curvature, that defines the extend of the bending, is
selected in the adequate range, the accuracy of
Internet distance embedding can be improved.\par
We demonstrate the strength of our hyperbolic embedding
with two applications: selecting the closest server and
building an application level multicast tree. For the
latter, we present a distributed algorithm for building
geometric multicast trees that achieve good trade-offs
between delay (stretch) and load (stress). We also
present a new efficient centralized embedding algorithm
that enables the accurate embedding of short distances,
something that have never been done before.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffield:2008:TSU,
author = "Nick Duffield and Matthias Grossglauser",
title = "Trajectory sampling with unreliable reporting",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "37--50",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We define and evaluate methods to perform robust
network monitoring using trajectory sampling in the
presence of report loss. The first challenge is to
reconstruct an unambiguous set of packet trajectories
from the reports on sampled packets received at a
collector. In this paper we extend the reporting
paradigm of trajectory sampling to enable the
elimination of ambiguous groups of reports, but without
introducing bias into any characterization of traffic
based on the surviving reports.\par
Even after the elimination, a proportion of
trajectories are incomplete due to report loss. A
second challenge is to adapt measurement based
applications (including network engineering, path
tracing, and passive performance measurement) to
incomplete trajectories. To achieve this, we propose a
method to join multiple incomplete trajectories for
inference, and analyze its performance. We also show
how applications can distinguish between packet and
report loss at the statistical level.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Bloom filters; network traffic measurement; packet
loss; packet sampling",
}
@Article{Kuhn:2008:AAG,
author = "Fabian Kuhn and Roger Wattenhofer and Aaron
Zollinger",
title = "An algorithmic approach to geographic routing in ad
hoc and sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "51--62",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The one type of routing in ad hoc and sensor networks
that currently appears to be most amenable to
algorithmic analysis is geographic routing. This paper
contains an introduction to the problem field of
geographic routing, presents a specific routing
algorithm based on a synthesis of the greedy forwarding
and face routing approaches, and provides an
algorithmic analysis of the presented algorithm from
both a worst-case and an average-case perspective.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithmic analysis; networks; routing; stretch;
wireless",
}
@Article{Spyropoulos:2008:ERIa,
author = "Thrasyvoulos Spyropoulos and Konstantinos Psounis and
Cauligi S. Raghavendra",
title = "Efficient routing in intermittently connected mobile
networks: the single-copy case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "63--76",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Intermittently connected mobile networks are wireless
networks where most of the time there does not exist a
complete path from the source to the destination. There
are many real networks that follow this model, for
example, wildlife tracking sensor networks, military
networks, vehicular ad hoc networks (VANETs), etc. In
this context, conventional routing schemes would fail,
because they try to establish complete end-to-end
paths, before any data is sent.\par
To deal with such networks researchers have suggested
to use flooding-based routing schemes. While
flooding-based schemes have a high probability of
delivery, they waste a lot of energy and suffer from
severe contention which can significantly degrade their
performance. With this in mind, we look into a number
of `single-copy' routing schemes that use only one copy
per message, and hence significantly reduce the
resource requirements of flooding-based algorithms. We
perform a detailed exploration of the single-copy
routing space in order to identify efficient
single-copy solutions that (i) can be employed when low
resource usage is critical, and (ii) can help improve
the design of general routing schemes that use multiple
copies. We also propose a theoretical framework that we
use to analyze the performance of all single-copy
schemes presented, and to derive upper and lower bounds
on the delay of any scheme.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad hoc networks; delay tolerant networks; intermittent
connectivity; routing",
}
@Article{Spyropoulos:2008:ERIb,
author = "Thrasyvoulos Spyropoulos and Konstantinos Psounis and
Cauligi S. Raghavendra",
title = "Efficient routing in intermittently connected mobile
networks: the multiple-copy case",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "77--90",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Intermittently connected mobile networks are wireless
networks where most of the time there does not exist a
complete path from the source to the destination. There
are many real networks that follow this model, for
example, wildlife tracking sensor networks, military
networks, vehicular ad hoc networks, etc. In this
context, conventional routing schemes fail, because
they try to establish complete end-to-end paths, before
any data is sent.\par
To deal with such networks researchers have suggested
to use flooding-based routing schemes. While
flooding-based schemes have a high probability of
delivery, they waste a lot of energy and suffer from
severe contention which can significantly degrade their
performance. Furthermore, proposed efforts to reduce
the overhead of flooding-based schemes have often been
plagued by large delays. With this in mind, we
introduce a new family routing schemes that `spray' a
few message copies into the network, and then route
each copy independently towards the destination. We
show that, if carefully designed, spray routing not
only performs significantly fewer transmissions per
message, but also has lower average delivery delays
than existing schemes; furthermore, it is highly
scalable and retains good performance under a large
range of scenarios.\par
Finally, we use our theoretical framework proposed in
our 2004 paper to analyze the performance of spray
routing. We also use this theory to show how to choose
the number of copies to be sprayed and how to optimally
distribute these copies to relays.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ad hoc networks; delay tolerant networks; intermittent
connectivity; routing",
}
@Article{Akella:2008:PBM,
author = "Aditya Akella and Bruce Maggs and Srinivasan Seshan
and Anees Shaikh",
title = "On the performance benefits of multihoming route
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "91--104",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See corrections \cite{Akella:2008:CPB}.",
abstract = "Multihoming is increasingly being employed by large
enterprises and data centers to extract good
performance and reliability from their ISP connections.
Multihomed end networks today can employ a variety of
route control products to optimize their Internet
access performance and reliability. However, little is
known about the tangible benefits that such products
can offer, the mechanisms they employ and their
trade-offs. This paper makes two important
contributions. First, we present a study of the
potential improvements in Internet round-trip times
(RTTs) and transfer speeds from employing multihoming
route control. Our analysis shows that multihoming to
three or more ISPs and cleverly scheduling traffic
across the ISPs can improve Internet RTTs and
throughputs by up to 25\% and 20\%, respectively.
However, a careful selection of ISPs is important to
realize the performance improvements. Second, focusing
on large enterprises, we propose and evaluate a
wide-range of route control mechanisms and evaluate
their design trade-offs. We implement the proposed
schemes on a Linux-based Web proxy and perform a
trace-based evaluation of their performance. We show
that both passive and active measurement-based
techniques are equally effective and could improve the
Web response times of enterprise networks by up to 25\%
on average, compared to using a single ISP. We also
outline several `best common practices' for the design
of route control products.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multihoming; performance; reliability",
}
@Article{Chen:2008:TTF,
author = "Shigang Chen and Meongchul Song and Sartaj Sahni",
title = "Two techniques for fast computation of constrained
shortest paths",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "105--115",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Computing constrained shortest paths is fundamental to
some important network functions such as QoS routing,
MPLS path selection, ATM circuit routing, and traffic
engineering. The problem is to find the cheapest path
that satisfies certain constraints. In particular,
finding the cheapest delay-constrained path is critical
for real-time data flows such as voice/video calls.
Because it is NP-complete, much research has been
designing heuristic algorithms that solve the $
\epsilon $-approximation of the problem with an
adjustable accuracy. A common approach is to discretize
(i.e., scale and round) the link delay or link cost,
which transforms the original problem to a simpler one
solvable in polynomial time. The efficiency of the
algorithms directly relates to the magnitude of the
errors introduced during discretization. In this paper,
we propose two techniques that reduce the
discretization errors, which allows faster algorithms
to be designed. Reducing the overhead of computing
constrained shortest paths is practically important for
the successful design of a high-throughput QoS router,
which is limited at both processing power and memory
space. Our simulations show that the new algorithms
reduce the execution time by an order of magnitude on
power-law topologies with 1000 nodes. The reduction in
memory space is similar.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; constrained shortest paths;
QoS routing",
}
@Article{Ramasubramanian:2008:BBR,
author = "Venugopalan Ramasubramanian and Daniel Moss{\'e}",
title = "{BRA}: a bidirectional routing abstraction for
asymmetric mobile ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "116--129",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless links are often asymmetric due to
heterogeneity in the transmission power of devices,
non-uniform environmental noise, and other signal
propagation phenomena. Unfortunately, routing protocols
for mobile ad hoc networks typically work well only in
bidirectional networks. This paper first presents a
simulation study quantifying the impact of asymmetric
links on network connectivity and routing performance.
It then presents a framework called BRA that provides a
bidirectional abstraction of the asymmetric network to
routing protocols. BRA works by maintaining multi-hop
reverse routes for unidirectional links and provides
three new abilities: improved connectivity by taking
advantage of the unidirectional links, reverse route
forwarding of control packets to enable off-the-shelf
routing protocols, and detection packet loss on
unidirectional links. Extensive simulations of AODV
layered on BRA show that packet delivery increases
substantially (two-fold in some instances) in
asymmetric networks compared to regular AODV, which
only routes on bidirectional links.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc network; asymmetry; routing; unidirectional",
}
@Article{Liu:2008:SFA,
author = "Xiliang Liu and Kaliappa Ravindran and Dmitri
Loguinov",
title = "A stochastic foundation of available bandwidth
estimation: multi-hop analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "130--143",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper analyzes the asymptotic behavior of
packet-train probing over a multi-hop network path $P$
carrying arbitrarily routed bursty cross-traffic flows.
We examine the statistical mean of the packet-train
output dispersions and its relationship to the input
dispersion. We call this relationship the response
curve of path $P$. We show that the real response curve
$Z$ is tightly lower-bounded by its multi-hop fluid
counterpart $F$, obtained when every cross-traffic flow
on $P$ is hypothetically replaced with a constant-rate
fluid flow of the same average intensity and routing
pattern. The real curve $Z$ asymptotically approaches
its fluid counterpart $F$ as probing packet size or
packet train length increases. Most existing
measurement techniques are based upon the single-hop
fluid curve $S$ associated with the bottleneck link in
$P$. We note that the curve $S$ coincides with $F$ in a
certain large-dispersion input range, but falls below
$F$ in the remaining small-dispersion input ranges. As
an implication of these findings, we show that bursty
cross-traffic in multi-hop paths causes negative bias
(asymptotic underestimation) to most existing
techniques. This bias can be mitigated by reducing the
deviation of $Z$ from $S$ using large packet size or
long packet-trains. However, the bias is not completely
removable for the techniques that use the portion of
$S$ that falls below $F$.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Patel:2008:IQP,
author = "Maulin Patel and R. Chandrasekaran and S. Venkatesan",
title = "Improved quasi-path restoration in mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "144--156",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Restoration of disrupted traffic is critical in
today's high-speed self-healing telecommunication
networks. A restoration scheme dynamically discovers
alternate paths bypassing the failed component. This
paper presents an (online) improved quasi-path
restoration (IQPR) scheme. IQPR is derived from the
two-commodity max-flow algorithm. The running time
complexity of IQPR is $ O(|V|^3) $. Therefore, IQPR is
computationally more efficient and more scalable than
path restoration (PR). IQPR is faster (in restoration
speed) and less complex than PR, and more economical
(in spare capacity requirement) than link restoration
(LR). Thus, it provides a good alternative to PR when
quick restoration of disrupted traffic is
desired.\par
The (offline) spare capacity planning problem deals
with the allocation of spare capacity to each link in
the network, such that the spare capacity requirement
is minimized, while guaranteeing the desired level of
restoration in the event of a link failure. The spare
capacity allocation problems for LR, original
quasi-path restoration (OQPR), IQPR, link-disjoint path
restoration (LDPR) and PR are formulated as integer
linear programming problems. Numerical results
illustrate that the restoration schemes studied can be
sorted from the least efficient to the most efficient
(in the spare capacity requirement) in the following
order: LR, OQPR, IQPR, LDPR and PR.\par
The experimental analysis shows that network topology
and demand patterns have a significant impact on the
spare capacity savings offered by one scheme over the
other. Merits and demerits of these schemes are also
discussed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "integer linear programming; link restoration; network
survivability; path restoration; quasi-path
restoration; self-healing networks; spare capacity
allocation",
}
@Article{Ramasubramanian:2008:DLF,
author = "Srinivasan Ramasubramanian and Amit Chandak",
title = "Dual-link failure resiliency through backup link
mutual exclusion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "157--169",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Networks employ link protection to achieve fast
recovery from link failures. While the first link
failure can be protected using link protection, there
are several alternatives for protecting against the
second failure. This paper formally classifies the
approaches to dual-link failure resiliency. One of the
strategies to recover from dual-link failures is to
employ link protection for the two failed links
independently, which requires that two links may not
use each other in their backup paths if they may fail
simultaneously. Such a requirement is referred to as
backup link mutual exclusion (BLME) constraint and the
problem of identifying a backup path for every link
that satisfies the above requirement is referred to as
the BLME problem. This paper develops the necessary
theory to establish the sufficient conditions for
existence of a solution to the BLME problem. Solution
methodologies for the BLME problem is developed using
two approaches by: (1) formulating the backup path
selection as an integer linear program; (2) developing
a polynomial time heuristic based on minimum cost path
routing. The ILP formulation and heuristic are applied
to six networks and their performance is compared with
approaches that assume precise knowledge of dual-link
failure. It is observed that a solution exists for all
of the six networks considered. The heuristic approach
is shown to obtain feasible solutions that are
resilient to most dual-link failures, although the
backup path lengths may be significantly higher than
optimal. In addition, the paper illustrates the
significance of the knowledge of failure location by
illustrating that network with higher connectivity may
require lesser capacity than one with a lower
connectivity to recover from dual-link failures.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "backup link mutual exclusion; dual-link failures; link
protection; optical networks",
}
@Article{Smiljanic:2008:RDG,
author = "Aleksandra Smiljanic",
title = "Rate and delay guarantees provided by {Clos} packet
switches with load balancing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "170--181",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The size of a single-hop cross-bar fabric is still
limited by the technology, and the fabrics available on
the market do not exceed the terabit capacity. A
multihop fabric such as Clos network provides the
higher capacity by using the smaller switching elements
(SE). When the traffic load is balanced over the
switches in a middle stage, all the traffic would get
through the fabric, as long as the switch outputs are
not overloaded. However, the delay that packets
experience through the Clos switch depends on the
granularity of flows that are balanced. We examine the
maximum fabric utilization under which a tolerable
delay is provided for various load balancing
algorithms, and derive the general formula for this
utilization in terms of the number of flows that are
balanced. We show that the algorithms which balance
flows with sufficiently coarse granularity provide both
high fabric utilization and delay guarantees to the
most sensitive applications. Since no admission control
should be performed within the switch, the fast
traffic-pattern changes can be accommodated in the
proposed scalable architecture.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay guarantees; Internet routers; non-blocking;
packet switches; performance analysis; scalability",
}
@Article{Iliadis:2008:PST,
author = "Ilias Iliadis and Cyriel Minkenberg",
title = "Performance of a speculative transmission scheme for
scheduling-latency reduction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "182--195",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Low latency is a critical requirement in some
switching applications, specifically in parallel
computer interconnection networks. The minimum latency
in switches with centralized scheduling comprises two
components, namely, the control-path latency and the
data-path latency, which in a practical high-capacity,
distributed switch implementation can be far greater
than the cell duration. We introduce a speculative
transmission scheme to significantly reduce the average
control-path latency by allowing cells to proceed
without waiting for a grant, under certain conditions.
It operates in conjunction with any centralized
matching algorithm to achieve a high maximum
utilization and incorporates a reliable delivery
mechanism to deal with failed speculations. An
analytical model is presented to investigate the
efficiency of the speculative transmission scheme
employed in a non-blocking $ N \times N R $
input-queued crossbar switch with $R$ receivers per
output. Using this model, performance measures such as
the mean delay and the rate of successful speculative
transmissions are derived. The results demonstrate that
the control-path latency can be almost entirely
eliminated for loads up to 50\%. Our simulations
confirm the analytical results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "arbiters; electrooptic switches; modeling; packet
switching; scheduling",
}
@Article{Cruz:2008:SCF,
author = "R. L. Cruz and Saleh Al-Harthi",
title = "A service-curve framework for packet scheduling with
switch configuration delays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "196--205",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In modern packet switches, technology limitations may
introduce switch configuration delays that are
nonnegligible compared with the time required to
transmit a single packet. In this paper, we propose a
methodology for scheduling of packets, in the context
of these technology limitations. If the total tolerable
delay through a packet switch is at least on the order
of the switch configuration delay, we show that a near
100\% utilization of the communication links is
possible, while providing strict quality of service
guarantees. The main idea is to increase the quantum
with which data is scheduled and switched to beyond
that of a single packet. This also decreases the rate
at which scheduling need to be made, and hence
decreases the implementation complexity. The quality of
service guarantees we consider are in terms of a
service curve. Specifically, we present a framework for
the provision of service curves while coping with
non-negligible switch configuration delays.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ballast packet; convoy; convoy buffer; MEMS; network
calculus; optical packet switching; quality of service
(QoS); scheduling",
}
@Article{Mneimneh:2008:MFI,
author = "Saad Mneimneh",
title = "Matching from the first iteration: an iterative
switching algorithm for an input queued switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "206--217",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An iterative switching algorithm for an input queued
switch consists of a number of iterations in every time
step, where each iteration computes a disjoint
matching. If input $i$ is matched to output $j$ in a
given iteration, a packet (if any) is forwarded from
$i$ to $j$ in the corresponding time step. Most of the
iterative switching algorithms use a Request Grant
Accept (RGA) arbitration type (e.g. iSLIP).
Unfortunately, due to this particular type of
arbitration, the matching computed in one iteration is
not necessarily maximal (more input and output ports
can still be matched). This is exactly why multiple
iterations are needed. However, multiple iterations
make the time step larger and reduce the speed of the
switch.\par
We present a new iterative switching algorithm (based
on the RGA arbitration) called $ \pi $-RGA with the
underlying assumption that the number of iterations is
possibly limited to one, hence reducing the time step
and allowing the switch to run at a higher speed. We
prove that $ \pi $-RGA achieves throughput and delay
guarantees with a speedup of 2 and one iteration under
a constant burst traffic model, which makes $ \pi $-RGA
as good as any maximal matching algorithm in the
theoretical sense. We also show by simulation that $
\pi $-RGA achieves relatively high throughput in
practice under uniform and non-uniform traffic patterns
with one iteration and no speedup.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "input queued switch; iterative switching algorithms;
matching algorithms; number of iterations; speedup",
}
@Article{Kirsch:2008:SSH,
author = "Adam Kirsch and Michael Mitzenmacher",
title = "Simple summaries for hashing with choices",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "218--231",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a multiple-choice hashing scheme, each item is
stored in one of $ \geq 2 $ possible hash table
buckets. The availability of these multiple choices
allows for a substantial reduction in the maximum load
of the buckets. However, a lookup may now require
examining each of the $d$ locations. For applications
where this cost is undesirable, Song et al. propose
keeping a summary that allows one to determine which of
the $d$ locations is appropriate for each item, where
the summary may allow false positives for items not in
hash table. We propose alternative, simple
constructions of such summaries that use less space for
both the summary and the underlying hash table.
Moreover, our constructions are easily analyzable and
tunable.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hash tables; router architecture; table lookup",
}
@Article{Wang:2008:MAL,
author = "Xin Wang and Henning Schulzrinne and Dilip Kandlur and
Dinesh Verma",
title = "Measurement and analysis of {LDAP} performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "232--243",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Lightweight Directory Access Protocol (LDAP) is
being used for an increasing number of distributed
directory applications. We describe a tool to analyze
the performance of LDAP directories, and study the
performance of a LDAP directory under a variety of
access patterns. In the experiments, we use a LDAP
schema proposed for the administration of Service Level
Specifications (SLSs) in a differentiated services
network. Individual modules in the server and client
code are instrumented to obtain a detailed profile of
their contributions to the overall system latency and
throughput. We first study the performance under our
default experiment setup. We then study the importance
of the factors in determining scalability, namely
front-end versus back-end processes, CPU capability,
and available memory. At high loads, the connection
management latency increases sharply to dominate the
response in most cases. The TCP Nagle algorithm is
found to introduce a very large additional latency, and
it appears beneficial to disable it in the LDAP server.
The CPU capability is found to be significant in
limiting the performance of the LDAP server, and for
larger directories, which cannot be kept in memory,
data transfer from the disk also plays a major role.
The scaling of server performance with the number of
directory entries is determined by the increase in
back-end search latency, and scaling with directory
entry size is limited by the front-end encoding of
search results, and, for out-of-memory directories, by
the disk access latency. We investigate different
mechanisms to improve the server performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "benchmark; diffServ; directory service; LDAP;
measurement; performance; policy",
}
@Article{Lau:2008:CDR,
author = "William Lau and Gustav Filip Rosenbaum and Sanjay
Jha",
title = "Comments on {`Dynamic routing of restorable
bandwidth-guaranteed tunnels using aggregated network
resource usage information'}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "1",
pages = "244--245",
month = feb,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 09:59:54 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Kodialam:2003:DRR}.",
abstract = "This paper identifies and corrects two flaws in the
paper `Dynamic routing of restorable
bandwidth-guaranteed tunnels using aggregate network
resource usage information', Kodialam and Lakshman,
IEEE/ACM Trans. Networking, 2003.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chiu:2008:MFD,
author = "Yuh-Ming Chiu and Do Young Eun",
title = "Minimizing file download time in stochastic
peer-to-peer networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "253--266",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The peer-to-peer (P2P) file-sharing applications are
becoming increasingly popular and account for more than
70\% of the Internet's bandwidth usage. Measurement
studies show that a typical download of a file can take
from minutes up to several hours depending on the level
of network congestion or the service capacity
fluctuation. In this paper, we consider two major
factors that have significant impact on average
download time, namely, the spatial heterogeneity of
service capacities in different source peers and the
temporal fluctuation in service capacity of a single
source peer. We point out that the common approach of
analyzing the average download time based on average
service capacity is fundamentally flawed. We rigorously
prove that both spatial heterogeneity and temporal
correlations in service capacity increase the average
download time in P2P networks and then analyze a
simple, distributed algorithm to effectively remove
these negative factors, thus minimizing the average
download time. We show through analysis and simulations
that it outperforms most of other algorithms currently
used in practice under various network
configurations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network performance; peer selection strategy;
peer-to-peer network",
}
@Article{Stutzbach:2008:CUO,
author = "Daniel Stutzbach and Reza Rejaie and Subhabrata Sen",
title = "Characterizing unstructured overlay topologies in
modern {P2P} file-sharing systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "267--280",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In recent years, peer-to-peer (P2P) file-sharing
systems have evolved to accommodate growing numbers of
participating peers. In particular, new features have
changed the properties of the unstructured overlay
topologies formed by these peers. Little is known about
the characteristics of these topologies and their
dynamics in modern file-sharing applications, despite
their importance. This paper presents a detailed
characterization of P2P overlay topologies and their
dynamics, focusing on the modern Gnutella network. We
present Cruiser, a fast and accurate P2P crawler, which
can capture a complete snapshot of the Gnutella network
of more than one million peers in just a few minutes,
and show how inaccuracy in snapshots can lead to
erroneous conclusions--such as a power-law degree
distribution. Leveraging recent overlay snapshots
captured with Cruiser, we characterize the
graph-related properties of individual overlay
snapshots and overlay dynamics across slices of
back-to-back snapshots. Our results reveal that while
the Gnutella network has dramatically grown and changed
in many ways, it still exhibits the clustering and
short path lengths of a small world network.
Furthermore, its overlay topology is highly resilient
to random peer departure and even systematic attacks.
More interestingly, overlay dynamics lead to an
`onion-like' biased connectivity among peers where each
peer is more likely connected to peers with higher
uptime. Therefore, long-lived peers form a stable core
that ensures reachability among peers despite overlay
dynamics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "file sharing; Gnutella; measurement; overlay topology;
peer-to-peer",
}
@Article{Kwong:2008:BHP,
author = "Kin-Wah Kwong and H. K. Tsang",
title = "Building heterogeneous peer-to-peer networks: protocol
and analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "281--292",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a simple protocol for
building heterogeneous unstructured peer-to-peer (P2P)
networks. The protocol consists of two parts--the
joining process and the rebuilding process. The basic
idea for the joining process is to use a random walk to
assist new incoming peers in selecting their suitable
neighbors in terms of capacity and connectivity to
achieve load-balancing. The rebuilding process
specifies how the nodes should react when they lose
links. In particular, we examine two representative
schemes, namely the probabilistic-rebuilding scheme and
the adaptive-rebuilding scheme. Furthermore, we provide
a detailed analysis to investigate our proposed
protocol under any heterogeneous P2P environment. We
prove that the topology structure of the P2P network
depends heavily on the node heterogeneity. The
analytical results are validated by the simulations.
Our framework provides a guideline to engineer and
optimize a P2P network in different respects under a
heterogeneous environment. The ultimate goal of this
paper is to stimulate further research to explore the
fundamental issues in heterogeneous P2P networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity; heterogeneity; random walk; topology;
unstructured P2P network",
}
@Article{Kencl:2008:ALS,
author = "Lukas Kencl and Jean-Yves {Le Boudec}",
title = "Adaptive load sharing for network processors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "293--306",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A novel scheme for processing packets in a router is
presented that provides load sharing among multiple
network processors distributed within the router. It is
complemented by a feedback control mechanism designed
to prevent processor overload. Incoming traffic is
scheduled to multiple processors based on a
deterministic mapping. The mapping formula is derived
from the robust hash routing (also known as the highest
random weight--HRW) scheme, introduced in K. W. Ross,
IEEE Network, 11(6), 1997, and D. G. Thaler et al.,
IEEE Trans. Networking, 6(1), 1998. No state
information on individual flow mapping has to be
stored, but for each packet, a mapping function is
computed over an identifier vector, a predefined set of
fields in the packet. An adaptive extension to the HRW
scheme is provided to cope with biased traffic
patterns. We prove that our adaptation possesses the
minimal disruption property with respect to the mapping
and exploit that property to minimize the probability
of flow reordering. Simulation results indicate that
the scheme achieves significant improvements in
processor utilization. A higher number of router
interfaces can thus be supported with the same amount
of processing power.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "computer networks; feedback control; load balancing;
load sharing; packet processing; router architecture",
}
@Article{Sommers:2008:GAI,
author = "Joel Sommers and Paul Barford and Nick Duffield and
Amos Ron",
title = "A geometric approach to improving active packet loss
measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "307--320",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Measurement and estimation of packet loss
characteristics are challenging due to the relatively
rare occurrence and typically short duration of packet
loss episodes. While active probe tools are commonly
used to measure packet loss on end-to-end paths, there
has been little analysis of the accuracy of these tools
or their impact on the network. The objective of our
study is to understand how to measure packet loss
episodes accurately with end-to-end probes. We begin by
testing the capability of standard Poisson-modulated
end-to-end measurements of loss in a controlled
laboratory environment using IP routers and commodity
end hosts. Our tests show that loss characteristics
reported from such Poisson-modulated probe tools can be
quite inaccurate over a range of traffic conditions.
Motivated by these observations, we introduce a new
algorithm for packet loss measurement that is designed
to overcome the deficiencies in standard Poisson-based
tools. Specifically, our method entails probe
experiments that follow a geometric distribution to (1)
enable an explicit trade-off between accuracy and
impact on the network, and (2) enable more accurate
measurements than standard Poisson probing at the same
rate. We evaluate the capabilities of our methodology
experimentally by developing and implementing a
prototype tool, called BADABING. The experiments
demonstrate the trade-offs between impact on the
network and measurement accuracy. We show that BADABING
reports loss characteristics far more accurately than
traditional loss measurement tools.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "active measurement; BADABING; network congestion;
network probes; packet loss",
}
@Article{Hou:2008:RAN,
author = "Y. Thomas Hou and Yi Shi and Hanif D. Sherali",
title = "Rate allocation and network lifetime problems for
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "321--334",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An important performance consideration for wireless
sensor networks is the amount of information collected
by all the nodes in the network over the course of
network lifetime. Since the objective of maximizing the
sum of rates of all the nodes in the network can lead
to a severe bias in rate allocation among the nodes, we
advocate the use of lexicographical max-min (LMM) rate
allocation. To calculate the LMM rate allocation
vector, we develop a polynomial-time algorithm by
exploiting the parametric analysis (PA) technique from
linear program (LP), which we call serial LP with
Parametric Analysis (SLP-PA). We show that the SLP-PA
can be also employed to address the LMM node lifetime
problem much more efficiently than a state-of-the-art
algorithm proposed in the literature. More important,
we show that there exists an elegant duality
relationship between the LMM rate allocation problem
and the LMM node lifetime problem. Therefore, it is
sufficient to solve only one of the two problems.
Important insights can be obtained by inferring duality
results for the other problem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "energy constraint; flow routing; lexicographic
max-min; linear programming; network capacity; node
lifetime; parametric analysis; rate allocation; sensor
networks; theory",
}
@Article{Sarshar:2008:LLW,
author = "Nima Sarshar and Behnam A. Rezaei and Vwani P.
Roychowdhury",
title = "Low latency wireless ad hoc networking: power and
bandwidth challenges and a solution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "335--346",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper is concerned with the scaling of the number
of relay nodes (i.e., hops) individual messages have to
transit through in a large-scale wireless ad hoc
network (WANET); we call this hop-count as network
latency (NL). A large network latency affects all
aspects of data communication in a WANET, including an
increase in delay, packet loss, and the power needed to
process and store messages in nodes lying on the relay
path. We consider network management and data routing
challenges in WANETs with scalable network latency,
e.g., when NL increases only polylogarithmically in the
network size. On the physical side, reducing network
latency imposes a significantly higher power and
bandwidth demand on nodes, and are captured in a set of
new bounds derived in this paper. On the protocol
front, designing distributed routing protocols that can
guarantee the delivery of data packets within a
scalable number of hops is a challenging task. To solve
this, we introduce multiresolution randomized hierarchy
(MRRH), a novel power and bandwidth efficient WANET
protocol with scalable network latency. MRRH uses a
randomized algorithm for building and maintaining a
random hierarchical network topology, which together
with the proposed routing algorithm, can guarantee
efficient delivery of data packets in the wireless
network. For a network of size $N$, MRRH can provide an
average latency of only $ O(\log^3 N)$. The power
consumption and bandwidth requirements of MRRH are
shown to be nearly optimal for the latency it provides.
Therefore, MRRH is a provably efficient candidate for
truly large-scale wireless ad hoc networking.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multi-resolution randomized hierarchy; network
latency; scalable routing; wireless ad hoc networks",
}
@Article{Zhang:2008:ACT,
author = "Honghai Zhang and Jennifer C. Hou",
title = "Asymptotic critical total power for $k$-connectivity
of wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "347--358",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An important issue in wireless ad hoc networks is to
reduce the transmission power subject to certain
connectivity requirement. In this paper, we study the
fundamental scaling law of the minimum total power
(termed as critical total power) required to ensure
$k$-connectivity in wireless networks. Contrary to
several previous results that assume all nodes use a
(minimum) common power, we allow nodes to choose
different levels of transmission power. We show that
under the assumption that wireless nodes form a
homogeneous Poisson point process with density $
\lambda $ in a unit square region $ [0, 1]^2$, the
critical total power required to maintain
$k$-connectivity is $ \Theta ((\Gamma (c / 2 + k) / (k
- 1)!) \lambda^{1 - c / 2})$ with probability
approaching one as $ \lambda $ goes to infinity, where
$c$ is the path loss exponent. If $k$ also goes to
infinity, the expected critical total power is of the
order of $ k^{c / 2} \lambda^{1 - c / 2}$. Compared
with the results that all nodes use a common critical
transmission power for maintaining $k$-connectivity, we
show that the critical total power can be reduced by an
order of $ (\log \lambda)^{c / 2}$ by allowing nodes to
optimally choose different levels of transmission
power. This result is not subject to any specific
power/topology control algorithm, but rather a
fundamental property of wireless networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "connectivity; critical power; power control; wireless
networks",
}
@Article{Gungor:2008:RTR,
author = "Vehbi Cagri Gungor and {\"O}zg{\"u}r B. Akan and Ian
F. Akyildiz",
title = "A real-time and reliable transport {(RT)$^2$} protocol
for wireless sensor and actor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "359--370",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless Sensor and Actor Networks (WSANs) are
characterized by the collective effort of heterogeneous
nodes called sensors and actors. Sensor nodes collect
information about the physical world, while actor nodes
take action decisions and perform appropriate actions
upon the environment. The collaborative operation of
sensors and actors brings significant advantages over
traditional sensing, including improved accuracy,
larger coverage area and timely actions upon the sensed
phenomena. However, to realize these potential gains,
there is a need for an efficient transport layer
protocol that can address the unique communication
challenges introduced by the coexistence of sensors and
actors. In this paper, a Real-Time and Reliable
Transport (RT)$^2$ protocol is presented for WSANs. The
objective of the (RT)$^2$ protocol is to reliably and
collaboratively transport event features from the
sensor field to the actor nodes with minimum energy
dissipation and to timely react to sensor information
with a right action. In this respect, the (RT)$^2$
protocol simultaneously addresses congestion control
and timely event transport reliability objectives in
WSANs. To the best of our knowledge, this is the first
research effort focusing on real-time and reliable
transport protocol for WSANs. Performance evaluations
via simulation experiments show that the (RT)$^2$
protocol achieves high performance in terms of reliable
event detection, communication latency and energy
consumption in WSANs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion detection and control; energy efficiency;
real-time and reliable transport protocol; wireless
sensor and actor networks",
}
@Article{Cerutti:2008:DMS,
author = "Isabella Cerutti and Andrea Fumagalli and Puja Gupta",
title = "Delay models of single-source single-relay cooperative
{ARQ} protocols in slotted radio networks with
{Poisson} frame arrivals",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "371--382",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In conventional (noncooperative) automatic repeat
request (ARQ) protocols for radio networks, the
corrupted data frames that cannot be correctly decoded
at the destination are retransmitted by the source. In
cooperative ARQ protocols, data frame retransmissions
may be performed by a neighboring node (the relay) that
has successfully overheard the source's frame
transmission. One advantage of the latter group of ARQ
protocols is the spatial diversity provided by the
relay.\par
The first delay model for cooperative ARQ protocols is
derived in this paper. The model is analytically
derived for a simple set of retransmission rules that
make use of both uncoded and coded cooperative
communications in slotted radio networks. The model
estimates the delay experienced by Poisson arriving
frames, whose retransmissions (when required) are
performed also by a single relay. Saturation
throughput, data frame latency, and buffer occupancy at
both the source and relay are quantified and compared
against two noncooperative ARQ protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cooperative ARQ; queueing model; radio network",
}
@Article{Boche:2008:SGC,
author = "Holger Boche and Martin Schubert",
title = "A superlinearly and globally convergent algorithm for
power control and resource allocation with general
interference functions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "383--395",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless networks, users are typically coupled by
interference. Hence, resource allocation can strongly
depend on receive strategies, such as beamforming, CDMA
receivers, etc. We study the problem of minimizing the
total transmission power while maintaining individual
quality-of-service (QoS) values for all users. This
problem can be solved by the fixed-point iteration
proposed by Yates (1995) as well as by a recently
proposed matrix-based iteration (Schubert and Boche,
2007). It was observed by numerical simulations that
the matrix-based iteration has interesting numerical
properties, and achieves the global optimum in only a
few steps. However, an analytical investigation of the
convergence behavior has been an open problem so far.
In this paper, we show that the matrix-based iteration
can be reformulated as a Newton-type iteration of a
convex function, which is not guaranteed to be
continuously differentiable. Such a behavior can be
caused by ambiguous representations of the interference
functions, depending on the choice of the receive
strategy. Nevertheless, superlinear convergence can be
shown by exploiting the special structure of the
problem. Namely, the function is convex, locally
Lipschitz continuous, and an invertible directional
derivative exists for all points of interest.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "interference suppression; multi-user channels; power
control; resource allocation",
}
@Article{Neely:2008:FOS,
author = "Michael J. Neely and Eytan Modiano and Chih-Ping Li",
title = "Fairness and optimal stochastic control for
heterogeneous networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "396--409",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider optimal control for general networks with
both wireless and wireline components and time varying
channels. A dynamic strategy is developed to support
all traffic whenever possible, and to make optimally
fair decisions about which data to serve when inputs
exceed network capacity. The strategy is decoupled into
separate algorithms for flow control, routing, and
resource allocation, and allows each user to make
decisions independent of the actions of others. The
combined strategy is shown to yield data rates that are
arbitrarily close to the optimal operating point
achieved when all network controllers are coordinated
and have perfect knowledge of future events. The cost
of approaching this fair operating point is an
end-to-end delay increase for data that is served by
the network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed computing; flow control; queueing
analysis; satellite networks; stochastic optimization;
wireless networks",
}
@Article{Nam:2008:MBA,
author = "Seung Yeob Nam and Sunggon Kim and Dan Keun Sung",
title = "Measurement-based admission control at edge routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "410--423",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is very important to allocate and manage resources
for multimedia traffic flows with real-time performance
requirements in order to guarantee quality of service
(QoS). In this paper, we develop a scalable
architecture and an algorithm for admission control of
real-time flows. Since individual management of each
traffic flow on each transit router can cause a
fundamental scalability problem in both data and
control planes, we consider that each flow is
classified at the ingress router and data traffic is
aggregated according to the class inside the core
network as in a DiffServ framework. In our approach,
admission decision is made for each flow at the edge
(ingress) routers, but it is scalable because per-flow
states are not maintained and the admission algorithm
is simple. In the proposed admission control scheme, an
admissible bandwidth, which is defined as the maximum
rate of a flow that can be accommodated additionally
while satisfying the delay performance requirements for
both existing and new flows, is calculated based on the
available bandwidth measured by edge routers. The
admissible bandwidth is a threshold for admission
control, and thus, it is very important to accurately
estimate the admissible bandwidth. The performance of
the proposed algorithm is evaluated by taking a set of
simulation experiments using bursty traffic flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "admissible bandwidth; admission control; available
bandwidth; measurement; quality of service (QoS)",
}
@Article{Ali:2008:SCA,
author = "Zafar Ali and Waseem Sheikh and Edwin K. P. Chong and
Arif Ghafoor",
title = "A scalable call admission control algorithm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "424--434",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a scalable algorithm for
connection admission control (CAC). The algorithm
applies to a Multiprotocol Label Switching (MPLS) ATM
switch with a FIFO buffer. The switch carries data from
statistically independent variable bit rate (VBR)
sources that asynchronously alternate between ON and
OFF states with exponentially distributed periods. The
sources may be heterogeneous both in terms of their
statistical characteristics (peak cell rate, sustained
cell rate, and burst size attributes) as well as their
Quality of Service (QoS) requirements.\par
The performance of the proposed CAC scheme is evaluated
using known performance bounds and simulation results.
For the purpose of comparison, we also present
scalability analyses for some of the previously
proposed CAC schemes. Our results show that the
proposed CAC scheme consistently performs better and
operates the link close to the highest possible
utilization level. Furthermore, the scheme scales well
with increasing amount of resources (link capacity and
buffer size) and accommodates intelligently the mix of
traffic offered by sources of diversed burstiness
characteristics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "call admission control (CAC); multiprotocol label
switching (MPLS); traffic management",
}
@Article{Shin:2008:DRT,
author = "Minsu Shin and Song Chong and Injong Rhee",
title = "Dual-resource {TCP\slash AQM} for
processing-constrained networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "435--449",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper examines congestion control issues for TCP
flows that require in-network processing on the fly in
network elements such as gateways, proxies, firewalls
and even routers. Applications of these flows are
increasingly abundant in the future as the Internet
evolves. Since these flows require use of CPUs in
network elements, both bandwidth and CPU resources can
be a bottleneck and thus congestion control must deal
with `congestion' on both of these resources. In this
paper, we show that conventional TCP/AQM schemes can
significantly lose throughput and suffer harmful
unfairness in this environment, particularly when CPU
cycles become more scarce (which is likely the trend
given the recent explosive growth rate of bandwidth).
As a solution to this problem, we establish a notion of
dual-resource proportional fairness and propose an AQM
scheme, called Dual-Resource Queue (DRQ), that can
closely approximate proportional fairness for TCP Reno
sources with in-network processing requirements. DRQ is
scalable because it does not maintain per-flow states
while minimizing communication among different resource
queues, and is also incrementally deployable because of
no required change in TCP stacks. The simulation study
shows that DRQ approximates proportional fairness
without much implementation cost and even an
incremental deployment of DRQ at the edge of the
Internet improves the fairness and throughput of these
TCP flows. Our work is at its early stage and might
lead to an interesting development in congestion
control research.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CPU capacity; efficiency; fairness; proportional;
TCP-AQM; transmission link capacity",
}
@Article{Fragouli:2008:EBU,
author = "Christina Fragouli and J{\"o}rg Widmer and Jean-Yves
{Le Boudec}",
title = "Efficient broadcasting using network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "450--463",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of broadcasting in an ad hoc
wireless network, where all nodes of the network are
sources that want to transmit information to all other
nodes. Our figure of merit is energy efficiency, a
critical design parameter for wireless networks since
it directly affects battery life and thus network
lifetime. We prove that applying ideas from network
coding allows to realize significant benefits in terms
of energy efficiency for the problem of broadcasting,
and propose very simple algorithms that allow to
realize these benefits in practice. In particular, our
theoretical analysis shows that network coding improves
performance by a constant factor in fixed networks. We
calculate this factor exactly for some canonical
configurations. We then show that in networks where the
topology dynamically changes, for example due to
mobility, and where operations are restricted to simple
distributed algorithms, network coding can offer
improvements of a factor of $ \log n $, where $n$ is
the number of nodes in the network. We use the insights
gained from the theoretical analysis to propose
low-complexity distributed algorithms for realistic
wireless ad hoc scenarios, discuss a number of
practical considerations, and evaluate our algorithms
through packet level simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network coding; wireless broadcast",
}
@Article{Syrotiuk:2008:RFE,
author = "Violet R. Syrotiuk and Charles J. Colbourn and Sruthi
Yellamraju",
title = "Rateless forward error correction for
topology-transparent scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "464--472",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Topology-transparent scheduling for mobile wireless ad
hoc networks has been treated as a theoretical
curiosity. This paper makes two contributions towards
its practical deployment: (1) We generalize the
combinatorial requirement on the schedules and show
that the solution is a cover-free family. As a result,
a much wider number and variety of constructions for
schedules exist to match network conditions. (2) In
simulation, we closely match the theoretical bound on
expected throughput. The bound was derived assuming
acknowledgments are available immediately. We use
rateless forward error correction (RFEC) as an
acknowledgment scheme with minimal computational
overhead. Since the wireless medium is inherently
unreliable, RFEC also offers some measure of automatic
adaptation to channel load. These contributions renew
interest in topology-transparent scheduling when delay
is a principal objective.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile ad hoc networks; rateless forward error
correction; topology-transparent scheduling",
}
@Article{Ramasubramanian:2008:MFC,
author = "Srinivasan Ramasubramanian and Arun K. Somani",
title = "{MICRON}: a framework for connection establishment in
optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "473--485",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic grooming in optical networks has gained
significance due to the prevailing sub-wavelength
requirement of end users. Optical networks get upgraded
to the latest technology slowly with time with only a
subset of nodes being upgraded to the latest
technology. The networks are thus comprised of nodes
employing heterogeneous switching architectures. In
this paper, we develop a framework called Methodology
for Information Collection and Routing in Optical
Networks (MICRON) for connection establishment in
optical grooming networks with heterogeneous switching
architectures. We illustrate with examples the
information that may be collected from the links, and
operators that may be used to obtain information along
a path. The information can be used to select a path
dynamically depending on the network status. We
complete the MICRON framework by providing a generic
channel assignment procedure that could be employed to
implement different channel assignment schemes. Various
routing and channel assignment algorithms can be
developed from the proposed framework. The framework
may be easily implemented with simple traffic
engineering extensions to the already existing routing
protocols in the wide-area networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity and connection management framework; channel
assignment; path selection; traffic grooming;
wavelength division multiplexing; wavelength routing",
}
@Article{Wang:2008:EDB,
author = "Dongmei Wang and Guangzhi Li",
title = "Efficient distributed bandwidth management for {MPLS}
fast reroute",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "486--495",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As service providers move more applications to their
IP/MPLS (Multiple Protocol Label Switching [1])
backbone networks, rapid restoration upon failure
becomes more and more crucial. Recently MPLS fast
reroute has attracted lots of attention as it was
designed to meet the needs of real-time applications,
such as voice over IP. MPLS fast reroute achieves rapid
restoration by computing and signaling backup label
switched path (LSP) tunnels in advance and re-directing
traffic as close to failure point as possible. To
provide a guarantee of bandwidth protection, extra
bandwidth has to be reserved on backup paths. Using
path merging technique as described in IETF RFC 4090
only, the network is able to share some bandwidth on
common links among backup paths of the same service
LSP, i.e., so-called intra-sharing. But no solution is
provided on how to share bandwidth among backup paths
of different service LSPs, i.e., so-called
inter-sharing. In this paper, we provide an efficient
distributed bandwidth management solution. This
solution allows bandwidth sharing among backup paths of
the same and different service LSPs, i.e., both
intra-sharing and inter-sharing, with a guarantee of
bandwidth protection for any single node/link failure.
We also propose an efficient algorithm for backup path
selection with the associated signaling extensions for
additional information distribution and collection. To
evaluate our schemes, we compare them via simulation
with the basic MPLS fast reroute proposal, IETF RFC
4090, on two networks. Our simulation results show that
using our bandwidth management scheme can significantly
reduce restoration overbuild from about 250\% to about
100\%, and our optimized backup path selection can
further reduce restoration overbuild to about 60\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MPLS fast reroute; protocol; restoration; simulation",
}
@Article{Akella:2008:CPB,
author = "Aditya Akella and Bruce Maggs and Srinivasan Seshan
and Anees Shaikh and Ramesh K. Sitaraman",
title = "Corrections to {`On the performance benefits of
multihoming route control'}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "2",
pages = "496--496",
month = apr,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Jun 19 10:00:46 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Akella:2008:PBM}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Katti:2008:XAP,
author = "Sachin Katti and Hariharan Rahul and Wenjun Hu and
Dina Katabi and Muriel M{\'e}dard and Jon Crowcroft",
title = "{XORs} in the air: practical wireless network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "497--510",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.923722",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes COPE, a new architecture for
wireless mesh networks. In addition to forwarding
packets, routers mix (i.e., code) packets from
different sources to increase the information content
of each transmission. We show that intelligently mixing
packets increases network throughput. Our design is
rooted in the theory of network coding. Prior work on
network coding is mainly theoretical and focuses on
multicast traffic. This paper aims to bridge theory
with practice; it addresses the common case of unicast
traffic, dynamic and potentially bursty flows, and
practical issues facing the integration of network
coding in the current network stack. We evaluate our
design on a 20-node wireless network, and discuss the
results of the first testbed deployment of wireless
network coding. The results show that using COPE at the
forwarding layer, without modifying routing and higher
layers, increases network throughput. The gains vary
from a few percent to several folds depending on the
traffic pattern, congestion level, and transport
protocol.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; design; network coding; performance;
theory; wireless networks",
}
@Article{Rhee:2008:ZMH,
author = "Injong Rhee and Ajit Warrier and Mahesh Aia and
Jeongki Min and Mihail L. Sichitiu",
title = "{Z-MAC}: a hybrid {MAC} for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "511--524",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900704",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents the design, implementation and
performance evaluation of a hybrid MAC protocol, called
Z-MAC, for wireless sensor networks that combines the
strengths of TDMA and CSMA while offsetting their
weaknesses. Like CSMA, ZMAC achieves high channel
utilization and low latency under low contention and
like TDMA, achieves high channel utilization under high
contention and reduces collision among two-hop
neighbors at a low cost. A distinctive feature of Z-MAC
is that its performance is robust to synchronization
errors, slot assignment failures, and time-varying
channel conditions; in the worst case, its performance
always falls back to that of CSMA. Z-MAC is implemented
in TinyOS.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CSMA; MAC; TDMA; wireless sensor networks",
}
@Article{Misra:2008:ITB,
author = "Archan Misra and Abhishek Roy and Sajal K. Das",
title = "Information-theory based optimal location management
schemes for integrated multi-system wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "525--538",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.901067",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a multi-system environment where a mobile node can
utilize multiple interfaces and simultaneously connect
to multiple providers, new opportunities exist for
efficient location management strategies spanning
heterogeneous cellular wireless networks. In this
paper, an integrated framework is developed for
location management in such a multi-system, fourth
generation (4G) wireless networks. This
information-theoretic framework allows each individual
sub-system to operate fairly independently, and does
not require the knowledge of individual sub-network
topologies. An efficient location management in such a
loosely coupled network is designed by having a mobile
node view its movement as a vector-valued sequence, and
then transmit this sequence in an entropy coded form to
the network. We demonstrate how an intelligent,
integrated paging strategy must consider the joint
residence probability distribution of a mobile node in
multiple sub-networks. We prove that the determination
of an optimal paging sequence is {\em NP\/}-complete,
and also propose an efficient greedy heuristic to
compute the paging sequence, both without and with
bounds on the paging delay. Three different location
tracking strategies are proposed and evaluated; they
differ in their degrees of centralized control and
provide tradeoff between the location update and paging
costs. Simulation experiments demonstrate that our
proposed schemes can result in more than 50\% savings
in both update and paging costs, in comparison with the
basic movement-based, multi-system location management
strategy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cellular networks; information theory; location
management; LZ compression; multi-system; paging",
}
@Article{Sarikaya:2008:SPT,
author = "Behcet Sarikaya and Xiao Zheng",
title = "{SIP} paging and tracking of wireless {LAN} hosts for
{VoIP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "539--548",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900408",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces a new paging technique to track
and wake up a mobile node (MN) attached to an access
point (AP) in a wireless LAN network after a session
initiation protocol (SIP) INVITE message is initiated
by a caller. A tracking agent (TA) keeps track of the
mobiles' handoffs between the APs. A paging agent (PA)
triggers the TA to page the mobile when a SIP INVITE is
received for one of its users. The context transfer
feature of our paging protocol allows the paging
messages to deliver the station context in order to
enable faster session reestablishment. The AP then does
onlink paging in a wireless link. SIP extensions are
needed to trigger the PA to start paging MNs to notify
their dormant status using an extended SIP REGISTER
method. Tracking protocol is analyzed to compare soft-
and hard-state approaches for state inconsistency
ratio, message rate, and the overall cost. The
simulation model we developed enables us to evaluate
the traffic introduced by the tracking protocol and the
cache (state) size. Paging protocol is analyzed for CPU
processing times and the transmission delays in the SIP
session setup with paging. Simulation of the paging
with context transfer is used to show the gains in
reauthentication.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "context transfer; fluid flow and random walk mobility
model; onlink paging; paging agent (PA); session
initiation protocol (SIP); tracking agent (TA)",
}
@Article{Lakshminarayanan:2008:SUC,
author = "Karthik Lakshminarayanan and Daniel Adkins and Adrian
Perrig and Ion Stoica",
title = "Securing user-controlled routing infrastructures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "549--561",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.903980",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Designing infrastructures that give untrusted third
parties (such as end-hosts) control over routing is a
promising research direction for achieving flexible and
efficient communication. However, serious concerns
remain over the deployment of such infrastructures,
particularly the new security vulnerabilities they
introduce. The flexible control plane of these
infrastructures can be exploited to launch many types
of powerful attacks with little effort. In this paper,
we make several contributions towards studying security
issues in forwarding infrastructures (FIs). We present
a general model for an FI, analyze potential security
vulnerabilities, and present techniques to address
these vulnerabilities. The main technique that we
introduce in this paper is the use of simple
lightweight cryptographic constraints on forwarding
entries. We show that it is possible to prevent a large
class of attacks on end-hosts and bound the flooding
attacks that can be launched on the infrastructure
nodes to a small constant value. Our mechanisms are
general and apply to a variety of earlier proposals
such as $i$ 3, DataRouter, and Network Pointers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "internet architecture; overlay networks; security",
}
@Article{Kim:2008:STD,
author = "Seong Soo Kim and A. L. Narasimha Reddy",
title = "Statistical techniques for detecting traffic anomalies
through packet header data",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "562--575",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.902685",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes a traffic anomaly detector,
operated in postmortem and in real-time, by passively
monitoring packet headers of traffic. The frequent
attacks on network infrastructure, using various forms
of denial of service attacks, have led to an increased
need for developing techniques for analyzing network
traffic. If efficient analysis tools were available, it
could become possible to detect the attacks, anomalies
and to take action to contain the attacks appropriately
before they have had time to propagate across the
network. In this paper, we suggest a technique for
traffic anomaly detection based on analyzing
correlation of destination IP addresses in outgoing
traffic at an egress router. This address correlation
data are transformed using discrete wavelet transform
for effective detection of anomalies through
statistical analysis. Results from trace-driven
evaluation suggest that proposed approach could provide
an effective means of detecting anomalies close to the
source. We also present a multidimensional indicator
using the correlation of port numbers and the number of
flows as a means of detecting anomalies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "egress filtering; network attack; packet header;
real-time network anomaly detection; statistical
analysis of network traffic; time series of address
correlation; wavelet-based transform",
}
@Article{Yu:2008:SDA,
author = "Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons
and Abraham D. Flaxman",
title = "{SybilGuard}: defending against sybil attacks via
social networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "576--589",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.923723",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer and other decentralized, distributed
systems are known to be particularly vulnerable to
sybil attacks. In a sybil attack, a malicious user
obtains multiple fake identities and pretends to be
multiple, distinct nodes in the system. By controlling
a large fraction of the nodes in the system, the
malicious user is able to 'out vote' the honest users
in collaborative tasks such as Byzantine failure
defenses. This paper presents SybilGuard, a novel
protocol for limiting the corruptive influences of
sybil attacks. Our protocol is based on the 'social
network' among user identities, where an edge between
two identities indicates a human-established trust
relationship. Malicious users can create many
identities but few trust relationships. Thus, there is
a disproportionately small 'cut' in the graph between
the sybil nodes and the honest nodes. SybilGuard
exploits this property to bound the number of
identities a malicious user can create. We show the
effectiveness of SybilGuard both analytically and
experimentally.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "social networks; sybil attack; sybil identity;
SybilGuard",
}
@Article{Li:2008:ASE,
author = "Yung-Ming Li and Yong Tan and Yong-Pin Zhou",
title = "Analysis of scale effects in peer-to-peer networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "590--602",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.901081",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study both positive and negative
scale effects on the operations of peer-to-peer (P2P)
file sharing networks and propose the optimal sizing
(number of peers) and grouping (number of directory
intermediary) decisions. Using analytical models and
simulation, we evaluate various performance metrics to
investigate the characteristics of a P2P network. Our
results show that increasing network scale has a
positive effect on the expected content availability
and transmission cost, but a negative effect on the
expected provision and search costs. We propose an
explicit expression for the overall utility of a
content sharing P2P community that incorporates
tradeoffs among all of the performance measures. This
utility function is maximized numerically to obtain the
optimal network size (or scale). We also investigate
the impact of various P2P network parameters on the
performance measures as well as optimal scaling
decisions. Furthermore, we extend the model to examine
the grouping decision in networks with symmetric
interconnection structures and compare the performance
between random- and location-based grouping policies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network operations and management; peer-to peer (P2P)
networks; performance evaluation; queueing analysis",
}
@Article{Massoulie:2008:CRS,
author = "Laurent Massouli{\'e} and Milan Vojnovic",
title = "Coupon replication systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "603--616",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.903992",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Motivated by the study of peer-to-peer file swarming
systems {\`a} la BitTorrent, we introduce a
probabilistic model of coupon replication systems.
These systems consist of users aiming to complete a
collection of distinct coupons. Users enter the system
with an initial coupon provided by a bootstrap server,
acquire other coupons from other users, and leave once
they complete their coupon collection. For open
systems, with exogenous user arrivals, we derive
stability condition for a layered scenario, where
encounters are between users holding the same number of
coupons. We also consider a system where encounters are
between users chosen uniformly at random from the whole
population. We show that sojourn time in both systems
is asymptotically optimal as the number of coupon types
becomes large. We also consider closed systems with no
exogenous user arrivals. In a special scenario where
users have only one missing coupon, we evaluate the
size of the population ultimately remaining in the
system, as the initial number of users $N$ goes to
infinity. We show that this size decreases
geometrically with the number of coupons $K$. In
particular, when the ratio $ K / \log (N)$ is above a
critical threshold, we prove that this number of
leftovers is of order $ \log (\log (N))$. These results
suggest that, under the assumption that the bootstrap
server is not a bottleneck, the performance does not
depend critically on either altruistic user behavior or
on load-balancing strategies such as rarest first.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "content distribution; file dissemination; file
swarming; peer-to-peer",
}
@Article{Bustamante:2008:DLS,
author = "Fabi{\'a}n E. Bustamante and Yi Qiao",
title = "Designing less-structured {P2P} systems for the
expected high churn",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "617--627",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.903986",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We address the problem of highly transient populations
in unstructured and loosely structured peer-to-peer
(P2P) systems. We propose a number of illustrative
query-related strategies and organizational protocols
that, by taking into consideration the expected session
times of peers (their lifespans), yield systems with
performance characteristics more resilient to the
natural instability of their environments. We first
demonstrate the benefits of lifespan-based
organizational protocols in terms of end-application
performance and in the context of dynamic and
heterogeneous Internet environments. We do this using a
number of currently adopted and proposed query-related
strategies, including methods for query distribution,
caching, and replication. We then show, through
trace-driven simulation and wide-area experimentation,
the performance advantages of lifespan-based,
query-related strategies when layered over currently
employed and lifespan-based organizational protocols.
While merely illustrative, the evaluated strategies and
protocols clearly demonstrate the advantages of
considering peers' session time in designing
widely-deployed P2P systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "lifespan; peer-to-peer (P2P); resilience; session
time",
}
@Article{Yu:2008:MBA,
author = "Xunqi Yu and James W. Modestino and Ragip Kurceren and
Yee Sin Chan",
title = "A model-based approach to evaluation of the efficacy
of {FEC} coding in combating network packet losses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "628--641",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900416",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose a model-based analytic approach for
evaluating the overall efficacy of FEC coding combined
with interleaving in combating packet losses in IP
networks. In particular, by modeling the network path
in terms of a single bottleneck node, described as a
G/M/1/K queue, we develop a recursive procedure for the
exact evaluation of the packet-loss statistics for
general arrival processes, based on the framework
originally introduced by Cidon et al., 1993. To include
the effects of interleaving, we incorporate a
discrete-time Markov chain (DTMC) into our analytic
framework. We study both single-session and
multiple-session scenarios, and provide a simple
algorithm for the more complicated multiple-session
scenario. We show that the unified approach provides an
integrated framework for exploring the tradeoffs
between the key coding parameters; specifically,
interleaving depths, channel coding rates and block
lengths. The approach facilitates the selection of
optimal coding strategies for different multimedia
applications with various user quality-of-service (QoS)
requirements and system constraints. We also provide an
information-theoretic bound on the performance
achievable with FEC coding in IP networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "autocorrelation function; FEC coding; interleaving;
packet-loss processes; residual packet-loss rates;
single-multiplexer model",
}
@Article{Zhang:2008:FAC,
author = "Weiyi Zhang and Guoliang Xue and Jian Tang and
Krishnaiyan Thulasiraman",
title = "Faster algorithms for construction of recovery trees
enhancing {QoP} and {QoS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "642--655",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900705",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "M{\'e}dard et al. proposed an elegant recovery scheme
(known as the MFBG scheme) using red/blue recovery
trees for multicast path protection against single link
or node failures. Xue et al. extended the MFBG scheme
and introduced the concept of quality of protection
(QoP) as a metric for multifailure recovery
capabilities of single failure recovery schemes. They
also presented polynomial time algorithms to construct
recovery trees with good QoP and quality of service
(QoS). In this paper, we present faster algorithms for
constructing recovery trees with good QoP and QoS
performance. For QoP enhancement, our $ O(n + m) $ time
algorithm has comparable performance with the
previously best $ O(n^2 (n + m)) $ time algorithm,
where and denote the number of nodes and the number of
links in the network, respectively. For cost reduction,
our $ O(n + m) $ time algorithms have comparable
performance with the previously best $ O(n^2 (n + m)) $
time algorithms. For bottleneck bandwidth maximization,
our $ O(m \log n) $ time algorithms improve the
previously best $ O(n m) $ time algorithms. Simulation
results show that our algorithms significantly
outperform previously known algorithms in terms of
running time, with comparable QoP or QoS performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bottleneck bandwidth; protection and restoration;
quality of protection (QoP); quality of service (QoS);
redundant trees",
}
@Article{Xue:2008:PTA,
author = "Guoliang Xue and Weiyi Zhang and Jian Tang and
Krishnaiyan Thulasiraman",
title = "Polynomial time approximation algorithms for
multi-constrained {QoS} routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "656--669",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900712",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the multi-constrained quality-of-service
(QoS) routing problem where one seeks to find a path
from a source to a destination in the presence of $ K
\geq 2 $ additive end-to-end QoS constraints. This
problem is NP-hard and is commonly modeled using a
graph with $n$ vertices and $m$ edges with $K$ additive
QoS parameters associated with each edge. For the case
of $ K = 2$, the problem has been well studied, with
several provably good polynomial time-approximation
algorithms reported in the literature, which enforce
one constraint while approximating the other. We first
focus on an optimization version of the problem where
we enforce the first constraint and approximate the
other $ K - 1$ constraints. We present an $ O(m n \log
\log n + m n / \epsilon)$ time $ (1 + \epsilon) (K -
1)$-approximation algorithm and an $ O(m n \log \log n
+ m(n / \epsilon)^{K - 1})$ time $ (1 +
\epsilon)$-approximation algorithm, for any $ \epsilon
> 0$. When $K$ is reduced to 2, both algorithms produce
an $ (1 + \epsilon)$-approximation with a time
complexity better than that of the best-known algorithm
designed for this special case. We then study the
decision version of the problem and present an $ O(m(n
/ \epsilon)^{K - 1})$ time algorithm which either finds
a feasible solution or confirms that there does not
exist a source-destination path whose first weight is
bounded by the first constraint and whose every other
weight is bounded by $ (1 - \epsilon)$ times the
corresponding constraint. If there exists an $H$-hop
source-destination path whose first weight is bounded
by the first constraint and whose every other weight is
bounded by $ (1 - \epsilon)$ times the corresponding
constraint, our algorithm finds a feasible path in $
O(m(H / \epsilon)^{K - 1})$ time. This algorithm
improves previous best-known algorithms with $ O((m + n
\log n) n / \epsilon)$ time for $ K = 2$ and $ O(m n(n
/ \epsilon)^{K - 1})$ time for $ K \geq 2$.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "efficient approximation algorithms; multiple additive
constraints; quality-of-service (QoS) routing",
}
@Article{Chu:2008:NAA,
author = "Jian Chu and Chin-Tau Lea",
title = "New architecture and algorithms for fast construction
of hose-model {VPNs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "670--679",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900711",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Hose-model virtual private networks (VPNs) provide
customers with more flexibility in specifying bandwidth
requirements than pipe-model VPNs. Many hose-model VPN
provisioning algorithms have been proposed, and they
focus on the bandwidth efficiency in the construction
of a single hose-model VPN. In practice, however, VPNs
come and go and the dynamics will affect the
performance of these VPN provisioning algorithms. If
the frequency of adding and deleting VPNs is high,
these algorithms will have a scalability problem. We
propose in this paper a new network architecture for
dynamic VPN construction. In the proposed architecture,
adding a new VPN is much simpler and faster, and all
that is required is to check if the edge routers have
enough bandwidth. There is no need to check the
bandwidth left on each internal link because the
architecture guarantees that as long as the edge
routers have enough capacities to accept the VPN, the
internal links will never experience overflow caused by
adding the new VPN. We present a linear programming
formulation for finding the optimal routing that
maximizes the amount of admissible VPN traffic in the
network. We then exploit the underlying network flow
structure and convert the linear programming problem
into a subgradient iterative search problem. The
resulting solution is significantly faster than the
linear programming approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hose model; MPLS VPN; network routing",
}
@Article{Wang:2008:IGA,
author = "Chen-Shu Wang and Ching-Ter Chang",
title = "Integrated genetic algorithm and goal programming for
network topology design problem with multiple
objectives and multiple criteria",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "680--690",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.903996",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network topology design (NTD) with multiple objectives
has been presented by many researchers. However, no
work in the literature has addressed this issue with
both multiple objectives and multiple criteria. In
order to suit real-world situations, this paper
presents a new idea integrating genetic algorithm and
goal programming to establish a model for solving the
NTD problem with multiple objectives and multiple
criteria taken into consideration. In addition, the
proposed model can also solve both construct and extend
network topology problems under shared risk link group
(SRLG) constraints. Finally, illustrative examples are
included to demonstrate the superiority and usefulness
of the proposed method.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "genetic algorithm (GA); goal programming; network
topology design (NTD)",
}
@Article{Cohen:2008:CCE,
author = "Reuven Cohen and Gabi Nakibly",
title = "On the computational complexity and effectiveness of
{$N$}-hub shortest-path routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "691--704",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900702",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the computational complexity
and effectiveness of a concept we term 'N-hub
Shortest-Path Routing' in IP networks. N-hub
Shortest-Path Routing allows the ingress node of a
routing domain to determine up to N intermediate nodes
('hubs') through which a packet will pass before
reaching its final destination. This facilitates better
utilization of the network resources, while allowing
the network routers to continue to employ the simple
and well-known shortest-path routing paradigm. Although
this concept has been proposed in the past, this paper
is the first to investigate it in depth. We apply N-hub
Shortest-Path Routing to the problem of minimizing the
maximum load in the network. We show that the resulting
routing problem is NP-complete and hard to approximate.
However, we propose efficient algorithms for solving it
both in the online and the offline contexts. Our
results show that N-hub Shortest-Path Routing can
increase network utilization significantly even for $ N
= 1 $. Hence, this routing paradigm should be
considered as a powerful mechanism for future datagram
routing in the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "load balancing; routing",
}
@Article{Iyer:2008:DPB,
author = "Sundar Iyer and Ramana Rao Kompella and Nick McKeown",
title = "Designing packet buffers for router linecards",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "705--717",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.923720",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet routers and Ethernet switches contain packet
buffers to hold packets during times of congestion.
Packet buffers are at the heart of every packet switch
and router, which have a combined annual market of tens
of billions of dollars, and equipment vendors spend
hundreds of millions of dollars on memory each year.
Designing packet buffers used to be easy: DRAM was
cheap, low power and widely used. But something
happened at 10 Gb/s when packets started to arrive and
depart faster than the access time of a DRAM.
Alternative memories were needed, but SRAM is too
expensive and power-hungry. A caching solution is
appealing, with a hierarchy of SRAM and DRAM, as used
by the computer industry. However, in switches and
routers it is not acceptable to have a 'miss-rate' as
it reduces throughput and breaks pipelines. In this
paper we describe how to build caches with 100\%
hit-rate under all conditions, by exploiting the fact
that switches and routers always store data in FIFO
queues. We describe a number of different ways to do
it, with and without pipelining, with static or dynamic
allocation of memory. In each case, we prove a lower
bound on how big the cache needs to be, and propose an
algorithm that meets, or comes close, to the lower
bound. These techniques are practical and have been
implemented in fast silicon; as a result, we expect the
techniques to fundamentally change the way switches and
routers use external memory.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cache; hit-rate; line-card; memory hierarchy; packet
buffer; router; switches",
}
@Article{He:2008:GSS,
author = "Si-Min He and Shu-Tao Sun and Hong-Tao Guan and Qiang
Zheng and You-Jian Zhao and Wen Gao",
title = "On guaranteed smooth switching for buffered crossbar
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "718--731",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.900402",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Scalability considerations drive the evolution of
switch design from output queueing to input queueing
and further to combined input and crosspoint queueing
(CICQ). However, CICQ switches with credit-based flow
control face new challenges of scalability and
predictability. In this paper, we propose a novel
approach of rate-based smoothed switching, and design a
CICQ switch called the smoothed buffered crossbar or
sBUX. First, the concept of smoothness is developed
from two complementary perspectives of covering and
spacing, which, commonly known as fairness and jitter,
are unified in the same model. Second, a smoothed
multiplexer sMUX is designed that allocates bandwidth
among competing flows sharing a link and guarantees
almost ideal smoothness for each flow. Third, the
buffered crossbar sBUX is designed that uses the
scheduler sMUX at each input and output, and a two-cell
buffer at each crosspoint. It is proved that sBUX
guarantees 100\% throughput for real-time services and
almost ideal smoothness for each flow. Fourth, an
on-line bandwidth regulator is designed that
periodically estimates bandwidth demand and generates
admissible allocations, which enables sBUX to support
best-effort services. Simulation shows almost 100\%
throughput and multi-microsecond average delay. In
particular, neither credit-based flow control nor
speedup is used, and arbitrary fabric-internal latency
is allowed between line cards and the switch core,
simplifying the switch implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "buffered crossbar; scheduling; smoothness; switches",
}
@Article{Jiang:2008:SNC,
author = "Xiaohong Jiang and Achille Pattavina and Susumu
Horiguchi",
title = "Strictly nonblocking $f$-cast photonic networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "3",
pages = "732--745",
month = jun,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918098",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:52:30 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The multicast capability and crosstalk issue need to
be deliberately considered in the design of future high
performance photonic switching networks. In this paper,
we focus on the photonic switching networks built on
the banyan-based architecture and directional coupler
technology. We explore the capability of these networks
to support general $f$-cast traffic, which covers the
unicast traffic ($ f = 1$) and multicast traffic ($ f =
N$) as special cases, and determine the conditions for
these networks to be $f$-cast strictly nonblocking
under various crosstalk constraints. In particular, we
propose an optimization framework to determine the
nonblocking condition of an $f$-cast photonic network
when a general crosstalk constraint is imposed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "banyan networks; crosstalk; f-cast; multicast;
photonic switches; strictly nonblocking",
}
@Article{Markopoulou:2008:CFO,
author = "Athina Markopoulou and Gianluca Iannaccone and
Supratik Bhattacharyya and Chen-Nee Chuah and Yashar
Ganjali and Christophe Diot",
title = "Characterization of failures in an operational {IP}
backbone network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "749--762",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.892851",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As the Internet evolves into a ubiquitous
communication infrastructure and supports increasingly
important services, its dependability in the presence
of various failures becomes critical. In this paper, we
analyze IS-IS routing updates from the Sprint IP
backbone network to characterize failures that affect
IP connectivity. Failures are first classified based on
patterns observed at the IP-layer; in some cases, it is
possible to further infer their probable causes, such
as maintenance activities, router-related and optical
layer problems. Key temporal and spatial
characteristics of each class are analyzed and, when
appropriate, parameterized using well-known
distributions. Our results indicate that 20\% of all
failures happen during a period of scheduled
maintenance activities. Of the unplanned failures,
almost 30\% are shared by multiple links and are most
likely due to router-related and optical
equipment-related problems, respectively, while 70\%
affect a single link at a time. Our classification of
failures reveals the nature and extent of failures in
the Sprint IP backbone. Furthermore, our
characterization of the different classes provides a
probabilistic failure model, which can be used to
generate realistic failure scenarios, as input to
various network design and traffic engineering
problems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "failure analysis; intermediate system to intermediate
system (IS-IS) protocol; link failures; modeling;
routing",
}
@Article{Kim:2008:WBA,
author = "Min Sik Kim and Taekhyun Kim and Yong-June Shin and
Simon S. Lam and Edward J. Powers",
title = "A wavelet-based approach to detect shared congestion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "763--776",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2002.1012369",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Per-flow congestion control helps endpoints fairly and
efficiently share network resources. Better utilization
of network resources can be achieved, however, if
congestion management algorithms can determine when two
different flows share a congested link. Such knowledge
can be used to implement cooperative congestion control
or improve the overlay topology of a P2P system.
Previous techniques to detect shared congestion either
assume a common source or destination node, drop-tail
queueing, or a single point of congestion. We propose
in this paper a novel technique, applicable to any pair
of paths on the Internet, without such limitations. Our
technique employs a signal processing method, wavelet
denoising, to separate queueing delay caused by network
congestion from various other delay variations. Our
wavelet-based technique is evaluated through both
simulations and Internet experiments. We show that,
when detecting shared congestion of paths with a common
endpoint, our technique provides faster convergence and
higher accuracy while using fewer packets than previous
techniques, and that it also accurately determines when
there is no shared congestion. Furthermore, we show
that our technique is robust and accurate for paths
without a common endpoint or synchronized clocks; more
specifically, it can tolerate a synchronization offset
of up to one second between two packet flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ye:2008:LSN,
author = "Tao Ye and Hema T. Kaur and Shivkumar Kalyanaraman and
Murat Yuksel",
title = "Large-scale network parameter configuration using an
on-line simulation framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "777--790",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/90.282603",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As the Internet infrastructure grows to support a
variety of services, its legacy protocols are being
overloaded with new functions such as traffic
engineering. Today, operators engineer such
capabilities through clever, but manual parameter
tuning. In this paper, we propose a back-end support
tool for large-scale parameter configuration that is
based on efficient parameter state space search
techniques and on-line simulation. The framework is
useful when the network protocol performance is
sensitive to its parameter settings, and its
performance can be reasonably modeled in simulation. In
particular, our system imports the network topology,
relevant protocol models and latest monitored traffic
patterns into a simulation that runs on-line in a
network operations center (NOC). Each simulation
evaluates the network performance for a particular
setting of protocol parameters. We propose an efficient
large-dimensional parameter state space search
technique called 'recursive random search (RRS).' Each
sample point chosen by RRS results in a single
simulation. An important feature of this framework is
its flexibility: it allows arbitrary choices in terms
of the simulation engines used (e.g., ns-2, SSFnet),
network protocols to be simulated (e.g., OSPF, BGP),
and in the specification of the optimization
objectives. We demonstrate the flexibility and
relevance of this framework in three scenarios: joint
tuning of the RED buffer management parameters at
multiple bottlenecks, traffic engineering using OSPF
link weight tuning, and outbound load-balancing of
traffic at peering/transit points using BGP LOCAL\_PREF
parameter.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "black-box optimization; network performance
management; network protocol configuration; on-line
simulation",
}
@Article{Aad:2008:IDS,
author = "Imad Aad and Jean-Pierre Hubaux and Edward W.
Knightly",
title = "Impact of denial of service attacks on ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "791--802",
month = aug,
year = "2008",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Significant progress has been made towards making ad
hoc networks secure and DoS resilient. However, little
attention has been focused on quantifying DoS
resilience: Do ad hoc networks have sufficiently
redundant paths and counter-DoS mechanisms to make DoS
attacks largely ineffective? Or are there attack and
system factors that can lead to devastating effects? In
this paper, we design and study DoS attacks in order to
assess the damage that difficult-to-detect attackers
can cause. The first attack we study, called the
JellyFish attack, is targeted against closed-loop flows
such as TCP; although protocol compliant, it has
devastating effects. The second is the Black Hole
attack, which has effects similar to the JellyFish, but
on open-loop flows. We quantify via simulations and
analytical modeling the scalability of DoS attacks as a
function of key performance parameters such as
mobility, system size, node density, and counter-DoS
strategy. One perhaps surprising result is that such
DoS attacks can increase the capacity of ad hoc
networks, as they starve multi-hop flows and only allow
one-hop communication, a capacity-maximizing, yet
clearly undesirable situation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; black hole attacks; DoS attacks",
}
@Article{Micciancio:2008:OCC,
author = "Daniele Micciancio and Saurabh Panjwani",
title = "Optimal communication complexity of generic multicast
key distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "803--813",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1137/0213053",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We prove a tight lower bound on the communication
complexity of secure multicast key distribution
protocols in which rekey messages are built using
symmetric-key encryption, pseudo-random generators, and
secret sharing schemes. Our lower bound shows that the
amortized cost of updating the group key for each group
membership change (as a function of the current group
size) is at least $ \log_2 (n) - o(1) $ basic rekey
messages. This lower bound matches, up to a subconstant
additive term, the upper bound due to Canetti et al.
[Proc. INFOCOM 1999], who showed that $ \log_2 (n) $
basic rekey messages (each time a user joins and/or
leaves the group) are sufficient. Our lower bound is,
thus, optimal up to a small subconstant additive term.
The result of this paper considerably strengthens
previous lower bounds by Canetti et al. [Proc.
Eurocrypt 1999] and Snoeyink et al. [Computer Networks,
47(3):2005], which allowed for neither the use of
pseudorandom generators and secret sharing schemes nor
the iterated (nested) application of the encryption
function. Our model (which allows for arbitrarily
nested combinations of encryption, pseudorandom
generators and secret sharing schemes) is much more
general and, in particular, encompasses essentially all
known multicast key distribution protocols of practical
interest.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "key distribution; lower bounds; multicast; nested
encryption; secret sharing; security",
}
@Article{Krishnamurthy:2008:ASS,
author = "Supriya Krishnamurthy and Sameh El-Ansary and Erik
Aurell and Seif Haridi",
title = "An analytical study of a structured overlay in the
presence of dynamic membership",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "814--825",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TKDE.2004.1318567",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present an analytical study of
dynamic membership (aka churn) in structured
peer-to-peer networks. We use a fluid model approach to
describe steady-state or transient phenomena and apply
it to the Chord system. For any rate of churn and
stabilization rates and any system size, we accurately
account for the functional form of the probability of
network disconnection as well as the fraction of failed
or incorrect successor and finger pointers. We show how
we can use these quantities to predict both the
performance and consistency of lookups under churn. All
theoretical predictions match simulation results. The
analysis includes both features that are generic to
structured overlays deploying a ring as well as
Chord-specific details and opens the door to a
systematic comparative analysis of, at least,
ring-based structured overlay systems under churn.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "peer-to-peer networks; performance analysis;
stochastic systems",
}
@Article{Bui:2008:ACC,
author = "Loc Bui and Atilla Eryilmaz and R. Srikant and Xinzhou
Wu",
title = "Asynchronous congestion control in multi-hop wireless
networks with maximal matching-based scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "826--839",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2004.842226",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a multi-hop wireless network shared by
many users. For an interference model that constrains a
node to either transmit to or receive from only one
other node at a time, and not to do both, we propose an
architecture for fair resource allocation that consists
of a distributed scheduling algorithm operating in
conjunction with an asynchronous congestion control
algorithm. We show that the proposed joint congestion
control and scheduling algorithm supports at least
one-third of the throughput supportable by any other
algorithm, including centralized algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; distributed scheduling; fair
resource allocation; totally asynchronous algorithm;
wireless networks",
}
@Article{Gandhi:2008:MBL,
author = "Rajiv Gandhi and Arunesh Mishra and Srinivasan
Parthasarathy",
title = "Minimizing broadcast latency and redundancy in ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "840--851",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1023/A:1019045801829",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network wide broadcasting is a fundamental operation
in ad hoc networks. In broadcasting, a source node
sends a message to all the other nodes in the network.
In this paper, we consider the problem of
collision-free broadcasting in ad hoc networks. Our
objective is to minimize the latency and the number of
transmissions in the broadcast. We show that minimum
latency broadcasting is NP-complete for ad hoc
networks. We also present a simple distributed
collision-free broadcasting algorithm for broadcasting
a message. For networks with bounded node transmission
ranges, our algorithm simultaneously guarantees that
the latency and the number of transmissions are within
$ O(1) $ times their respective optimal values. Our
algorithm and analysis extend to the case when multiple
messages are broadcast from multiple sources.
Experimental studies indicate that our algorithms
perform much better in practice than the analytical
guarantees provided for the worst case.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networking; approximation algorithms; broadcast
algorithms; wireless scheduling",
}
@Article{Lenders:2008:DBA,
author = "Vincent Lenders and Martin May and Bernhard Plattner",
title = "Density-based anycast: a robust routing strategy for
wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "852--863",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TMC.2003.1233531",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Existing anycast routing protocols solely route
packets to the closest group member. In this paper, we
introduce density-based anycast routing, a new anycast
routing paradigm particularly suitable for wireless ad
hoc networks. Instead of routing packets merely on
proximity information to the closest member,
density-based anycast routing considers the number of
available anycast group members for its routing
decision. We present a unified model based on potential
fields that allows for instantiation of pure
proximity-based, pure density-based, as well as hybrid
routing strategies. We implement anycast using this
model and simulate the performance of the different
approaches for mobile as well as static ad hoc networks
with frequent link failures. Our results show that the
best performance lies in a tradeoff between proximity
and density. In this combined routing strategy, the
packet delivery ratio is considerably higher and the
path length remains almost as low than with traditional
shortest-path anycast routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anycast; mobile communication; protocols; routing;
wireless communication",
}
@Article{Garetto:2008:MPF,
author = "Michele Garetto and Theodoros Salonidis and Edward W.
Knightly",
title = "Modeling per-flow throughput and capturing starvation
in {CSMA} multi-hop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "864--877",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/90.893874",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multi-hop wireless networks employing random access
protocols have been shown to incur large discrepancies
in the throughputs achieved by the flows sharing the
network. Indeed, flow throughputs can span orders of
magnitude from near starvation to many times greater
than the mean. In this paper, we address the
foundations of this disparity. We show that the
fundamental cause is not merely differences in the
number of contending neighbors, but a generic
coordination problem of CSMA-based random access in a
multi-hop environment. We develop a new analytical
model that incorporates this lack of coordination,
identifies dominating and starving flows and accurately
predicts per-flow throughput in a large-scale network.
We then propose metrics that quantify throughput
imbalances due to the MAC protocol operation. Our model
and metrics provide a deeper understanding of the
behavior of CSMA protocols in arbitrary topologies and
can aid the design of effective protocol solutions to
the starvation problem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CSMA; CSMA/CA; fairness; wireless networks",
}
@Article{Tickoo:2008:MQC,
author = "Omesh Tickoo and Biplab Sikdar",
title = "Modeling queueing and channel access delay in
unsaturated {IEEE 802.11} random access {MAC} based
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "878--891",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1023/A:1019109301754",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present an analytic model for
evaluating the queueing delays and channel access times
at nodes in wireless networks using the IEEE 802.11
Distributed Coordination Function (DCF) as the MAC
protocol. The model can account for arbitrary arrival
patterns, packet size distributions and number of
nodes. Our model gives closed form expressions for
obtaining the delay and queue length characteristics
and models each node as a discrete time G/G/1fs queue.
The service time distribution for the queues is derived
by accounting for a number of factors including the
channel access delay due to the shared medium, impact
of packet collisions, the resulting backoffs as well as
the packet size distribution. The model is also
extended for ongoing proposals under consideration for
802.11e wherein a number of packets may be transmitted
in a burst once the channel is accessed. Our analytical
results are verified through extensive simulations. The
results of our model can also be used for providing
probabilistic quality of service guarantees and
determining the number of nodes that can be
accommodated while satisfying a given delay
constraint.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay modeling; IEEE 802.11; queueing analysis",
}
@Article{Hua:2008:ORD,
author = "Cunqing Hua and Tak-Shing Peter Yum",
title = "Optimal routing and data aggregation for maximizing
lifetime of wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "892--903",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/QSHINE.2005.4",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An optimal routing and data aggregation scheme for
wireless sensor networks is proposed in this paper. The
objective is to maximize the network lifetime by
jointly optimizing data aggregation and routing. We
adopt a model to integrate data aggregation with the
underlying routing scheme and present a smoothing
approximation function for the optimization problem.
The necessary and sufficient conditions for achieving
the optimality are derived and a distributed gradient
algorithm is designed accordingly. We show that the
proposed scheme can significantly reduce the data
traffic and improve the network lifetime. The
distributed algorithm can converge to the optimal value
efficiently under all network configurations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data aggregation; maximum lifetime routing; network
lifetime; smoothing methods; wireless sensor networks",
}
@Article{Tang:2008:OLC,
author = "Xueyan Tang and Jianliang Xu",
title = "Optimizing lifetime for continuous data aggregation
with precision guarantees in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "904--917",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2002.808417",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper exploits the tradeoff between data quality
and energy consumption to extend the lifetime of
wireless sensor networks. To obtain an aggregate form
of sensor data with precision guarantees, the precision
constraint is partitioned and allocated to individual
sensor nodes in a coordinated fashion. Our key idea is
to differentiate the precisions of data collected from
different sensor nodes to balance their energy
consumption. Three factors affecting the lifetime of
sensor nodes are identified: (1) the changing pattern
of sensor readings; (2) the residual energy of sensor
nodes; and (3) the communication cost between the
sensor nodes and the base station. We analyze the
optimal precision allocation in terms of network
lifetime and propose an adaptive scheme that
dynamically adjusts the precision constraints at the
sensor nodes. The adaptive scheme also takes into
consideration the topological relations among sensor
nodes and the effect of in-network aggregation.
Experimental results using real data traces show that
the proposed scheme significantly improves network
lifetime compared to existing methods.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data accuracy; data aggregation; energy efficiency;
network lifetime; sensor network",
}
@Article{Langar:2008:CAM,
author = "Rami Langar and Nizar Bouabdallah and Raouf Boutaba",
title = "A comprehensive analysis of mobility management in
{MPLS}-based wireless access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "918--931",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2002.1012370",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Efficient mobility management is one of the major
challenges for next-generation mobile systems. Indeed,
a mobile node (MN) within an access network may cause
excessive signaling traffic and service disruption due
to frequent handoffs. The two latter effects need to be
minimized to support quality-of-service (QoS)
requirements of emerging multimedia applications. In
this perspective, we propose in this paper a new
mobility management scheme designed to track host
mobility efficiently so as to minimize both handoff
latency and signaling cost. Building on and enhancing
Mobile IP and taking advantage of MPLS traffic
engineering capability, three mechanisms (FH-, FC- and
MFC-Micro Mobile MPLS) are introduced. In order to
assess the efficiency of our proposals, all protocols
are compared. To achieve this, we develop analytical
models to evaluate the signaling cost and link usage
for both two-dimensional and one-dimensional mobility
models. Additional mathematical models are also
provided to derive handoff latency and packet loss
rate. Numerical and simulation results show that the
proposed mechanisms can significantly reduce the
registration updates cost and provide low handoff
latency and packet loss rate under various scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fast handoff; forwarding chain; micro-mobility; mobile
IP; mobility models; multiprotocol label switching
(MPLS); performance analysis; residing area",
}
@Article{Xing:2008:SLS,
author = "Yiping Xing and R. Chandramouli",
title = "Stochastic learning solution for distributed discrete
power control game in wireless data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "932--944",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1023/A:1019108223561",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed power control is an important issue in
wireless networks. Recently, noncooperative game theory
has been applied to investigate interesting solutions
to this problem. The majority of these studies assumes
that the transmitter power level can take values in a
continuous domain. However, recent trends such as the
GSM standard and Qualcomm's proposal to the IS-95
standard use a finite number of discretized power
levels. This motivates the need to investigate
solutions for distributed discrete power control which
is the primary objective of this paper. We first note
that, by simply discretizing, the previously proposed
continuous power adaptation techniques will not
suffice. This is because a simple discretization does
not guarantee convergence and uniqueness. We propose
two probabilistic power adaptation algorithms and
analyze their theoretical properties along with the
numerical behavior. The distributed discrete power
control problem is formulated as an $N$-person, nonzero
sum game. In this game, each user evaluates a power
strategy by computing a utility value. This evaluation
is performed using a stochastic iterative procedures.
We approximate the discrete power control iterations by
an equivalent ordinary differential equation to prove
that the proposed stochastic learning power control
algorithm converges to a stable Nash equilibrium.
Conditions when more than one stable Nash equilibrium
or even only mixed equilibrium may exist are also
studied. Experimental results are presented for several
cases and compared with the continuous power level
adaptation solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "game theory; power control; stochastic learning;
wireless networking",
}
@Article{Eun:2008:ATT,
author = "Do Young Eun and Xinbing Wang",
title = "Achieving 100\% throughput in {TCP\slash AQM} under
aggressive packet marking with small buffer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "945--956",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1016/S1389-1286(03)00304-9",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a TCP/AQM system with large link capacity
({\em NC\/}) shared by many flows. The traditional
rule-of-thumb suggests that the buffer size be chosen
in proportion to the number of flows ($N$) for full
link utilization, while recent research outcomes show
that $ O(\sqrt N)$ buffer sizing is sufficient for high
utilization and $ O (1)$ buffer sizing makes the system
stable at the cost of reduced link utilization. In this
paper, we consider a system where the Active Queue
Management (AQM) is scaled as $ O(N^{\alpha })$ with a
buffer of size $ O(N^\beta)$.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "router buffer sizing; small buffer; stochastic
modeling; transmission control protocol",
}
@Article{Spitler:2008:IEE,
author = "Stephen L. Spitler and Daniel C. Lee",
title = "Integration of explicit effective-bandwidth-based
{QoS} routing with best-effort routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "957--969",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/90.251894",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a methodology for protecting
low-priority best-effort (BE) traffic in a network
domain that provides both virtual-circuit routing with
bandwidth reservation for QoS traffic and datagram
routing for BE traffic. When a QoS virtual circuit is
established, bandwidths amounting to the traffic's
effective bandwidths are reserved along the links. We
formulate a new QoS-virtual-circuit admission control
and routing policy that sustains a minimum level of BE
performance. In response to a QoS connection request,
the policy executes a two-stage optimization. The first
stage seeks a minimum-net-effective-bandwidth
reservation path that satisfies a BE protecting
constraint; the second stage is a tie-breaking rule,
selecting from tied paths one that least disturbs BE
traffic. Our novel policy implementation efficiently
executes both optimization stages simultaneously by a
single run of Dijkstra's algorithm. According to
simulation results, within a practical operating range,
the consideration that our proposed policy gives to the
BE service does not increase the blocking probability
of a QoS connection request.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "best-effort (BE) traffic; constraint-based routing;
dynamic routing; effective bandwidth; quality of
service (QoS)",
}
@Article{Brzezinski:2008:ATR,
author = "Andrew Brzezinski and Eytan Modiano",
title = "Achieving 100\% throughput in reconfigurable optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "970--983",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/90.811449",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the maximum throughput properties of
dynamically reconfigurable optical network
architectures having wavelength and port constraints.
Using stability as the throughput performance metric,
we outline the single-hop and multi-hop stability
regions of the network. Our analysis of the stability
regions is a generalization of the BvN decomposition
technique that has been so effective at expressing any
stabilizable rate matrix for input-queued switches as a
convex combination of service configurations. We
consider generalized decompositions for physical
topologies with wavelength and port constraints. For
the case of a single wavelength per optical fiber, we
link the decomposition problem to a corresponding
Routing and Wavelength Assignment (RWA) problem. We
characterize the stability region of the reconfigurable
network, employing both single-hop and multi-hop
routing, in terms of the RWA problem applied to the
same physical topology. We derive expressions for two
geometric properties of the stability region: maximum
stabilizable uniform arrival rate and maximum scaled
doubly substochastic region. These geometric properties
provide a measure of the performance gap between a
network having a single wavelength per optical fiber
and its wavelength-unconstrained version. They also
provide a measure of the performance gap between
algorithms employing single-hop versus multi-hop
electronic routing in coordination with WDM
reconfiguration.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Birkhoff-von Neumann (BvN); input-queueing;
IP-over-WDM; matrix decomposition; performance
evaluation; queueing network; wavelength division
multiplexing (WDM); WDM reconfiguration",
}
@Article{Benson:2008:CAO,
author = "Karyn Benson and Benjamin Birnbaum and Esteban
Molina-Estolano and Ran Libeskind-Hadas",
title = "Competitive analysis of online traffic grooming in
{WDM} rings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "4",
pages = "984--997",
month = aug,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/BROADNETS.2004.37",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 22 08:53:12 MDT 2008",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses the problem of traffic grooming
in wavelength-division multiplexing (WDM) rings where
connection requests arrive online. Each request
specifies a pair of nodes that wish to communicate and
also the desired bandwidth of this connection. If the
request is to be satisfied, it must be allocated to one
or more wavelengths with sufficient remaining capacity.
We consider three distinct profit models specifying the
profit associated with satisfying a connection request.
We give results on offline and online algorithms for
each of the three profit models. We use the paradigm of
competitive analysis to theoretically analyze the
quality of our online algorithms. Finally, experimental
results are given to provide insight into the
performance of these algorithms in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "competitive analysis; online algorithms; optical
networks; wavelength-division multiplexing (WDM)
rings",
}
@Article{Jin:2008:FDC,
author = "Nan Jin and Scott Jordan",
title = "On the feasibility of dynamic congestion-based pricing
in differentiated services networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1001--1014",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.908163",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Differentiated services can ensure that traffic on
some codepoints receives higher quality of service
(QoS) than traffic on other codepoints, but without
additional mechanisms it cannot target any particular
QoS. Congestion-based pricing has been suggested as a
method to target QoS in other network architectures.
Here, we investigate whether congestion-based pricing
can be used to control aggregate traffic into each
codepoint by motivating users to choose the codepoints
appropriate for each application. We first ask what
information needs to be exchanged; we assert that both
price and QoS information must be available for users
to make decisions. We then ask how effective
congestion-based pricing in diffServ can be; we find
that it is feasible only for networks with sufficiently
high bandwidth to guarantee that QoS can be quickly
measured.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "differentiated services; pricing; quality of service
(QoS)",
}
@Article{Allalouf:2008:CDA,
author = "Miriam Allalouf and Yuval Shavitt",
title = "Centralized and distributed algorithms for routing and
weighted max-min fair bandwidth allocation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1015--1024",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.905605",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Given a set of demands between pairs of nodes, we
examine the traffic engineering problem of flow routing
and fair bandwidth allocation where flows can be split
to multiple paths (e.g., MPLS tunnels). This paper
presents an algorithm for finding an optimal and global
per-commodity max-min fair rate vector in a polynomial
number of steps. In addition, we present a fast and
novel distributed algorithm where each source router
can find the routing and the fair rate allocation for
its commodities while keeping the locally optimal
max-min fair allocation criteria. The distributed
algorithm is a fully polynomial epsilon-approximation
(FPTAS) algorithm and is based on a primal-dual
alternation technique. We implemented these algorithms
to demonstrate its correctness, efficiency, and
accuracy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth allocation; distributed algorithm; maximum
concurrent multi-commodity flow problem; maxmin
fairness criteria",
}
@Article{Menache:2008:CME,
author = "Ishai Menache and Nahum Shimkin",
title = "Capacity management and equilibrium for proportional
{QoS}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1025--1037",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911430",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Differentiated services architectures are scalable
solutions for providing class-based Quality of Service
(QoS) over packet switched networks. While qualitative
attributes of the offered service classes are often
well defined, the actual differentiation between
classes is left as an open issue. We address here the
proportional QoS model, which aims at maintaining
pre-defined ratios between the service class delays (or
related congestion measures). In particular, we
consider capacity assignment among service classes as
the means for attaining this design
objective.\par
Starting with a detailed analysis for the single hop
model, we first obtain the required capacity assignment
for fixed flow rates. We then analyze the scheme under
a reactive scenario, in which self-optimizing users may
choose their service class in response to capacity
modifications. We demonstrate the existence and
uniqueness of the equilibrium in which the required
ratios are maintained, and address the efficient
computation of the optimal capacities. We further
provide dynamic schemes for capacity adjustment, and
consider the incorporation of pricing and congestion
control to enforce absolute performance bounds on top
of the proportional ones. Finally, we extend our basic
results to networks with general topology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity allocation; differentiated services; Nash
equilibrium; proportional QoS; selfish routing",
}
@Article{Guven:2008:UFM,
author = "Tuna G{\"u}ven and Richard J. La and Mark A. Shayman
and Bobby Bhattacharjee",
title = "A unified framework for multipath routing for unicast
and multicast traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1038--1051",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909686",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of load balancing the traffic
from a set of unicast and multicast sessions. The
problem is formulated as an optimization problem.
However, we assume that the gradient of the network
cost function is not available and needs to be
estimated. Multiple paths are provided between a source
and a destination using application-layer overlay. We
propose a novel algorithm that is based on what is
known as simultaneous perturbation stochastic
approximation and utilizes only noisy measurements
collected and reported to the sources, using an overlay
architecture. We consider three network models that
reflect different sets of assumptions regarding
multicast capabilities of the network. Using an
analytical model we first prove the almost sure
convergence of the algorithm to a corresponding optimal
solution under each network model considered in this
paper with decreasing step sizes. Then, we establish
the weak convergence (or convergence in distribution)
with a fixed step size. In addition, we investigate the
benefits acquired from implementing additional
multicast capabilities by studying the relative
performance of our algorithm under the three network
models.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mathematical programming/optimization; multipath
routing; network measurements",
}
@Article{Tao:2008:RTM,
author = "Shu Tao and John Apostolopoulos and Roch Gu{\'e}rin",
title = "Real-time monitoring of video quality in {IP}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1052--1065",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.910617",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates the problem of assessing the
quality of video transmitted over IP networks. Our goal
is to develop a methodology that is both reasonably
accurate and simple enough to support the large-scale
deployments that the increasing use of video over IP
are likely to demand. For that purpose, we focus on
developing an approach that is capable of mapping
network statistics, e.g., packet losses, available from
simple measurements, to the quality of video sequences
reconstructed by receivers. A first step in that
direction is a loss-distortion model that accounts for
the impact of network losses on video quality, as a
function of application-specific parameters such as
video codec, loss recovery technique, coded bit rate,
packetization, video characteristics, etc. The model,
although accurate, is poorly suited to large-scale,
on-line monitoring, because of its dependency on
parameters that are difficult to estimate in real-time.
As a result, we introduce a 'relative quality' metric
(rPSNR) that bypasses this problem by measuring video
quality against a quality benchmark that the network is
expected to provide. The approach offers a lightweight
video quality monitoring solution that is suitable for
large-scale deployments. We assess its feasibility and
accuracy through extensive simulations and
experiments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IP networks; PSNR; relative video quality; video
quality",
}
@Article{Vojnovic:2008:RWA,
author = "Milan Vojnovic and Ayalvadi J. Ganesh",
title = "On the race of worms, alerts, and patches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1066--1079",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909678",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We provide an analytical framework for evaluating the
performance of automatic patching systems. We use it to
quantify the speed of patch or alert dissemination
required for worm containment. Motivated by scalability
and trust issues, we consider a hierarchical system
where network hosts are organized into subnets, each
containing a patch server (termed superhost). Patches
are disseminated to superhosts through an overlay
connecting them and, after verification, to end hosts
within subnets. The analytical framework accommodates a
variety of overlays through the novel abstraction of a
minimum broadcast curve. It also accommodates filtering
of scans across subnets. The framework provides
quantitative estimates that can guide system designers
in dimensioning automatic patching systems. The results
are obtained mathematically and verified by
simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "automatic updates; epidemic; minimum broadcast curve;
patching; software updates; virus; worm",
}
@Article{Ramaiyan:2008:FPA,
author = "Venkatesh Ramaiyan and Anurag Kumar and Eitan Altman",
title = "Fixed point analysis of single cell {IEEE 802.11e}
{WLANs}: uniqueness and multistability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1080--1093",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911429",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the vector fixed point equations arising
out of the analysis of the saturation throughput of a
single cell IEEE 802.11e (EDCA) wireless local area
network with nodes that have different backoff
parameters, including different Arbitration InterFrame
Space (AIFS) values. We consider balanced and
unbalanced solutions of the fixed point equations
arising in homogeneous (i.e., one with the same backoff
parameters) and nonhomogeneous networks. By a balanced
fixed point, we mean one where all coordinates are
equal. We are concerned, in particular, with (1)
whether the fixed point is balanced within a class, and
(2) whether the fixed point is unique. Our simulations
show that when multiple unbalanced fixed points exist
in a homogeneous system then the time behavior of the
system demonstrates severe short term unfairness (or
multistability). We provide a condition for the fixed
point solution to be balanced, and also a condition for
uniqueness. We then extend our general fixed point
analysis to capture AIFS based differentiation and the
concept of virtual collision when there are multiple
queues per station; again a condition for uniqueness is
established. For the case of multiple queues per node,
we find that a model with as many nodes as there are
queues, with one queue per node, provides an excellent
approximation. Implications for the use of the fixed
point formulation for performance analysis are also
discussed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "performance of wireless LANs; saturation throughput
analysis of EDCA; short term unfairness",
}
@Article{Inaltekin:2008:ANE,
author = "Hazer Inaltekin and Stephen B. Wicker",
title = "The analysis of {Nash} equilibria of the one-shot
random-access game for wireless networks and the
behavior of selfish nodes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1094--1107",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909668",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We address the fundamental question of whether or not
there exist stable operating points in a network in
which selfish nodes share a common channel, and if they
exist, how the nodes behave at these stable operating
points. We begin with a wireless communication network
in which $n$ nodes (agents), which might have different
utility functions, contend for access on a common,
wireless communication channel. We characterize this
distributed multiple-access problem in terms of a
one-shot random-access game, and then analyze the
behavior of the nodes using the tools of game theory.
We give necessary and sufficient conditions on nodes
for the complete characterization of the Nash
equilibria of this game for all $ n \geq 2$. We show
that all centrally controlled optimal solutions are a
subset of this game theoretic solution, and almost all
(w.r.t. Lebesgue measure) transmission probability
assignments chosen by a central authority are supported
by the game theoretic solution. We analyze the behavior
of the network throughput at Nash equilibria as a
function of the costs of the transmitters incurred by
failed transmissions. Finally, we conclude the paper
with the asymptotic analysis of the system as the
number of transmitters goes to infinity. We show that
the asymptotic distribution of the packet arrivals
converges in distribution to a Poisson random variable,
and the channel throughput converges to $ - (c / (1 +
c))$ in $ (c / (1 + c))$ with $ c > 0$ being the cost
of failed transmissions. We also give the best possible
bounds on the rates of convergence of the packet
arrival distribution and the channel throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "channel throughput; game theory; Nash equilibrium;
random access control; slotted ALOHA",
}
@Article{Wang:2008:ELW,
author = "Wei Wang and Vikram Srinivasan and Kee-Chaing Chua",
title = "Extending the lifetime of wireless sensor networks
through mobile relays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1108--1120",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.906663",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the benefits of a heterogeneous
architecture for wireless sensor networks (WSNs)
composed of a few resource rich mobile relay nodes and
a large number of simple static nodes. The mobile
relays have more energy than the static sensors. They
can dynamically move around the network and help
relieve sensors that are heavily burdened by high
network traffic, thus extending the latter's lifetime.
We first study the performance of a large dense network
with one mobile relay and show that network lifetime
improves over that of a purely static network by up to
a factor of four. Also, the mobile relay needs to stay
only within a two-hop radius of the sink. We then
construct a joint mobility and routing algorithm which
can yield a network lifetime close to the upper bound.
The advantage of this algorithm is that it only
requires a limited number of nodes in the network to be
aware of the location of the mobile relay. Our
simulation results show that one mobile relay can at
least double the network lifetime in a randomly
deployed WSN. By comparing the mobile relay approach
with various static energy-provisioning methods, we
demonstrate the importance of node mobility for
resource provisioning in a WSN.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile relay; network lifetime; sensor networks",
}
@Article{Sharma:2008:CHS,
author = "Gaurav Sharma and Ravi R. Mazumdar",
title = "A case for hybrid sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1121--1132",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.910666",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the use of limited
infrastructure, in the form of wires, for improving the
energy efficiency of a wireless sensor network. We call
such a sensor network--a wireless sensor network with a
limited infrastructural support--a hybrid sensor
network. The wires act as short cuts to bring down the
average hop count of the network, resulting in a
reduced energy dissipation per node. Our results
indicate that adding a few wires to a wireless sensor
network can not only reduce the average energy
expenditure per sensor node, but also the nonuniformity
in the energy expenditure across the sensor nodes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "energy dissipation; graph theory; lifetime; routing;
sensor networks; small world networks; system design;
trade-offs",
}
@Article{Subramanian:2008:BSN,
author = "Sundar Subramanian and Sanjay Shakkottai and Ari
Arapostathis",
title = "Broadcasting in sensor networks: the role of local
information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1133--1146",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.912034",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Flooding based querying and broadcasting schemes have
low hop-delays of $ \Theta (1 / R(n)) $ to reach any
node that is a unit distance away, where $ R(n) $ is
the transmission range of any sensor node. However, in
sensor networks with large radio ranges, flooding based
broadcasting schemes cause many redundant transmissions
leading to a broadcast storm problem. In this paper, we
study the role of geographic information and state
information (i.e., memory of previous messages or
transmissions) in reducing the redundant transmissions
in the network.\par
We consider three broadcasting schemes with varying
levels of local information where nodes have: (i) no
geographic or state information, (ii) coarse geographic
information about the origin of the broadcast, and
(iii) no geographic information, but remember
previously received messages. For each of these network
models, we demonstrate localized forwarding algorithms
for broadcast (based on geography or state information)
that achieve significant reductions in the transmission
overheads while maintaining hop-delays comparable to
flooding based schemes. We also consider the related
problem of broadcasting to a set of 'spatially uniform'
points in the network (lattice points) in the regime
where all nodes have only a local sense of direction
and demonstrate an efficient 'sparse broadcast' scheme
based on a branching random walk that has a low number
of packet transmissions. Thus, our results show that
even with very little local information, it is possible
to make broadcast schemes significantly more
efficient.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadcasting; stochastic models; wireless networks",
}
@Article{Bader:2008:POI,
author = "Ahmed Bader and Eylem Ekici",
title = "Performance optimization of interference-limited
multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1147--1160",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.905596",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The performance of a multihop wireless network is
typically affected by the interference caused by
transmissions in the same network. In a statistical
fading environment, the interference effects become
harder to predict. Information sources in a multihop
wireless network can improve throughput and delay
performance of data streams by implementing
interference-aware packet injection mechanisms. Forcing
packets to wait at the head of queues and coordinating
packet injections among different sources enable
effective control of copacket interference. In this
paper, throughput and delay performance in
interference-limited multihop networks is analyzed.
Using nonlinear probabilistic hopping models, waiting
times which jointly optimize throughput and delay
performances are derived. Optimal coordinated injection
strategies are also investigated as functions of the
number of information sources and their separations.
The resulting analysis demonstrates the interaction of
performance constraints and achievable capacity in a
wireless multihop network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hopping dynamics; interference-limited; multihop
networks; performance optimization; Rayleigh fading",
}
@Article{Karnik:2008:TOC,
author = "Aditya Karnik and Aravind Iyer and Catherine
Rosenberg",
title = "Throughput-optimal configuration of fixed wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1161--1174",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909717",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we address the following two questions
concerning the capacity and configuration of fixed
wireless networks: (i) given a set of wireless nodes
with arbitrary but fixed locations, and a set of data
flows, what is the max-min achievable throughput? and
(ii) how should the network be configured to achieve
the optimum? We consider these questions from a
networking standpoint assuming point-to-point links,
and employ a rigorous physical layer model to model
conflict relationships between them. Since we seek
capacity results, we assume that the network is
operated using an appropriate schedule of conflict-free
link activations. We develop and investigate a novel
optimization framework to determine the optimal
throughput and configuration, i.e., flow routes, link
activation schedules and physical layer parameters.
Determining the optimal throughput is a computationally
hard problem, in general. However, using a smart
enumerative technique we obtain numerical results for
several different scenarios of interest. We obtain
several important insights into the structure of the
optimal routes, schedules and physical layer
parameters. Besides determining the achievable
throughput, we believe that our optimization-based
framework can also be used as a tool, for configuring
scheduled wireless networks, such as those based on
IEEE 802.16.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity; fixed wireless networks; IEEE 802.16; mesh
networks; optimal scheduling and routing",
}
@Article{Zhang:2008:AMT,
author = "Honghai Zhang and Jennifer C. Hou",
title = "On the asymptotic minimum transporting energy and its
implication on the wireless network capacity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1175--1187",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.910631",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper we study the asymptotic minimum energy
(which is defined as the minimum transporting energy)
required to transport (via multiple hops) data packets
from a source to a destination. Under the assumptions
that nodes are distributed according to a Poisson point
process with node density $n$ in a unit-area square and
the distance between a source and a destination is of
constant order, we prove that the minimum transporting
energy is $ \Theta (n^{(1 - \alpha) / 2})$ with
probability approaching one as the node density goes to
infinity, where $ \alpha $ is the path loss
exponent.\par
We demonstrate use of the derived results to obtain the
bounds of the capacity of wireless networks that
operate in UWB. In particular, we prove the transport
capacity of UWB-operated networks is $ \Theta
(n^{(\alpha - 1) / 2})$ with high probability. We also
carry out simulations to validate the derived results
and to estimate the constant factor associated with the
bounds on the minimum energy. The simulation results
indicate that the constant associated with the minimum
energy converges to the source-destination distance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic analysis; capacity; ultra wide band (UWB);
wireless network",
}
@Article{Neely:2008:OOD,
author = "Michael J. Neely",
title = "Order optimal delay for opportunistic scheduling in
multi-user wireless uplinks and downlinks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1188--1199",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909682",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a one-hop wireless network with
independent time varying ON/OFF channels and $n$ users,
such as a multi-user uplink or downlink. We first show
that general classes of scheduling algorithms that do
not consider queue backlog must incur average delay
that grows at least linearly with $N$. We then
construct a dynamic queue-length aware algorithm that
maximizes throughput and achieves an average delay that
is independent of $N$. This is the first order-optimal
delay result for opportunistic scheduling with
asymmetric links. The delay bounds are achieved via a
technique of queue grouping together with Lyapunov
drift and statistical multiplexing concepts.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "queueing analysis; stability; stochastic control",
}
@Article{Elayoubi:2008:PEA,
author = "Salah-Eddine Elayoubi and Beno{\^\i}t Fouresti{\'e}",
title = "Performance evaluation of admission control and
adaptive modulation in {OFDMA WiMax} systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1200--1211",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911426",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the performance of multi-cell
OFDMA WiMAX systems, in both downlink and uplink. We
calculate analytically the number of collisions when
the number of users in each cell is known. We then
calculate the QoS indicators (e.g., blocking rates,
download time and bit error rates) taking into account
the physical layer conditions (modulation, propagation
and MIMO), the MAC layer techniques (HARQ and radio
resource management algorithms) and the traffic
characteristics, in a cross-layer approach. We finally
evaluate the impact of using adaptive modulation and
coding on the overall performance of the system. This
analysis allows us to calculate the Erlang capacity of
a WiMAX system. Our numerical applications then show
how to choose the best admission control and modulation
schemes that extend the Erlang capacity region.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "inter-cell interference; OFDMA; performance
evaluation; WiMAX",
}
@Article{Jaramillo:2008:PFN,
author = "Juan Jos{\'e} Jaramillo and Fabio Milan and R.
Srikant",
title = "Padded frames: a novel algorithm for stable scheduling
in load-balanced switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1212--1225",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.906654",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The load-balanced Birkhoff-von Neumann switching
architecture consists of two stages: a load balancer
and a deterministic input-queued crossbar switch. The
advantages of this architecture are its simplicity and
scalability, while its main drawback is the possible
out-of-sequence reception of packets belonging to the
same flow. Several solutions have been proposed to
overcome this problem; among the most promising are the
Uniform Frame Spreading (UFS) and the Full Ordered
Frames First (FOFF) algorithms. In this paper, we
present a new algorithm called Padded Frames (PF),
which eliminates the packet reordering problem,
achieves 100\% throughput, and improves the delay
performance of previously known algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Birkhoff-von Neumann switch; load-balanced switch;
scheduling",
}
@Article{Chen:2008:HTG,
author = "Bensong Chen and George N. Rouskas and Rudra Dutta",
title = "On hierarchical traffic grooming in {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "5",
pages = "1226--1238",
month = oct,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.906655",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:01 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The traffic grooming problem is of high practical
importance in emerging wide-area wavelength division
multiplexing (WDM) optical networks, yet it is
intractable for any but trivial network topologies. In
this work, we present an effective and efficient
hierarchical traffic grooming framework for WDM
networks of general topology, with the objective of
minimizing the total number of electronic ports. At the
first level of hierarchy, we decompose the network into
clusters and designate one node in each cluster as the
hub for grooming traffic. At the second level, the hubs
form another cluster for grooming intercluster traffic.
We view each (first-or second-level) cluster as a
virtual star, and we present an efficient near-optimal
algorithm for determining the logical topology of
lightpaths to carry the traffic within each cluster.
Routing and wavelength assignment is then performed
directly on the underlying physical topology. We
demonstrate the effectiveness of our approach by
applying it to two networks of realistic size, a
32-node, 53-link topology and a 47-node, 96-link
network. Comparisons to lower bounds indicate that
hierarchical grooming is efficient in its use of the
network resources of interest, namely, electronic ports
and wavelengths. In addition to scaling to large
network sizes, our hierarchical approach also
facilitates the control and management of multigranular
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hierarchical traffic grooming; k-center; optical
networks; wavelength division multiplexing (WDM)",
}
@Article{Xu:2008:ITB,
author = "Kuai Xu and Zhi-Li Zhang and Supratik Bhattacharyya",
title = "{Internet} traffic behavior profiling for network
security monitoring",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1241--1252",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911438",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent spates of cyber-attacks and frequent emergence
of applications affecting Internet traffic dynamics
have made it imperative to develop effective techniques
that can extract, and make sense of, significant
communication patterns from Internet traffic data for
use in network operations and security management. In
this paper, we present a general methodology for
building comprehensive behavior profiles of Internet
backbone traffic in terms of communication patterns of
end-hosts and services. Relying on data mining and
entropy-based techniques, the methodology consists of
significant cluster extraction, automatic behavior
classification and structural modeling for in-depth
interpretive analyses. We validate the methodology
using data sets from the core of the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anomaly behavior; monitoring; traffic profiling",
}
@Article{Sung:2008:LSI,
author = "Minho Sung and Jun Xu and Jun Li and Li Li",
title = "Large-scale {IP} traceback in high-speed {Internet}:
practical techniques and information-theoretic
foundation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1253--1266",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911427",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Tracing attack packets to their sources, known as IP
traceback, is an important step to counter distributed
denial-of-service (DDoS) attacks. In this paper, we
propose a novel packet logging based (i.e., hash-based)
traceback scheme that requires an order of magnitude
smaller processing and storage cost than the hash-based
scheme proposed by Snoeren et al. [1], thereby being
able to scalable to much higher link speed (e.g.,
OC-768). The base-line idea of our approach is to
sample and log a small percentage (e.g., 3.3\%) of
packets. The challenge of this low sampling rate is
that much more sophisticated techniques need to be used
for traceback. Our solution is to construct the attack
tree using the correlation between the attack packets
sampled by neighboring routers. The scheme using naive
independent random sampling does not perform well due
to the low correlation between the packets sampled by
neighboring routers. We invent a sampling scheme that
improves this correlation and the overall efficiency
significantly. Another major contribution of this work
is that we introduce a novel information-theoretic
framework for our traceback scheme to answer important
questions on system parameter tuning and the
fundamental tradeoff between the resource used for
traceback and the traceback accuracy. Simulation
results based on real-world network topologies (e.g.,
Skitter) match very well with results from the
information-theoretic analysis. The simulation results
also demonstrate that our traceback scheme can achieve
high accuracy, and scale very well to a large number of
attackers (e.g., 5000+).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed denial-of-service attacks; information
theory; IP traceback; network security",
}
@Article{Yang:2008:TLN,
author = "Xiaowei Yang and David Wetherall and Thomas Anderson",
title = "{TVA}: a {DoS}-limiting network architecture",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1267--1280",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.914506",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We motivate the capability approach to network
denial-of-service (DoS) attacks, and evaluate the
Traffic Validation Architecture (TVA) architecture
which builds on capabilities. With our approach, rather
than send packets to any destination at any time,
senders must first obtain 'permission to send' from the
receiver, which provides the permission in the form of
capabilities to those senders whose traffic it agrees
to accept. The senders then include these capabilities
in packets. This enables verification points
distributed around the network to check that traffic
has been authorized by the receiver and the path in
between, and hence to cleanly discard unauthorized
traffic. To evaluate this approach, and to understand
the detailed operation of capabilities, we developed a
network architecture called TVA. TVA addresses a wide
range of possible attacks against communication between
pairs of hosts, including spoofed packet floods,
network and host bottlenecks, and router state
exhaustion. We use simulations to show the
effectiveness of TVA at limiting DoS floods, and an
implementation on Click router to evaluate the
computational costs of TVA. We also discuss how to
incrementally deploy TVA into practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xia:2008:OMB,
author = "Yong Xia and Lakshminarayanan Subramanian and Ion
Stoica and Shivkumar Kalyanaraman",
title = "One more bit is enough",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1281--1294",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.912037",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Achieving efficient and fair bandwidth allocation
while minimizing packet loss and bottleneck queue in
high bandwidth-delay product networks has long been a
daunting challenge. Existing end-to-end congestion
control (e.g., TCP) and traditional congestion
notification schemes (e.g., TCP+AQM/ECN) have
significant limitations in achieving this goal. While
the XCP protocol addresses this challenge, it requires
multiple bits to encode the congestion-related
information exchanged between routers and end-hosts.
Unfortunately, there is no space in the IP header for
these bits, and solving this problem involves a
non-trivial and time-consuming standardization
process.\par
In this paper, we design and implement a simple,
low-complexity protocol, called Variable-structure
congestion Control Protocol (VCP), that leverages only
the existing two ECN bits for network congestion
feedback, and yet achieves comparable performance to
XCP, i.e., high utilization, negligible packet loss
rate, low persistent queue length, and reasonable
fairness. On the downside, VCP converges significantly
slower to a fair allocation than XCP. We evaluate the
performance of VCP using extensive ns2 simulations over
a wide range of network scenarios and find that it
significantly outperforms many recently-proposed TCP
variants, such as HSTCP, FAST, CUBIC, etc. To gain
insight into the behavior of VCP, we analyze a
simplified fluid model and prove its global stability
for the case of a single bottleneck shared by
synchronous flows with identical round-trip times.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "AQM; congestion control; ECN; stability; TCP",
}
@Article{Teixeira:2008:IHP,
author = "Renata Teixeira and Aman Shaikh and Timothy G. Griffin
and Jennifer Rexford",
title = "Impact of hot-potato routing changes in {IP}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1295--1307",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.919333",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Despite the architectural separation between
intradomain and interdomain routing in the Internet,
intradomain protocols do influence the path-selection
process in the Border Gateway Protocol (BGP). When
choosing between multiple equally-good BGP routes, a
router selects the one with the closest egress point,
based on the intradomain path cost. Under such
hot-potato routing, an intradomain event can trigger
BGP routing changes. To characterize the influence of
hot-potato routing, we propose a technique for
associating BGP routing changes with events visible in
the intradomain protocol, and apply our algorithm to a
tier-1 ISP backbone network. We show that (i) BGP
updates can lag 60 seconds or more behind the
intradomain event; (ii) the number of BGP path changes
triggered by hot-potato routing has a nearly uniform
distribution across destination prefixes; and (iii) the
fraction of BGP messages triggered by intradomain
changes varies significantly across time and router
locations. We show that hot-potato routing changes lead
to longer delays in forwarding-plane convergence,
shifts in the flow of traffic to neighboring domains,
extra externally-visible BGP update messages, and
inaccuracies in Internet performance measurements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Solano:2008:LSR,
author = "Fernando Solano and Thomas Stidsen and Ramon Fabregat
and Jose Luis Marzo",
title = "Label space reduction in {MPLS} networks: how much can
a single stacked label do?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1308--1320",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.912382",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most network operators have considered reducing LSR
label spaces (number of labels used) as a way of
simplifying management of underlying Virtual Private
Networks (VPNs) and therefore reducing operational
expenditure (OPEX). The IETF outlined the label merging
feature in MPLS-allowing the configuration of
MultiPoint-to-Point connections (MP2P)-as a means of
reducing label space in LSRs. We found two main
drawbacks in this label space reduction scheme: (a) it
should be separately applied to a set of LSPs with the
same egress LSR--which decreases the options for better
reductions, and (b) LSRs close to the edge of the
network experience a greater label space reduction than
those close to the core. The later implies that MP2P
connections reduce the number of labels
asymmetrically.\par
In this article we propose a solution to these
drawbacks achieved by stacking an additional label onto
the packet header. We call this type of reduction
Asymmetric Merged Tunnels (AMT). A fast framework for
computing the optimal reduction using AMTs is proposed.
Our simulations show that the label space can be
reduced by up to 20\% more than when label merging is
used.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "label merging; label space reduction; label stacking;
MPLS; multipoint-to-point",
}
@Article{Bhatia:2008:BGR,
author = "Randeep S. Bhatia and Murali Kodialam and T. V.
Lakshman and Sudipta Sengupta",
title = "Bandwidth guaranteed routing with fast restoration
against link and node failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1321--1330",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.919325",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An important feature of MPLS networks is local
restoration where detour paths are set-up a priori. The
detour is such that failed links or nodes can be
bypassed locally from the first node that is upstream
from the failures. This local bypass activation from
the first detection point for failures permits much
faster recovery than end-to-end path based mechanisms
that require failure information to propagate to the
network edges. However, local restoration of bandwidth
guaranteed connections can be expensive in the
additional network capacity needed. Hence, it is
important to minimize and share restoration capacity.
The problem of routing with local restoration
requirements has been studied previously in a dynamic
on-line setting. However, there are no satisfactory
algorithms for the problem of preprovisioning fast
restorable connections when the aggregate traffic
demands are known (as would be the case when a set of
routers are to be interconnected over an optical
network or for pre-provisioned ATM over MPLS overlays).
The contribution of this paper is a fast combinatorial
approximation algorithm for maximizing throughput when
the routed traffic is required to be locally
restorable. To the best of our knowledge, this is the
first combinatorial algorithm for the problem with a
performance guarantee. Our algorithm is a Fully
Polynomial Time Approximation Scheme (FPTAS), i.e., for
any given $ E > 0 $, it guarantees $ (1 + E)$-factor
closeness to the optimal solution, and runs in time
polynomial in the network size and $ 1 / E$. We compare
the throughput of locally restorable routing with that
of unprotected routing and $ 1 + 1$-dedicated path
protection on actual US/European ISP topologies taken
from the Rocketfuel project [14].",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fast restoration; MPLS; optical networks; protection;
routing; traffic engineering",
}
@Article{Stefanakos:2008:RRN,
author = "Stamatis Stefanakos",
title = "Reliable routings in networks with generalized link
failure events",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1331--1339",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911435",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study routing problems in networks that require
guaranteed reliability against multiple correlated link
failures. We consider two different routing objectives:
The first ensures 'local reliability,' i.e., the goal
is to route so that each connection in the network is
as reliable as possible. The second ensures 'global
reliability,' i.e., the goal is to route so that as few
as possible connections are affected by any possible
failure. We exhibit a trade-off between the two
objectives and resolve their complexity and
approximability for several classes of networks.
Furthermore, we propose approximation algorithms and
heuristics. We perform experiments to evaluate the
heuristics against optimal solutions that are obtained
using an integer linear programming solver. We also
investigate up to what degree the routing trade-offs
occur in randomly generated instances.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithms; network reliability; routing",
}
@Article{Georgakopoulos:2008:BCB,
author = "George F. Georgakopoulos",
title = "Buffered cross-bar switches, revisited: design steps,
proofs and simulations towards optimal rate and minimum
buffer memory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1340--1351",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911441",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Regarding the packet-switching problem, we prove that
the weighed max-min fair service rates comprise the
unique Nash equilibrium point of a strategic game,
specifically a throughput auction based on a
'least-demanding first-served' principle. We prove that
a buffered crossbar switch can converge to this
equilibrium with no pre-computation or internal
acceleration, with either randomized or deterministic
schedulers, (the latter with a minimum buffering of a
single-packet per crosspoint). Finally, we present
various simulation results that corroborate and extend
our analysis.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "buffered crossbar switches; packet switching;
strategic games",
}
@Article{Ramasubramanian:2008:SMP,
author = "Srinivasan Ramasubramanian",
title = "Supporting multiple protection strategies in optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1352--1365",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.919335",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper develops a framework to support multiple
protection strategies in optical networks, which is in
general applicable to any connection-oriented network.
The capacity available on a link for routing primary
and backup connections are computed depending on the
protection strategy. The paper also develops a model
for computing service outage and failure recovery times
for a connection where notifications of failure
location are broadcast in the network. The
effectiveness of employing multiple protection
strategies is established by studying the performance
of three networks for traffic with four types of
protection requirement.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic routing; link protection; multiple protection
strategies; optical networks; path protection",
}
@Article{Song:2008:CSB,
author = "Lei Song and Jing Zhang and Biswanath Mukherjee",
title = "A comprehensive study on backup-bandwidth
reprovisioning after network-state updates in
survivable telecom mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1366--1377",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918083",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The capacity of a telecom fiber is very high and
continues to increase, due to the advances in
wavelength-division multiplexing (WDM) technology.
Thus, a fiber-link failure may cause huge data (and
revenue) loss. Reprovisioning (or re-optimization) of
backup (or protection) bandwidth is an effective
approach to improve network survivability while
preventing existing services from unnecessary
interruption. Most research works to date focus on
applying backup-resource reprovisioning when a network
failure occurs, or at some particular intervals over a
certain time period.\par
A network's state changes when any one of the following
four events occurs: (1) a new connection arrives; (2)
an existing connection departs; (3) a network failure
occurs (e.g., a fiber cut); or (4) a failed network
component (e.g., a fiber cut) is repaired. Moreover,
backup-bandwidth rearrangement can also be triggered
when resource overbuild (RO) [1] exceeds a predefined
threshold or blocking occurs. In this study, we
investigate the benefits of performing backup
reprovisioning for part of (or all) the existing
connections after network-state updates to improve
network robustness as well as backup-bandwidth
utilization in survivable telecom mesh networks. We
study the effect of different backup reprovisioning
periods (assuming no failure occurrence), which
represents a tradeoff between capacity optimization and
computation/reconfiguration overhead. We also examine
the performance of an RO-threshold-triggered
backup-reprovisioning approach.\par
A wavelength-convertible network model and
shared-path-protected routing strategy are assumed in
this study. We consider a link-vector model in which a
vector is associated with each link in the network,
indicating the amount of backup bandwidth to be
reserved on the link to protect against possible
failures on other links. Our simulation results
demonstrate that our approaches achieve better
backup-capacity utilization and network robustness,
compared to a conventional scheme which reprovisions
backup paths for connections only when a network
failure occurs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "backup reprovisioning; mesh; multiple concurrent
failures; optical; protection; restoration;
survivability; telecom network; WDM",
}
@Article{Zhao:2008:LMC,
author = "Qun Zhao and Mohan Gurusamy",
title = "Lifetime maximization for connected target coverage in
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1378--1391",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911432",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the connected target
coverage (CTC) problem with the objective of maximizing
the network lifetime by scheduling sensors into
multiple sets, each of which can maintain both target
coverage and connectivity among all the active sensors
and the sink. We model the CTC problem as a maximum
cover tree (MCT) problem and prove that the MCT problem
is NP-Complete. We determine an upper bound on the
network lifetime for the MCT problem and then develop a
$ (1 + w) H(M) $ approximation algorithm to solve it,
where is an arbitrarily small number, $ H(M) = \sum_{1
\leq i \leq M} (1 / i) $ and $M$ is the maximum number
of targets in the sensing area of any sensor. As the
protocol cost of the approximation algorithm may be
high in practice, we develop a faster heuristic
algorithm based on the approximation algorithm called
Communication Weighted Greedy Cover (CWGC) algorithm
and present a distributed implementation of the
heuristic algorithm. We study the performance of the
approximation algorithm and CWGC algorithm by comparing
them with the lifetime upper bound and other basic
algorithms that consider the coverage and connectivity
problems independently. Simulation results show that
the approximation algorithm and CWGC algorithm perform
much better than others in terms of the network
lifetime and the performance improvement can be up to
45\% than the best-known basic algorithm. The lifetime
obtained by our algorithms is close to the upper bound.
Compared with the approximation algorithm, the CWGC
algorithm can achieve a similar performance in terms of
the network lifetime with a lower protocol cost.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; coverage; network lifetime;
NP-complete; sensor activity scheduling; wireless
sensor networks",
}
@Article{Papandriopoulos:2008:ODP,
author = "John Papandriopoulos and Subhrakanti Dey and Jamie
Evans",
title = "Optimal and distributed protocols for cross-layer
design of physical and transport layers in {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1392--1405",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918099",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We seek distributed protocols that attain the global
optimum allocation of link transmitter powers and
source rates in a cross-layer design of a mobile ad hoc
network. Although the underlying network utility
maximization is nonconvex, convexity plays a major role
in our development. We provide new convexity results
surrounding the Shannon capacity formula, allowing us
to abandon suboptimal high-SIR approximations that have
almost become entrenched in the literature. More
broadly, these new results can be back-substituted into
many existing problems for similar benefit.\par
Three protocols are developed. The first is based on a
convexification of the underlying problem, relying
heavily on our new convexity results. We provide
conditions under which it produces a globally optimum
resource allocation. We show how it may be distributed
through message passing for both rate- and
power-allocation. Our second protocol relaxes this
requirement and involves a novel sequence of convex
approximations, each exploiting existing TCP protocols
for source rate allocation. Message passing is only
used for power control. Our convexity results again
provide sufficient conditions for global optimality.
Our last protocol, motivated by a desire of power
control devoid of message passing, is a near optimal
scheme that makes use of noise measurements and enjoys
a convergence rate that is orders of magnitude faster
than existing methods.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; cross-layer optimization; mobile
ad hoc network; network utility maximization; outage
probability; power control; Rayleigh fading",
}
@Article{Brzezinski:2008:DTM,
author = "Andrew Brzezinski and Gil Zussman and Eytan Modiano",
title = "Distributed throughput maximization in wireless mesh
networks via pre-partitioning",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1406--1419",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918109",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper considers the interaction between channel
assignment and distributed scheduling in multi-channel
multi-radio Wireless Mesh Networks (WMNs). Recently, a
number of distributed scheduling algorithms for
wireless networks have emerged. Due to their
distributed operation, these algorithms can achieve
only a fraction of the maximum possible throughput. As
an alternative to increasing the throughput fraction by
designing new algorithms, we present a novel approach
that takes advantage of the inherent multi-radio
capability of WMNs. We show that this capability can
enable partitioning of the network into subnetworks in
which simple distributed scheduling algorithms can
achieve 100\% throughput. The partitioning is based on
the notion of Local Pooling. Using this notion, we
characterize topologies in which 100\% throughput can
be achieved distributedly. These topologies are used in
order to develop a number of centralized channel
assignment algorithms that are based on a matroid
intersection algorithm. These algorithms pre-partition
a network in a manner that not only expands the
capacity regions of the subnetworks but also allows
distributed algorithms to achieve these capacity
regions. We evaluate the performance of the algorithms
via simulation and show that they significantly
increase the distributedly achievable capacity region.
We note that while the identified topologies are of
general interference graphs, the partitioning
algorithms are designed for networks with primary
interference constraints.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "channel assignment; distributed algorithms; local
pooling; matroid intersection; scheduling; stability",
}
@Article{Hande:2008:DUP,
author = "Prashanth Hande and Sundeep Rangan and Mung Chiang and
Xinzhou Wu",
title = "Distributed uplink power control for optimal {SIR}
assignment in cellular data networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1420--1433",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918070",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper solves the joint power control and SIR
assignment problem through distributed algorithms in
the uplink of multi-cellular wireless networks. The
1993 Foschini--Miljanic distributed power control can
attain a given fixed and feasible SIR target. In data
networks, however, SIR needs to be jointly optimized
with transmit powers in wireless data networks. In the
vast research literature since the mid-1990s, solutions
to this joint optimization problem are either
distributed but suboptimal, or optimal but centralized.
For convex formulations of this problem, we report a
distributed and optimal algorithm.\par
The main issue that has been the research bottleneck is
the complicated, coupled constraint set, and we resolve
it through a re-parametrization via the left Perron
Frobenius eigenvectors, followed by development of a
locally computable ascent direction. A key step is a
new characterization of the feasible SIR region in
terms of the loads on the base stations, and an
indication of the potential interference from mobile
stations, which we term spillage. Based on this
load-spillage characterization, we first develop a
distributed algorithm that can achieve any
Pareto-optimal SIR assignment, then a distributed
algorithm that picks out a particular Pareto-optimal
SIR assignment and the associated powers through
utility maximization. Extensions to power-constrained
and interference-constrained cases are carried out. The
algorithms are theoretically sound and practically
implementable: we present convergence and optimality
proofs as well as simulations using 3GPP network and
path loss models.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cellular networks; distributed algorithm;
optimization; power control; wireless networks",
}
@Article{Walters:2008:FMA,
author = "Aaron Walters and David Zage and Cristina Nita
Rotaru",
title = "A framework for mitigating attacks against
measurement-based adaptation mechanisms in unstructured
multicast overlay networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1434--1446",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.912394",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many multicast overlay networks maintain
application-specific performance goals by dynamically
adapting the overlay structure when the monitored
performance becomes inadequate. This adaptation results
in an unstructured overlay where no neighbor selection
constraints are imposed. Although such networks provide
resilience to benign failures, they are susceptible to
attacks conducted by adversaries that compromise
overlay nodes. Previous defense solutions proposed to
address attacks against overlay networks rely on strong
organizational constraints and are not effective for
unstructured overlays. In this work, we identify,
demonstrate and mitigate insider attacks against
measurement-based adaptation mechanisms in unstructured
multicast overlay networks. We propose techniques to
decrease the number of incorrect adaptations by using
outlier detection and limit the impact of malicious
nodes by aggregating local information to derive global
reputation for each node. We demonstrate the attacks
and mitigation techniques through real-life deployments
of a mature overlay multicast system.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "adaptivity; insider attacks; overlay networks;
security",
}
@Article{Hefeeda:2008:TMP,
author = "Mohamed Hefeeda and Osama Saleh",
title = "Traffic modeling and proportional partial caching for
peer-to-peer systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1447--1460",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918081",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer (P2P) file sharing systems generate a
major portion of the Internet traffic, and this portion
is expected to increase in the future. We explore the
potential of deploying proxy caches in different
Autonomous Systems (ASes) with the goal of reducing the
cost incurred by Internet service providers and
alleviating the load on the Internet backbone. We
conduct an eight-month measurement study to analyze the
P2P traffic characteristics that are relevant to
caching, such as object popularity, popularity
dynamics, and object size. Our study shows that the
popularity of P2P objects can be modeled by a
Mandelbrot-Zipf distribution, and that several
workloads exist in P2P traffic. Guided by our findings,
we develop a novel caching algorithm for P2P traffic
that is based on object segmentation, and proportional
partial admission and eviction of objects. Our
trace-based simulations show that with a relatively
small cache size, a byte hit rate of up to 35\% can be
achieved by our algorithm, which is close to the byte
hit rate achieved by an off-line optimal algorithm with
complete knowledge of future requests. Our results also
show that our algorithm achieves a byte hit rate that
is at least 40\% more, and at most triple, the byte hit
rate of the common web caching algorithms. Furthermore,
our algorithm is robust in face of aborted downloads,
which is a common case in P2P systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "internet measurement; network protocols; peer-to-peer
systems; traffic analysis; traffic modeling",
}
@Article{Wu:2008:CAS,
author = "Tao Wu and David Starobinski",
title = "A comparative analysis of server selection in content
replication networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1461--1474",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.909752",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Server selection plays an essential role in content
replication networks, such as peer-to-peer (P2P) and
content delivery networks (CDNs). In this paper, we
perform an analytical investigation of the strengths
and weaknesses of existing server selection policies,
based initially on an M/G/1 Processor Sharing (PS)
queueing-theoretic model. We develop a theoretical
benchmark to evaluate the performance of two general
server selection policies, referred to as EQ\_DELAY and
EQ\_LOAD, which characterize a wide range of existing
server selection algorithms. We find that EQ\_LOAD
achieves an average delay always higher than or equal
to that of EQ\_DELAY. A key theoretical result of this
paper is that in an $n$-server system, the worst case
ratio between the average delay of EQ\_DELAY or
EQ\_LOAD and the minimal average delay (obtained from
the benchmark) is precisely $N$. We constructively show
how this worst case scenario can arise in highly
heterogeneous systems. This result, when interpreted in
the context of selfish routing, means that the price of
anarchy in unbounded delay networks depends on the
topology, and can potentially be very large. Our
analytical findings are extended in asymptotic regimes
to the G/G/1 First-Come First-Serve and multi-class
M/G/1-PS models and supported by simulations run for
various arrival and service processes, scheduling
disciplines, and workload exhibiting temporal locality.
These results indicate that our analysis is applicable
to realistic scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "content delivery networks; distributed systems; game
theory; load balancing; peer-to-peer networks; price of
anarchy",
}
@Article{Leonard:2008:SDP,
author = "Derek Leonard and Zhongmei Yao and Xiaoming Wang and
Dmitri Loguinov",
title = "On static and dynamic partitioning behavior of
large-scale {P2P} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "16",
number = "6",
pages = "1475--1488",
month = dec,
year = "2008",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2007.911433",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:04 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we analyze the problem of network
disconnection in the context of large-scale P2P
networks and understand how both static and dynamic
patterns of node failure affect the resilience of such
graphs. We start by applying classical results from
random graph theory to show that a large variety of
deterministic and random P2P graphs almost surely
(i.e., with probability $ 1 - O(1)$) remain connected
under random failure if and only if they have no
isolated nodes. This simple, yet powerful, result
subsequently allows us to derive in closed-form the
probability that a P2P network develops isolated nodes,
and therefore partitions, under both types of node
failure. We finish the paper by demonstrating that our
models match simulations very well and that dynamic P2P
systems are extremely resilient under node churn as
long as the neighbor replacement delay is much smaller
than the average user lifetime.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "churn; dynamic resilience; graph disconnection; P2P",
}
@Article{VanMieghem:2009:VSN,
author = "Piet {Van Mieghem} and Jasmina Omic and Robert Kooij",
title = "Virus spread in networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "1--14",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925623",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The influence of the network characteristics on the
virus spread is analyzed in a new--the $n$-intertwined
Markov chain--model, whose only approximation lies in
the application of mean field theory. The mean field
approximation is quantified in detail. The $n$
intertwined model has been compared with the exact $
2^n$-state Markov model and with previously proposed
homogeneous' or 'local' models. The sharp epidemic
threshold $ \tau c$, which is a consequence of mean
field theory, is rigorously shown to be equal to $ \tau
c = 1 / (\lambda \max (A))$, where $ \lambda \max (A)$
is the largest eigenvalue--the spectral radius--of the
adjacency matrix $A$. A continued fraction expansion of
the steady-state infection probability at node $j$ is
presented as well as several upper bounds.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "epidemic threshold; Markov theory; mean field theory;
spectral radius; virus spread",
}
@Article{Xie:2009:MAL,
author = "Yi Xie and Shun-Zheng Yu",
title = "Monitoring the application-layer {DDoS} attacks for
popular websites",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "15--25",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925628",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed denial of service (DDoS) attack is a
continuous critical threat to the Internet. Derived
from the low layers, new application-layer-based DDoS
attacks utilizing legitimate HTTP requests to overwhelm
victim resources are more undetectable. The case may be
more serious when such attacks mimic or occur during
the flash crowd event of a popular Website. Focusing on
the detection for such new DDoS attacks, a scheme based
on document popularity is introduced. An Access Matrix
is defined to capture the spatial-temporal patterns of
a normal flash crowd. Principal component analysis and
independent component analysis are applied to abstract
the multidimensional Access Matrix. A novel anomaly
detector based on hidden semi-Markov model is proposed
to describe the dynamics of Access Matrix and to detect
the attacks. The entropy of document popularity fitting
to the model is used to detect the potential
application-layer DDoS attacks. Numerical results based
on real Web traffic data are presented to demonstrate
the effectiveness of the proposed method.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "application-layer; distributed denial of service
(DDoS); popular Website",
}
@Article{Ranjan:2009:DSD,
author = "Supranamaya Ranjan and Ram Swaminathan and Mustafa
Uysal and Antonio Nucci and Edward Knightly",
title = "{DDoS-shield}: {DDoS}-resilient scheduling to counter
application layer attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "26--39",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926503",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Countering distributed denial of service (DDoS)
attacks is becoming ever more challenging with the vast
resources and techniques increasingly available to
attackers. In this paper, we consider sophisticated
attacks that are protocol-compliant, non-intrusive, and
utilize legitimate application-layer requests to
overwhelm system resources. We characterize
application-layer resource attacks as either request
flooding, asymmetric, or repeated one-shot, on the
basis of the application workload parameters that they
exploit. To protect servers from these attacks, we
propose a counter-mechanism namely DDoS Shield that
consists of a suspicion assignment mechanism and a
DDoS-resilient scheduler. In contrast to prior work,
our suspicion mechanism assigns a continuous value as
opposed to a binary measure to each client session, and
the scheduler utilizes these values to determine if and
when to schedule a session's requests. Using testbed
experiments on a web application, we demonstrate the
potency of these resource attacks and evaluate the
efficacy of our counter-mechanism. For instance, we
mount an asymmetric attack which overwhelms the server
resources, increasing the response time of legitimate
clients from 0.3 seconds to 40 seconds. Under the same
attack scenario, DDoS Shield improves the victims'
performance to 1.5 seconds.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anomaly detection; application layer attacks;
denial-of-service attacks; information entropy; site
security monitoring",
}
@Article{Traynor:2009:MAO,
author = "Patrick Traynor and William Enck and Patrick McDaniel
and Thomas {La Porta}",
title = "Mitigating attacks on open functionality in
{SMS}-capable cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "40--53",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925939",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The transformation of telecommunications networks from
homogeneous closed systems providing only voice
services to Internet-connected open networks that
provide voice and data services presents significant
security challenges. For example, recent research
illustrated that a carefully crafted DoS attack via
text messaging could incapacitate all voice
communications in a metropolitan area with little more
than a cable modem. This attack highlights a growing
threat to these systems; namely, cellular networks are
increasingly exposed to adversaries both in and outside
the network. In this paper, we use a combination of
modeling and simulation to demonstrate the feasibility
of targeted text messaging attacks. Under realistic
network conditions, we show that adversaries can
achieve blocking rates of more than 70\% with only
limited resources. We then develop and characterize
five techniques from within two broad classes of
countermeasures--queue management and resource
provisioning. Our analysis demonstrates that these
techniques can eliminate or extensively mitigate even
the most intense targeted text messaging attacks. We
conclude by considering the tradeoffs inherent to the
application of these techniques in current and next
generation telecommunications networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "denial-of-service; open-functionality; SMS;
telecommunications",
}
@Article{Xie:2009:LSH,
author = "Yi Xie and Shun-Zheng Yu",
title = "A large-scale hidden semi-{Markov} model for anomaly
detection on user browsing behaviors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "54--65",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.923716",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many methods designed to create defenses against
distributed denial of service (DDoS) attacks are
focused on the IP and TCP layers instead of the high
layer. They are not suitable for handling the new type
of attack which is based on the application layer. In
this paper, we introduce a new scheme to achieve early
attack detection and filtering for the
application-layer-based DDoS attack. An extended hidden
semi-Markov model is proposed to describe the browsing
behaviors of web surfers. In order to reduce the
computational amount introduced by the model's large
state space, a novel forward algorithm is derived for
the online implementation of the model based on the
M-algorithm. Entropy of the user's HTTP request
sequence fitting to the model is used as a criterion to
measure the user's normality. Finally, experiments are
conducted to validate our model and algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anomaly detection; browsing behaviors; DDoS; hidden
semi-Markov model; M-algorithm",
}
@Article{Le:2009:DNW,
author = "Franck Le and Sihyung Lee and Tina Wong and Hyong S.
Kim and Darrell Newcomb",
title = "Detecting network-wide and router-specific
misconfigurations through data mining",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "66--79",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925631",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent studies have shown that router
misconfigurations are common and can have dramatic
consequences to the operations of a network.
Misconfigurations can compromise the security of an
entire network or even cause global disruptions to
Internet connectivity. Several solutions have been
proposed. They can detect a number of problems in real
configuration files. However, these solutions share a
common limitation: they are based on rules which need
to be known beforehand. Violations of these rules are
deemed misconfigurations. As policies typically differ
among networks, these approaches are limited in the
scope of mistakes they can detect. In this paper, we
address the problem of router misconfigurations using
data mining. We apply association rules mining to the
configuration files of routers across an administrative
domain to discover local, network-specific policies.
Deviations from these local policies are potential
misconfigurations. We have evaluated our scheme on
configuration files from a large state-wide network
provider, a large university campus and a
high-performance research network. In this evaluation,
we focused on three aspects of the configurations: user
accounts, interfaces and BGP sessions. User accounts
specify the users that can access the router and define
the authorized commands. Interfaces are the ports used
by routers to connect to different networks. Each
interface may support a number of services and run
various routing protocols. BGP sessions are the
connections with neighboring autonomous systems (AS).
BGP sessions implement the routing policies which
select the routes that are filtered and the ones that
are advertised to the BGP neighbors. We included the
routing policies in our study. The results are
promising. We discovered a number of errors that were
confirmed and corrected by the network administrators.
These errors would have been difficult to detect with
current predefined rule-based approaches.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "association rules mining; error detection; network
management; static analysis",
}
@Article{Harfoush:2009:MCB,
author = "Khaled Harfoush and Azer Bestavros and John Byers",
title = "Measuring capacity bandwidth of targeted path
segments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "80--92",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008702",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Accurate measurement of network bandwidth is important
for network management applications as well as flexible
Internet applications and protocols which actively
manage and dynamically adapt to changing utilization of
network resources. Extensive work has focused on two
approaches to measuring bandwidth: measuring it
hop-by-hop, and measuring it end-to-end along a path.
Unfortunately, best-practice techniques for the former
are inefficient and techniques for the latter are only
able to observe bottlenecks visible at end-to-end
scope. In this paper, we develop end-to-end probing
methods which can measure bottleneck capacity bandwidth
along arbitrary, targeted subpaths of a path in the
network, including subpaths shared by a set of flows.
We evaluate our technique through ns simulations, then
provide a comparative Internet performance evaluation
against hop-by-hop and end-to-end techniques. We also
describe a number of applications which we foresee as
standing to benefit from solutions to this problem,
ranging from network troubleshooting and capacity
provisioning to optimizing the layout of
application-level overlay networks, to optimized
replica placement.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bottleneck bandwidth; content distribution; end-to-end
measurement; overlay networks; packet-pair",
}
@Article{VanMieghem:2009:OPN,
author = "Piet {Van Mieghem} and Huijuan Wang",
title = "The observable part of a network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "93--105",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925089",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The union of all shortest path trees $ G_{\rm Uspt} $
is the maximally observable part of a network when
traffic follows shortest paths. Overlay networks such
as peer to peer networks or virtual private networks
can be regarded as a subgraph of $ G_{\rm Uspt} $. We
investigate properties of $ G_{\rm Uspt} $ in different
underlying topologies with regular i.i.d. link weights.
In particular, we show that the overlay $ G_{\rm Uspt}
$ in an Erd{\H{o}}s--R{\'e}nyi random graph $ G p(n) $
is a connected $ G_{\rm Pc}(n) $ where $ P_c \sim \log
n / n $ is the critical link density, an observation
with potential for ad-hoc networks.
Shortest paths and, thus also the overlay $ G_{\rm
Uspt} $, can be controlled by link weights. By tuning
the power exponent $ \alpha $ of polynomial link
weights in different underlying graphs, the phase
transitions in the structure of $ G_{\rm Uspt} $ are
shown by simulations to follow a same universal curve $
F T(\alpha) = P r[{\rm G Uspt is a tree}] $. The
existence of a controllable phase transition in
networks may allow network operators to steer and
balance flows in their network. The structure of $
G_{\rm Uspt} $ in terms of the extreme value index $
\alpha $ is further examined together with its
spectrum, the eigenvalues of the corresponding
adjacency matrix of $ G_{\rm Uspt} $.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "observability; overlay; union of shortest paths",
}
@Article{Song:2009:NFF,
author = "Han Hee Song and Lili Qiu and Yin Zhang",
title = "{NetQuest}: a flexible framework for large-scale
network measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "106--119",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925635",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present NetQuest, a flexible
framework for large-scale network measurement. We apply
Bayesian experimental design to select active
measurements that maximize the amount of information we
gain about the network path properties subject to given
resource constraints. We then apply network inference
techniques to reconstruct the properties of interest
based on the partial, indirect observations we get
through these measurements.\par
By casting network measurement in a general Bayesian
decision theoretic framework, we achieve flexibility.
Our framework can support a variety of design
requirements, including (i) differentiated design for
providing better resolution to certain parts of the
network; (ii) augmented design for conducting
additional measurements given existing observations;
and (iii) joint design for supporting multiple users
who are interested in different parts of the network.
Our framework is also scalable and can design
measurement experiments that span thousands of routers
and end hosts.\par
We develop a toolkit that realizes the framework on
PlanetLab. We conduct extensive evaluation using both
real traces and synthetic data. Our results show that
the approach can accurately estimate network-wide and
individual path properties by only monitoring within
2\%--10\% of paths. We also demonstrate its
effectiveness in providing differentiated monitoring,
supporting continuous monitoring, and satisfying the
requirements of multiple users.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Bayesian experimental design; network inference;
network measurement; network tomography",
}
@Article{Terdik:2009:LFF,
author = "Gy{\"o}rgy Terdik and Tibor Gyires",
title = "{L{\'e}vy} flights and fractal modeling of {Internet}
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "120--129",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925630",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The relation between burstiness and self-similarity of
network traffic was identified in numerous papers in
the past decade. These papers suggested that the widely
used Poisson based models were not suitable for
modeling bursty, local-area and wide-area network
traffic. Poisson models were abandoned as unrealistic
and simplistic characterizations of network traffic.
Recent papers have challenged the accuracy of these
results in today's networks. Authors of these papers
believe that it is time to reexamine the Poisson
traffic assumption. The explanation is that as the
amount of Internet traffic grows dramatically, any
irregularity of the network traffic, such as
burstiness, might cancel out because of the huge number
of different multiplexed flows. Some of these results
are based on analyses of particular OC48 Internet
backbone connections and other historical traffic
traces. We analyzed the same traffic traces and applied
new methods to characterize them in terms of packet
interarrival times and packet lengths. The major
contribution of the paper is the application of two new
analytical methods. We apply the theory of smoothly
truncated Levy flights and the linear fractal model in
examining the variability of Internet traffic from
self-similar to Poisson. The paper demonstrates that
the series of interarrival times is still close to a
self-similar process, but the burstiness of the packet
lengths decreases significantly compared to earlier
traces.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "burstiness; fractal modelling; L{\'e} long-range
dependence; network traffic; vy flights",
}
@Article{Ahmed:2009:PSP,
author = "Reaz Ahmed and Raouf Boutaba",
title = "{Plexus}: a scalable peer-to-peer protocol enabling
efficient subset search",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "130--143",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001466",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Efficient discovery of information, based on partial
knowledge, is a challenging problem faced by many large
scale distributed systems. This paper presents Plexus,
a peer-to-peer search protocol that provides an
efficient mechanism for advertising a bit-sequence
(pattern), and discovering it using any subset of its
1-bits. A pattern (e.g., Bloom filter) summarizes the
properties (e.g., key-words, service description)
associated with a shared object (e.g., document,
service).\par
Plexus has a partially decentralized architecture
involving super-peers. It adopts a novel structured
routing mechanism derived from the theory of Error
Correcting Codes (ECC). Plexus achieves better
resilience to peer failure by utilizing replication and
redundant routing paths. Routing efficiency in Plexus
scales logarithmically with the number of superpeers.
The concept presented in this paper is supported with
theoretical analysis, and simulation results obtained
from the application of Plexus to partial keyword
search utilizing the extended Golay code.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bloom filter; distributed pattern matching; error
correcting codes; peer-to-peer search; structured
overlay network",
}
@Article{Yao:2009:NIM,
author = "Zhongmei Yao and Xiaoming Wang and Derek Leonard and
Dmitri Loguinov",
title = "Node isolation model and age-based neighbor selection
in unstructured {P2P} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "144--157",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925626",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Previous analytical studies of unstructured P2P
resilience have assumed exponential user lifetimes and
only considered age-independent neighbor replacement.
In this paper, we overcome these limitations by
introducing a general node-isolation model for
heavy-tailed user lifetimes and arbitrary
neighbor-selection algorithms. Using this model, we
analyze two age-biased neighbor-selection strategies
and show that they significantly improve the residual
lifetimes of chosen users, which dramatically reduces
the probability of user isolation and graph
partitioning compared with uniform selection of
neighbors. In fact, the second strategy based on random
walks on age-proportional graphs demonstrates that, for
lifetimes with infinite variance, the system
monotonically increases its resilience as its age and
size grow. Specifically, we show that the probability
of isolation converges to zero as these two metrics
tend to infinity. We finish the paper with simulations
in finite-size graphs that demonstrate the effect of
this result in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "age-based selection; heavy-tailed lifetimes; node
isolation; peer-to-peer networks; user churn",
}
@Article{Fu:2009:OPS,
author = "Xiaoming Fu and Henning Schulzrinne and Hannes
Tschofenig and Christian Dickmann and Dieter Hogrefe",
title = "Overhead and performance study of the {General
Internet Signaling Transport (GIST)} protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "158--171",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926502",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The General Internet Signaling Transport (GIST)
protocol is currently being developed as the base
protocol compo-nent in the IETF Next Steps In Signaling
(NSIS) protocol stack to support a variety of signaling
applications. We present our study on the protocol
overhead and performance aspects of GIST. We quantify
network-layer protocol overhead and observe the effects
of enhanced modularity and security in GIST. We
developed a first open source GIST implementation at
the University of G{\"o}ttingen, and study its
performance in a Linux testbed. A GIST node serving
45,000 signaling sessions is found to consume average
only 1.1 ms for processing a signaling message and 2.4
KB of memory for managing a session. Individual
routines in the GIST code are instrumented to obtain a
detailed profile of their contributions to the overall
system processing. Important factors in determining
performance, such as the number of sessions, state
management, refresh frequency, timer management and
signaling message size are further discussed. We
investigate several mechanisms to improve GIST
performance so that it is comparable to an RSVP
implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{vonRickenbach:2009:AMI,
author = "Pascal von Rickenbach and Roger Wattenhofer and Aaron
Zollinger",
title = "Algorithmic models of interference in wireless ad hoc
and sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "172--185",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926506",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Among the most critical issues of wireless ad hoc and
sensor networks are energy consumption in general and
interference in particular. The reduction of
interference is consequently considered one of the
foremost goals of topology control. Almost all of the
related work however considers this issue implicitly:
Low interference is often claimed to be a consequence
of sparseness or low degree of the constructed
topologies. This paper, in contrast, studies explicit
definitions of interference. Various models of
interference---both from a sender-centric and a
receiver-centric perspective---are proposed, compared,
and analyzed with respect to their algorithmic
properties and complexities.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithmic analysis; interference; modeling; network
connectivity; network spanners; topology control",
}
@Article{Elmeleegy:2009:UME,
author = "Khaled Elmeleegy and Alan L. Cox and T. S. Eugene Ng",
title = "Understanding and mitigating the effects of count to
infinity in {Ethernet} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "186--199",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.920874",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Ethernet's high performance, low cost, and ubiquity
have made it the dominant networking technology for
many application domains. Unfortunately, its
distributed forwarding topology computation
protocol---the Rapid Spanning Tree Protocol (RSTP)---is
known to suffer from a classic count-to-infinity
problem. However, the cause and implications of this
problem are neither documented nor understood. This
paper has three main contributions. First, we identify
the exact conditions under which the count-to-infinity
problem manifests itself, and we characterize its
effect on forwarding topology convergence. Second, we
have discovered that a forwarding loop can form during
count to infinity, and we provide a detailed
explanation. Third, we propose a simple and effective
solution called RSTP with Epochs. This solution
guarantees that the forwarding topology converges in at
most one round-trip time across the network and
eliminates the possibility of a count-to-infinity
induced forwarding loop.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Ethernet; reliability; spanning tree protocols",
}
@Article{Lian:2009:VSF,
author = "Jie Lian and Yunhao Liu and Kshirasagar Naik and Lei
Chen",
title = "Virtual surrounding face geocasting in wireless ad hoc
and sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "200--211",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927251",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Geocasting in wireless sensor and ad hoc networks
means delivering a message from a source node to all
the nodes in a given geographical region. The
objectives of a geocasting protocol are two-fold:
guaranteed message delivery and low transmission cost.
Most of the existing protocols do not guarantee message
de-livery, and those that do, incur high transmission
costs.\par
In this study, we propose the concept of Virtual
Surrounding Face (VSF), and design a VSF-based
geocasting protocol (VSFG). We also design a SKIP
method and a local dominating set (DS) based restricted
flooding technique to further reduce the cost of VSFG.
Through mathematical analysis and comprehensive
simulations, we show that VSFG, together with SKIP and
local DS based restricted flooding, guarantees message
delivery and has a much lower transmission cost than
the previous approaches. The reduction of cost can be
up to 65\% compared with the most efficient existing
approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; geocasting; virtual surrounding face;
wireless sensor networks",
}
@Article{Kompella:2009:PSR,
author = "Sastry Kompella and Shiwen Mao and Y. Thomas Hou and
Hanif D. Sherali",
title = "On path selection and rate allocation for video in
wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "212--224",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925942",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multi-path transport is an important mechanism for
supporting video communications in multihop wireless
networks. In this paper, we investigate the joint
problem of optimal path selection and rate allocation
for multiple video sessions in a wire-less mesh
network. We present a mathematical formulation to
optimize the application level performance (i.e., video
distortion) in the context of path selection and rate
allocation. For this complex optimization problem, we
propose a branch-and-bound based solution procedure,
embedded with the Reformulation-Linearization Technique
(RLT) that can produce $ (1 - E)$-optimal solutions for
any small $E$. This result is significant as it not
only provides theoretical understanding of this
problem, but also offers a performance benchmark for
any future proposed distributed algorithm and protocol
for this problem. Simulation results are also provided
to demonstrate the efficacy of the solution
procedure.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-layer design; optimization; path selection; rate
allocation; video communications; wireless mesh
network",
}
@Article{Issariyakul:2009:AFC,
author = "Teerawat Issariyakul and Vikram Krishnamurthy",
title = "Amplify-and-forward cooperative diversity wireless
networks: model, analysis, and monotonicity
properties",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "225--238",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925090",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper models and analyzes the performance of an
amplify-and-forward cooperative diversity wireless
network. We propose a Markov-based model, which
encompasses the following aspects: (1) the transmission
using amplify-and-forward cooperative diversity at the
physical layer; (2) a flow control protocol, finite and
infinite transmitting buffers, and an ARQ-based error
recovery mechanism at the radio link layer; and (3) a
bursty traffic pattern at the application layer. We
derive expressions for packet delivery probability and
distribution of packet delivery delay. We numerically
quantify improvement in terms of packet delivery
probability and packet delivery delay for increasing
SNR and/or cooperative nodes. For an additional
cooperative node, we quantify the amount of SNR which
can be reduced (i.e., SNR saving) without degrading the
system performance. Also, the minimum SNR and
cooperative nodes which satisfy a probabilistic delay
bound are computed. We then derive a sufficient
condition that ensures an increase in packet delivery
probability. Unlike numerical evaluation of the model,
this sufficient condition does not require computation
of stationary distribution of the Markov chain. It only
involves parameter adjustment at physical, radio link,
and application layers, hence substantially reducing
the computation effort. Based on the developed model,
we design a power allocation algorithm, which computes
the minimum transmission power under a packet delivery
probability constraint. We then use the derived
sufficient condition to reduce complexity of the power
allocation algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "amplify-and-forward (AF); cooperative diversity (CD);
Markov chain; monotonicity; stochastic dominance",
}
@Article{Luo:2009:RCD,
author = "Hongbin Luo and Lemin Li and Hongfang Yu",
title = "Routing connections with differentiated reliability
requirements in {WDM} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "253--266",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925087",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Reliability has been well recognized as an important
design objective in the design of modern high-speed
networks. While traditional approaches offer either
100\% protection in the presence of single link failure
or no protection at all, connections in real networks
may have multiple reliability requirements. The concept
of differentiated reliability (DiR) has been introduced
in the literature to provide multiple reliability
requirements in protection schemes that provision spare
resources.\par
In this paper, we consider the problem of routing
connections with differentiated reliability in
wavelength-division multiplexing (WDM) mesh networks
when backup sharing is not allowed. Our objective is to
route connections with minimum network cost (e.g.,
network resources) while meeting their required
reliability. We assume connections arrive dynamically
one-at-a-time and a decision as to accept or reject a
connection has to be made without a priori knowledge of
future arrivals. Since sharing cannot be used for
achieving efficiency, the goal is to achieve efficiency
by improved path selection. In this paper, we first
present an integer linear programming (ILP) formulation
for the problem. By solving the ILP formulation, we can
obtain an optimal solution with respect to the current
network state for each dynamic arrival. To solve the
ILP formulation, however, is time consuming for large
networks. We thus propose two approximation algorithms
for the problem. The first one, called
Shortest-Path-Pair-based Auxiliary graph (SPPA), can
obtain an $ \epsilon $-approximation solution whose
cost is at most $ 1 + \epsilon $ times the optimum in $
O((n^2 (n + 1) + 2 m n)(\log \log (2 n) + 1 /
\epsilon))$ time, where $n$ and $m$ are the number of
nodes and links in a network, respectively. To reduce
the computational complexity of the first algorithm,
the second algorithm, called Auxiliary graph-based
Two-Step Approach (ATSA), is proposed and can obtain a
near optimal solution with cost at most $ 2 + \epsilon
$ times that of the optimal solution in $ O(m n(\log
\log n + 1 / \epsilon))$ time. Results from extensive
simulations conducted on two typical carrier mesh
networks show the efficiency of the two algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "differentiated reliability; mesh networks;
reliability; routing algorithm; wavelength-division
multiplexing (WDM)",
}
@Article{Avallone:2009:CRA,
author = "Stefano Avallone and Ian F. Akyildiz and Giorgio
Ventre",
title = "A channel and rate assignment algorithm and a
layer-2.5 forwarding paradigm for multi-radio wireless
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "267--280",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.918091",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The availability of cost-effective wireless network
interface cards makes it practical to design network
devices with multiple radios which can be exploited to
simultaneously transmit/receive over different
frequency channels. It has been shown that using
multiple radios per node increases the throughput of
multi-hop wireless mesh networks. However, multi-radios
create several research challenges. A fundamental
problem is the joint channel assignment and routing
problem, i.e., how the channels can be assigned to
radios and how a set of flow rates can be determined
for every network link in order to achieve an
anticipated objective. This joint problem is
NP-complete. Thus, an approximate solution is developed
by solving the channel assignment and the routing
problems separately. The channel assignment problem
turns out to be the problem to assign channels such
that a given set of flow rates are schedulable and
itself is shown to be also NP-complete. This paper
shows that not only the channels but also the
transmission rates of the links have to be properly
selected to make a given set of flow rates schedulable.
Thus, a greedy heuristic for the channel and rate
assignment problem is developed. Algorithms to schedule
the resulting set of flow rates have been proposed in
the literature, which require synchronization among
nodes and hence modified coordination functions. Unlike
previous work, in this paper a forwarding paradigm is
developed to achieve the resulting set of flow rates
while using a standard MAC. A bi-dimensional Markov
chain model of the proposed forwarding paradigm is
presented to analyze its behavior. Thorough performance
studies are conducted to: (a) compare the proposed
greedy heuristic to other channel assignment
algorithms; (b) analyze the behavior of the forwarding
paradigm through numerical simulations based on the
Markov chain model; (c) simulate the operations of the
forwarding paradigm and evaluate the achieved network
throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "channel assignment; layer-2.5 forwarding paradigm;
multi-radio wireless mesh networks; physical model of
interference",
}
@Article{Tabatabaee:2009:MCN,
author = "Vahid Tabatabaee and Leandros Tassiulas",
title = "{MNCM}: a critical node matching approach to
scheduling for input buffered switches with no
speedup",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "294--304",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925091",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we use fluid model techniques to
establish new results for the throughput of
input-buffered switches. Dai and Prabhakar have shown
that any maximal size matching algorithm with speedup
of 2 achieves 100\% throughput. We introduce the
maximum node containing matching (MNCM), which is a new
class of matching algorithms that achieve 100\%
throughput with no speedup. The only assumption on the
arrival processes is they satisfy the strong law of
large numbers (SLLN). The MNCM policies only need to
include ports whose weight (backlog) are above a
threshold in the matching rather than finding a
matching with maximum total weight. This simplified
requirement enables us to introduce a new matching
algorithm, maximum first matching (MFM), with
O(N$^{2.5}$) complexity. We show that MFM is a
low-complexity algorithm with good delay performance.
We also provide a deterministic upper bound for the
buffering requirement of a switch with an MNCM
scheduler, when the ports incoming traffic are
admissible and ($ \sigma $, $ \rho $) regulated.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "input-queued switch fabrics; scheduling; stability
analysis",
}
@Article{Zalesky:2009:BCS,
author = "Andrew Zalesky",
title = "To burst or circuit switch?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "305--318",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.923718",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We develop, analyze and then numerically compare
performance models of a fast-adapting and centrally
controlled form of optical circuit switching (OCS) with
a conservative form of optical burst switching (OBS).
For the first time, we consider a unified model
comprising both: edge buffers at which arriving packets
are aggregated and enqueued according to a
vacation-type service discipline with nondeterministic
set-up times, together with a core network comprising
switches arbitrarily interconnected via fibers to allow
transmission of packets from an edge buffer to their
desired egress point through use of a dynamic signaling
process to establish a lightpath, and in the case of
OCS, also acknowledge its establishment. As such, edge
buffers dynamically issue requests for wavelength
capacity via a two or one-way reservation signaling
process. Previously analyzed models of OCS and OBS have
either been for a stand-alone edge buffer or a core
network without edge buffering. We compare OCS with OBS
in terms of packet blocking probability due to edge
buffer overflow and blocking at switches in the case of
OBS; mean packet queueing delay at edge buffers; and,
wavelength capacity utilization. Also for the first
time, we derive the exact blocking probability for a
multi-hop stand-alone OBS route, assuming Kleinrock's
independence, which is not simply a matter of summing
the stationary distribution of an appropriate Markov
process over all blocking states, as shown to be the
case for an OCS route.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical switching; blocking probability; optical
burst switching; optical circuit switching; path
decomposition; stochastic performance modeling;
vacation queue",
}
@Article{Liu:2009:SNF,
author = "Guanglei Liu and Chuanyi Ji",
title = "Scalability of network-failure resilience: analysis
using multi-layer probabilistic graphical models",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "319--331",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925944",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this work, we quantify scalability of network
resilience upon failures. We characterize resilience as
the percentage of lost traffic upon failures and define
scalability as the growth rate of the percentage of
lost traffic with respect to network size, link failure
probability, and network traffic for given failure
protection schemes. We apply probabilistic graphical
models to characterize statistical dependence between
physical-layer failures and the net-work-layer traffic,
and analyze the scalability for large networks of
different topologies.\par
We first focus on the scalability of resilience for
regular topologies under uniform deterministic traffic
with independent and dependent link failures, with and
without protection. For large net-works with small
probabilities of failures and without protection, we
show that the scalability of network resilience grows
linearly with the average route length and with the
'effective' link failure probability. For large
networks with $ 1 + 1 $ protection, we obtain lower and
upper bound of the percentage of lost traffic. We
derive approximations of the scalability for arbitrary
topologies, and attain close-form analytical results
for ring, star, and mesh-torus topologies. We then
study network resilience under random traffic with
Poisson arrivals. We find that when the network is
under light load, the network resilience is reduced to
that under uniform deterministic traffic. When the
network load is under heavy load, the percentage of
lost traffic approaches the marginal probability of
link failure. Our scalability analysis shows explicitly
how network resilience varies with different factors
and provides insights for resilient network design.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dependent failures; Erlang fixed point approximation;
network resilience; probabilistic graphical models;
scalability",
}
@Article{Jayavelu:2009:MCT,
author = "Giridhar Jayavelu and Srinivasan Ramasubramanian and
Ossama Younis",
title = "Maintaining colored trees for disjoint multipath
routing under node failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "1",
pages = "346--359",
month = feb,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.919323",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Mar 6 16:31:07 MST 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Colored Trees (CTs) is an efficient approach to route
packets along link-or node-disjoint paths in
packet-switched networks. In this approach, two trees,
namely red and blue, are constructed rooted at a drain
such that the path from any node to the drain are
link-or node-disjoint. For applications where both the
trees are used simultaneously, it is critical to
maintain the trees after link or node failures. To this
end, this paper develops an algorithm, referred to as
SimCT, that efficiently constructs and maintains
colored trees under failures using only local
information. Even when the entire tree needs to be
recomputed, the SimCT algorithm requires 40\% lesser
messages than previous techniques. The convergence time
of the SimCT algorithm is linear in the number of
nodes. We show through extensive simulations that the
average length of the disjoint paths obtained using the
SimCT algorithm is lesser compared to the previously
known techniques. The above-mentioned improvements are
obtained by exploiting the relationship between DFS
numbering, lowpoint values, and the potentials employed
for maintaining partial ordering of nodes. The SimCT
algorithm is also extended to obtain colored trees in
multi-drain networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "colored trees; IP fast rerouting; multipath routing",
}
@Article{Fan:2009:DTO,
author = "Bin Fan and John C. S. Lui and Dah-Ming Chiu",
title = "The design trade-offs of {BitTorrent}-like file
sharing protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "365--376",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2002553",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The BitTorrent (BT) file sharing protocol is very
popular due to its scalability property and the
built-in incentive mechanism to reduce free-riding.
However, in designing such P2P file sharing protocols,
there is a fundamental trade-off between keeping
fairness and providing good performance. In particular,
the system can either keep peers (especially those
resourceful ones) in the system for as long as possible
so as to help the system to achieve better performance,
or allow more resourceful peers to finish their
download as quickly as possible so as to achieve
fairness. The current BT protocol represents only one
possible implementation in this whole design space. The
objective of this paper is to characterize the design
space of BT-like protocols. The rationale for
considering fairness in the P2P file sharing context is
to use it as a measure of willingness to provide
service. We show that there is a wide range of design
choices, ranging from optimizing the performance of
file download time, to optimizing the overall fairness
measure. More importantly, we show that there is a
simple and easily implementable design knob so that the
system can operate at a particular point in the design
space. We also discuss different algorithms, ranging
from centralized to distributed, in realizing the
design knob. Performance evaluations are carried out,
both via simulation and network measurement, to
quantify the merits and properties of the BT-like file
sharing protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BitTorrent; fairness; file sharing protocol; incentive
mechanism; performance",
}
@Article{Stutzbach:2009:USU,
author = "Daniel Stutzbach and Reza Rejaie and Nick Duffield and
Subhabrata Sen and Walter Willinger",
title = "On unbiased sampling for unstructured peer-to-peer
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "377--390",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001730",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a detailed examination of how the
dynamic and heterogeneous nature of real-world
peer-to-peer systems can introduce bias into the
selection of representative samples of peer properties
(e.g., degree, link bandwidth, number of files shared).
We propose the Metropolized Random Walk with
Backtracking (MRWB) as a viable and promising technique
for collecting nearly unbiased samples and conduct an
extensive simulation study to demonstrate that our
technique works well for a wide variety of
commonly-encountered peer-to-peer network conditions.
We have implemented the MRWB algorithm for selecting
peer addresses uniformly at random into a tool called
ion-sampler. Using the Gnutella network, we empirically
show that ion-sampler yields more accurate samples than
tools that rely on commonly-used sampling techniques
and results in dramatic improvements in efficiency and
scalability compared to performing a full crawl.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "peer-to-peer; sampling",
}
@Article{He:2009:LLF,
author = "Yihua He and Georgos Siganos and Michalis Faloutsos
and Srikanth Krishnamurthy",
title = "Lord of the links: a framework for discovering missing
links in the {Internet} topology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "391--404",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926512",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The topology of the Internet at the Autonomous System
(AS) level is not yet fully discovered despite
significant research activity. The community still does
not know how many links are missing, where these links
are and finally, whether the missing links will change
our conceptual model of the Internet topology. An
accurate and complete model of the topology would be
important for protocol design, performance evaluation
and analyses. The goal of our work is to develop
methodologies and tools to identify and validate such
missing links between ASes. In this work, we develop
several methods and identify a significant number of
missing links, particularly of the peer-to-peer type.
Interestingly, most of the missing AS links that we
find exist as peer-to-peer links at the Internet
Exchange Points (IXPs). First, in more detail, we
provide a large-scale comprehensive synthesis of the
available sources of information. We cross-validate and
compare BGP routing tables, Internet Routing
Registries, and traceroute data, while we extract
significant new information from the less-studied
Internet Exchange Points (IXPs). We identify 40\% more
edges and approximately 300\% more peer-to-peer edges
compared to commonly used data sets. All of these edges
have been verified by either BGP tables or traceroute.
Second, we identify properties of the new edges and
quantify their effects on important topological
properties. Given the new peer-to-peer edges, we find
that for some ASes more than 50\% of their paths stop
going through their ISPs assuming policy-aware routing.
A surprising observation is that the degree of an AS
may be a poor indicator of which ASes it will peer
with.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BGP; inter-domain; Internet; measurement; missing
links; routing; topology",
}
@Article{Bianco:2009:WUS,
author = "Andrea Bianco and Gianluca Mardente and Marco Mellia
and Maurizio Munaf{\`o} and Luca Muscariello",
title = "{Web} user-session inference by means of clustering
techniques",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "405--416",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927009",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper focuses on the definition and
identification of 'Web user-sessions', aggregations of
several TCP connections generated by the same source
host. The identification of a user-session is non
trivial. Traditional approaches rely on threshold based
mechanisms. However, these techniques are very
sensitive to the value chosen for the threshold, which
may be difficult to set correctly. By applying
clustering techniques, we define a novel methodology to
identify Web user-sessions without requiring an a
priori definition of threshold values. We define a
clustering based approach, we discuss pros and cons of
this approach, and we apply it to real traffic traces.
The proposed methodology is applied to artificially
generated traces to evaluate its benefits against
traditional threshold based approaches. We also analyze
the characteristics of user-sessions extracted by the
clustering methodology from real traces and study their
statistical properties. Web user-sessions tend to be
Poisson, but correlation may arise during periods of
network/hosts anomalous behavior.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "clustering methods; traffic measurement; web traffic
characterization",
}
@Article{Veitch:2009:RSA,
author = "Darryl Veitch and Julien Ridoux and Satish Babu
Korada",
title = "Robust synchronization of absolute and difference
clocks over networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "417--430",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926505",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a detailed re-examination of the problem of
inexpensive yet accurate clock synchronization for
networked devices. Based on an empirically validated,
parsimonious abstraction of the CPU oscillator as a
timing source, accessible via the TSC register in
popular PC architectures, we build on the key
observation that the measurement of time differences,
and absolute time, requires separate clocks, both at a
conceptual level and practically, with distinct
algorithmic, robustness, and accuracy characteristics.
Combined with round-trip time based filtering of
network delays between the host and the remote time
server, we define robust algorithms for the
synchronization of the absolute and difference
TSCclocks over a network. We demonstrate the
effectiveness of the principles, and algorithms using
months of real data collected using multiple servers.
We give detailed performance results for a full
implementation running live and unsupervised under
numerous scenarios, which show very high reliability,
and accuracy approaching fundamental limits due to host
system noise. Our synchronization algorithms are
inherently robust to many factors including packet
loss, server outages, route changes, and network
congestion.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "GPS; network measurement; NTP; round-trip time;
software clock; synchronization; timing; TSC",
}
@Article{Scheuermann:2009:TSD,
author = "Bj{\"o}rn Scheuermann and Wolfgang Kiess and Magnus
Roos and Florian Jarre and Martin Mauve",
title = "On the time synchronization of distributed log files
in networks with local broadcast media",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "431--444",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925946",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Real-world experiments in computer networks typically
result in a set of log files, one for each system
involved in the experiment. Each log file contains
event timestamps based on the local clock of the
respective system. These clocks are not perfectly
accurate, and deviate from each other. For a thorough
analysis, however, a common time basis is necessary. In
this paper, we tackle the fundamental problem of
creating such a common time base for experiments in
networks with local broadcast media, where
transmissions can be received by more than one node. We
show how clock deviations and event times can be
estimated with very high accuracy, without introducing
any additional traffic in the network. The proposed
method is applied after the experiment is completed,
using just the set of local log files as its input. It
leads to a large linear program with a very specific
structure. We exploit the structure to solve the
synchronization problem quickly and efficiently, and
present an implementation of a specialized solver.
Furthermore, we give analytical and numerical
evaluation results and present real-world experiments,
all underlining the performance and accuracy of the
method.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadcast channels; experiments; offline time
synchronization; synchronization; timestamps",
}
@Article{Oliveira:2009:QPE,
author = "Ricardo Oliveira and Beichuan Zhang and Dan Pei and
Lixia Zhang",
title = "Quantifying path exploration in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "445--458",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2016390",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Previous measurement studies have shown the existence
of path exploration and slow convergence in the global
Internet routing system, and a number of protocol
enhancements have been proposed to remedy the problem.
However, existing measurements were conducted only over
a small number of testing prefixes. There has been no
systematic study to quantify the pervasiveness of
Border Gateway Protocol (BGP) slow convergence in the
operational Internet, nor any known effort to deploy
any of the proposed solutions.\par
In this paper, we present our measurement results that
identify BGP slow convergence events across the entire
global routing table. Our data shows that the severity
of path exploration and slow convergence varies
depending on where prefixes are originated and where
the observations are made in the Internet routing
hierarchy. In general, routers in tier-1 Internet
service providers (ISPs) observe less path exploration,
hence they experience shorter convergence delays than
routers in edge ASs; prefixes originated from tier-1
ISPs also experience less path exploration than those
originated from edge ASs. Furthermore, our data show
that the convergence time of route fail-over events is
similar to that of new route announcements and is
significantly shorter than that of route failures. This
observation is contrary to the widely held view from
previous experiments but confirms our earlier
analytical results. Our effort also led to the
development of a path-preference inference method based
on the path usage time, which can be used by future
studies of BGP dynamics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "AS topology completeness; border gateway protocol
(BGP); inter-domain routing; Internet topology",
}
@Article{Kodialam:2009:ORH,
author = "Murali Kodialam and T. V. Lakshman and James B. Orlin
and Sudipta Sengupta",
title = "Oblivious routing of highly variable traffic in
service overlays and {IP} backbones",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "459--472",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927257",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The emergence of new applications on the Internet like
voice-over-IP, peer-to-peer, and video-on-demand has
created highly dynamic and changing traffic patterns.
In order to route such traffic with quality-of-service
(QoS) guarantees without requiring detection of traffic
changes in real-time or reconfiguring the network in
response to it, a routing and bandwidth allocation
scheme has been recently proposed that allows
preconfiguration of the network such that all traffic
patterns permissible within the network's natural
ingress-egress capacity constraints can be handled in a
capacity efficient manner. The scheme routes traffic in
two phases. In the first phase, incoming traffic is
sent from the source to a set of intermediate nodes and
then, in the second phase, from the intermediate nodes
to the final destination. The traffic in the first
phase is distributed to the intermediate nodes in
predetermined proportions that depend on the
intermediate nodes. In this paper, we develop linear
programming formulations and a fast combinatorial
algorithm for routing under the scheme so as to
maximize throughput (or, minimize maximum link
utilization). We compare the throughput performance of
the scheme with that of the optimal scheme among the
class of all schemes that are allowed to even make the
routing dependent on the traffic matrix. For our
evaluations, we use actual Internet Service Provider
topologies collected for the Rocketfuel project. We
also bring out the versatility of the scheme in not
only handling widely fluctuating traffic but also
accommodating applicability to several widely differing
networking scenarios, including (i) economical Virtual
Private Networks (VPNs); (ii) supporting indirection in
specialized service overlay models like Internet
Indirection Infrastructure (i3); (iii) adding QoS
guarantees to services that require routing through a
network-based middlebox; and (iv) reducing IP layer
transit traffic and handling extreme traffic
variability in IP-over-optical networks without dynamic
reconfiguration of the optical layer. The two desirable
properties of supporting indirection in specialized
service overlay models and static optical layer
provisioning in IP-over-optical networks are not
present in other approaches for routing variable
traffic, such as direct source-destination routing
along fixed paths.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hose traffic model; IP-over-optical; IP/MPLS;
oblivious routing; service overlays; two-phase routing;
valiant load balancing; variable traffic",
}
@Article{Kvalbein:2009:MRC,
author = "Amund Kvalbein and Audun Fosselie Hansen and Tarik
{\v{C}}i{\v{c}}ic and Stein Gjessing and Olav Lysne",
title = "Multiple routing configurations for fast {IP} network
recovery",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "473--486",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926507",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As the Internet takes an increasingly central role in
our communications infrastructure, the slow convergence
of routing protocols after a network failure becomes a
growing problem. To assure fast recovery from link and
node failures in IP networks, we present a new recovery
scheme called Multiple Routing Configurations (MRC).
Our proposed scheme guarantees recovery in all single
failure scenarios, using a single mechanism to handle
both link and node failures, and without knowing the
root cause of the failure. MRC is strictly
connectionless, and assumes only destination based
hop-by-hop forwarding. MRC is based on keeping
additional routing information in the routers, and
allows packet forwarding to continue on an alternative
output link immediately after the detection of a
failure. It can be implemented with only minor changes
to existing solutions. In this paper we present MRC,
and analyze its performance with respect to
scalability, backup path lengths, and load distribution
after a failure. We also show how an estimate of the
traffic demands in the network can be used to improve
the distribution of the recovered traffic, and thus
reduce the chances of congestion when MRC is used.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "availability; communication system fault tolerance;
communication system routing; computer network
reliability; protection",
}
@Article{Cohen:2009:TEA,
author = "Reuven Cohen and Gabi Nakibly",
title = "A traffic engineering approach for placement and
selection of network services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "487--500",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014652",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network services are provided by means of dedicated
service gateways, through which traffic flows are
directed. Existing work on service gateway placement
has been primarily focused on minimizing the length of
the routes through these gateways. Only limited
attention has been paid to the effect these routes have
on overall network performance. We propose a novel
approach for the service placement problem, which takes
into account traffic engineering considerations. Rather
than trying to minimize the length of the traffic flow
routes, we take advantage of these routes in order to
enhance the overall network performance. We divide the
problem into two subproblems: finding the best location
for each service gateway, and selecting the best
service gateway for each flow. We propose efficient
algorithms for both problems and study their
performance. Our main contribution is showing that
placement and selection of network services can be used
as effective tools for traffic engineering.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "load balancing; network services; routing; traffic
engineering",
}
@Article{Goodell:2009:DSP,
author = "Geoffrey Goodell and Mema Roussopoulos and Scott
Bradner",
title = "A directory service for perspective access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "501--514",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2016389",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network fragmentation occurs when the accessibility of
a network-based resource to an observer is a function
of how the observer is connected to the network. In the
context of the Internet, network fragmentation is well
known and occurs in many situations, including an
increasing preponderance of network address
translation, firewalls, and virtual private networks.
Recently, however, new threats to Internet consistency
have received media attention. Alternative namespaces
have emerged as the result of formal objections to the
process by which Internet names and addresses are
provisioned. In addition, various governments and
service providers around the world have deployed
network technology that (accidentally or intentionally)
restricts access to certain Internet content. Combined
with the aforementioned sources of fragmentation, these
new concerns provide ample motivation for a network
that allows users the ability to specify not only the
network location of Internet resources they want to
view but also the perspectives from which they want to
view them. Our vision of a perspective access network
(PAN) is a peer-to-peer overlay network that
incorporates routing and directory services that allow
network perspective-sharing and nonhierarchical
organization of the Internet. In this paper, we present
the design, implementation, and evaluation of a
directory service for such networks. We demonstrate its
feasibility and efficacy using measurements from a test
deployment on PlanetLab.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network neutrality; overlay networks; peer-to-peer",
}
@Article{Kyasanur:2009:CMW,
author = "Pradeep Kyasanur and Nitin H. Vaidya",
title = "Capacity of multichannel wireless networks under the
protocol model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "515--527",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926504",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the capacity of $n$ a node static
wireless network with $c$ channels and $m$ radio
interfaces per node under the protocol model of
interference. In their seminal work, Gupta and Kumar
have determined the capacity of a single channel
network $ (c = 1, m = 1) $. Their results are also
applicable to multichannel networks provided each node
has one interface per channel $ (m = c) $. However, in
practice, it is often infeasible to equip each node
with one interface per channel. Motivated by this
observation, we establish the capacity of general
multichannel networks $ (m \leq c) $. Equipping each
node with fewer interfaces than channels in general
reduces network capacity. However, we show that one
important exception is a random network with up to {$
O(\log n) $} channels, where there is no capacity
degradation even if each node has only one interface.
Our initial analysis assumes that the interfaces are
capable of switching channels instantaneously, but we
later extend our analysis to account for interface
switching delays seen in practice. Furthermore, some
multichannel protocols proposed so far rarely require
interfaces to switch, and therefore, we briefly study
the capacity with fixed interfaces as well.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multihop wireless networks; multiple channels;
multiple radios; network capacity",
}
@Article{Raman:2009:FLA,
author = "Bhaskaran Raman and Kameswari Chebrolu and Dattatraya
Gokhale and Sayandeep Sen",
title = "On the feasibility of the link abstraction in wireless
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "528--541",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2013706",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Outdoor community mesh networks based on IEEE 802.11
have seen tremendous growth in the recent past. The
current understanding is that wireless link performance
in these settings is inherently unpredictable, due to
multipath delay spread. Consequently, researchers have
focused on developing intelligent routing techniques to
achieve the best possible performance. In this paper,
we are specifically interested in mesh networks in
rural locations. We first present detailed measurements
to show that the PHY layer in these settings is indeed
stable and predictable. There is a strong correlation
between the error rate and the received signal
strength. We show that interference, and not multipath
fading, is the primary cause of unpredictable
performance. This is in sharp contrast with current
widespread knowledge from prior studies. Furthermore,
we corroborate our view with a fresh analysis of data
presented in these prior studies. While our initial
measurements focus on 802.11b, we then use two
different PHY technologies as well, operating in the
2.4-GHz ISM band: 802.11g and 802.15.4. These show
similar results too. Based on our results, we argue
that outdoor rural mesh networks can indeed be built
with the link abstraction being valid. This has several
design implications, including at the MAC and routing
layers, and opens up a fresh perspective on a wide
range of technical issues in this domain.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IEEE 802.11; IEEE 802.15.4; interference; link
abstraction; link-level measurements; rural networks;
WiFi; wireless mesh networks",
}
@Article{Cheng:2009:ORR,
author = "Bow-Nan Cheng and Murat Yuksel and Shivkumar
Kalyanaraman",
title = "Orthogonal rendezvous routing protocol for wireless
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "542--555",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926511",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Routing in multi-hop wireless networks involves the
indirection from a persistent name (or ID) to a
locator. Concepts such as coordinate space embedding
help reduce the number and dynamism complexity of
bindings and state needed for this indirection. Routing
protocols which do not use such concepts often tend to
flood packets during route discovery or dissemination,
and hence have limited scalability. In this paper, we
introduce Orthogonal Rendezvous Routing Protocol (ORRP)
for meshed wireless networks. ORRP is a
lightweight-but-scalable routing protocol utilizing
directional communications (such as directional
antennas or free-space-optical transceivers) to relax
information requirements such as coordinate space
embedding and node localization. The ORRP source and
ORRP destination send route discovery and route
dissemination packets respectively in locally-chosen
orthogonal directions. Connectivity happens when these
paths intersect (i.e., rendezvous). We show that ORRP
achieves connectivity with high probability even in
sparse networks with voids. ORRP scales well without
imposing DHT-like graph structures (eg: trees, rings,
torus etc). The total state information required is $
O(N^{3 / 2}) $ for N-node networks, and the state is
uniformly distributed. ORRP does not resort to flooding
either in route discovery or dissemination. The price
paid by ORRP is suboptimality in terms of path stretch
compared to the shortest path; however we characterize
the average penalty and find that it is not severe.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "directional antennas; free-space-optics; wireless
mesh; wireless routing protocol",
}
@Article{Rasti:2009:PEG,
author = "Mehdi Rasti and Ahmad R. Sharafat and Babak Seyfe",
title = "{Pareto}-efficient and goal-driven power control in
wireless networks: a game-theoretic approach with a
novel pricing scheme",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "556--569",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014655",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A Pareto-efficient, goal-driven, and distributed power
control scheme for wireless networks is presented. We
use a non-cooperative game-theoretic approach to
propose a novel pricing scheme that is linearly
proportional to the signal-to-interference ratio (SIR)
and analytically show that with a proper choice of
prices (proportionality constants), the outcome of the
noncooperative power control game is a unique and
Pareto-efficient Nash equilibrium (NE). This can be
utilized for constrained-power control to satisfy
specific goals (such as fairness, aggregate throughput
optimization, or trading off between these two goals).
For each one of the above goals, the dynamic price for
each user is also analytically obtained. In a
centralized (base station) price setting, users should
inform the base station of their path gains and their
maximum transmit-powers. In a distributed price
setting, for each goal, an algorithm for users to
update their transmit-powers is also presented that
converges to a unique fixed-point in which the
corresponding goal is satisfied. Simulation results
confirm our analytical developments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed and goal-driven power control; game
theory; Pareto efficiency; wireless networks",
}
@Article{Cohen:2009:OWS,
author = "Reuven Cohen and Boris Kapchits",
title = "An optimal wake-up scheduling algorithm for minimizing
energy consumption while limiting maximum delay in a
mesh sensor network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "570--581",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014656",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents an algorithm for maximizing the
lifetime of a sensor network while guaranteeing an
upper bound on the end-to-end delay. We prove that the
proposed algorithm is optimal and requires simple
computing operations that can be implemented by simple
devices. To the best of our knowledge, this is the
first paper to propose a sensor wake-up frequency that
depends on the sensor's location in the routing paths.
Using simulations, we show that the proposed algorithm
significantly increases the lifetime of the network
while guaranteeing a maximum on the end-to-end delay.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "scheduling in wireless networks; sensor networks",
}
@Article{Shpungin:2009:LEF,
author = "Hanan Shpungin and Michael Segal",
title = "Low-energy fault-tolerant bounded-hop broadcast in
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "582--590",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014653",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies asymmetric power assignments in
wireless ad hoc networks. The temporary, unfixed
physical topology of wireless ad hoc networks is
determined by the distribution of the wireless nodes as
well as the transmission power (range) assignment of
each node. We consider the problem of bounded-hop
broadcast under $k$-fault resilience criterion for
linear and planar layout of nodes. The topology that
results from our power assignment allows a broadcast
operation from a wireless node $r$ to any other node in
at most $h$ hops and is $k$-fault resistant. We develop
simple approximation algorithms for the two cases and
obtain the following approximation ratios: linear
case-- $ O(k)$; planar case--we first prove a factor of
$ O(k^3)$, which is later decreased to $ O(k^2)$ by a
finer analysis. Finally, we show a trivial power
assignment with a cost $ O(h)$ times the optimum. To
the best of our knowledge, these are the first
nontrivial results for this problem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation methods; fault tolerance; minimum-energy
control; radio broadcasting; wireless networks",
}
@Article{Li:2009:AFR,
author = "Tianji Li and Qiang Ni and David Malone and Douglas
Leith and Yang Xiao and Thierry Turletti",
title = "Aggregation with fragment retransmission for very
high-speed {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "591--604",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014654",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In upcoming very high-speed wireless LANs (WLANs), the
physical (PHY) layer rate may reach 600 Mbps. To
achieve high efficiency at the medium access control
(MAC) layer, we identify fundamental properties that
must be satisfied by any CSMA-/CA-based MAC layers and
develop a novel scheme called aggregation with fragment
retransmission (AFR) that exhibits these properties. In
the AFR scheme, multiple packets are aggregated into
and transmitted in a single large frame. If errors
happen during the transmission, only the corrupted
fragments of the large frame are retransmitted. An
analytic model is developed to evaluate the throughput
and delay performance of AFR over noisy channels and to
compare AFR with similar schemes in the literature.
Optimal frame and fragment sizes are calculated using
this model. Transmission delays are minimized by using
a zero-waiting mechanism where frames are transmitted
immediately once the MAC wins a transmission
opportunity. We prove that zero-waiting can achieve
maximum throughput. As a complement to the theoretical
analysis, we investigate the impact of AFR on the
performance of realistic application traffic with
diverse requirements by simulations. We have
implemented the AFR scheme in the {\em NS-2\/}
simulator and present detailed results for TCP, VoIP,
and HDTV traffic.\par
The AFR scheme described was developed as part of the
IEEE 802.11n working group work. The analysis presented
here is general enough to be extended to proposed
schemes in the upcoming 802.11n standard. Trends
indicated in this paper should extend to any
well-designed aggregation schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IEEE 802.11; IEEE 802.11n; medium access control
(MAC); wireless LAN (WLAN)",
}
@Article{Cardenas:2009:EDA,
author = "Alvaro A. C{\'a}rdenas and Svetlana Radosavac and John
S. Baras",
title = "Evaluation of detection algorithms for {MAC} layer
misbehavior: theory and experiments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "605--617",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926510",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We revisit the problem of detecting greedy behavior in
the IEEE 802.11 MAC protocol by evaluating the
performance of two previously proposed schemes: DOMINO
and the Sequential Probability Ratio Test (SPRT). Our
evaluation is carried out in four steps. We first
derive a new analytical formulation of the SPRT that
considers access to the wireless medium in discrete
time slots. Then, we introduce an analytical model for
DOMINO. As a third step, we evaluate the theoretical
performance of SPRT and DOMINO with newly introduced
metrics that take into account the repeated nature of
the tests. This theoretical comparison provides two
major insights into the problem: it confirms the
optimality of SPRT, and motivates us to define yet
another test: a nonparametric CUSUM statistic that
shares the same intuition as DOMINO but gives better
performance. We finalize the paper with experimental
results, confirming the correctness of our theoretical
analysis and validating the introduction of the new
nonparametric CUSUM statistic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "CUSUM; DOMINO; IEEE 802.11 MAC; intrusion detection;
misbehavior; SPRT",
}
@Article{Chen:2009:NQD,
author = "Mingyu Chen and Xingzhe Fan and Manohar N. Murthi and
T. Dilusha Wickramarathna and Kamal Premaratne",
title = "Normalized queueing delay: congestion control jointly
utilizing delay and marking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "618--631",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926508",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Depending upon the type of feedback that is primarily
used as a congestion measure, congestion control
methods can be generally classified into two
categories: marking/loss-based or delay-based. While
both marking and queueing delay provide information
about the congestion state of a network, they have been
largely treated with separate control strategies. In
this paper, we propose the notion of the normalized
queueing delay, which serves as a congestion measure by
combining both delay and marking information. Utilizing
normalized queueing delay (NQD), we propose an approach
to congestion control that allows a source to scale its
rate dynamically to prevailing network conditions
through the use of a time-variant set-point. In ns-2
simulation studies, an NQD-enabled FAST TCP
demonstrates a significant link utilization improvement
over FAST TCP under certain conditions. In addition, we
propose another NQD-based controller D + M TCP
(Delay+Marking TCP) that achieves quick convergence to
fair and stable rates with nearly full link
utilization. Therefore, NQD is a suitable candidate as
a congestion measure for practical congestion
control.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; explicit congestion notification
(ECN); high-speed networks; TCP; transport protocols;
window flow control",
}
@Article{Wu:2009:MIS,
author = "Bin Wu and Kwan L. Yeung and Mounir Hamdi and Xin Li",
title = "Minimizing internal speedup for performance guaranteed
switches with optical fabrics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "632--645",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.926501",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider traffic scheduling in an $ N \times N $
packet switch with an optical switch fabric, where the
fabric requires a reconfiguration overhead to change
its switch configurations. To provide 100\% throughput
with bounded packet delay, a speedup in the switch
fabric is necessary to compensate for both the
reconfiguration overhead and the inefficiency of the
scheduling algorithm. In order to reduce the
implementation cost of the switch, we aim at minimizing
the required speedup for a given packet delay bound.
Conventional Birkhoff-von Neumann traffic matrix
decomposition requires $ N^2 - 2 N + 2 $ configurations
in the schedule, which lead to a very large packet
delay bound. The existing DOUBLE algorithm requires a
fixed number of only $ 2 N $ configurations, but it
cannot adjust its schedule according to different
switch parameters. In this paper, we first design a
generic approach to decompose a traffic matrix into an
arbitrary number of $ N s (N^2 - 2 N + 2) > N s > N $
configurations. Then, by taking the reconfiguration
overhead into account, we formulate a speedup function.
Minimizing the speedup function results in an efficient
scheduling algorithm ADAPT. We further observe that the
algorithmic efficiency of ADAPT can be improved by
better utilizing the switch bandwidth. This leads to a
more efficient algorithm SRF (Scheduling Residue
First). ADAPT and SRF can automatically adjust the
number of configurations in a schedule according to
different switch parameters. We show that both
algorithms outperform the existing DOUBLE algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical switch fabric; performance guaranteed
switching; reconfiguration overhead; scheduling;
speedup",
}
@Article{Andrews:2009:CWA,
author = "Matthew Andrews and Lisa Zhang",
title = "Complexity of wavelength assignment in optical network
optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "646--657",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2014226",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the complexity of a set of design problems
for optical networks. Under wavelength division
multiplexing (WDM) technology, demands sharing a common
fiber are transported on distinct wavelengths. Multiple
fibers may be deployed on a physical link.\par
Our basic goal is to design networks of minimum cost,
minimum congestion and maximum throughput. This
translates to three variants in the design objectives:
(1) MIN-SUMFIBER: minimizing the total cost of fibers
deployed to carry all demands; (2) MIN-MAXFIBER:
minimizing the maximum number of fibers per link to
carry all demands; and (3) MAX-THROUGHPUT: maximizing
the carried demands using a given set of fibers.\par
We also have two variants in the design constraints:
(1) CHOOSEROUTE: Here we need to specify both a routing
path and a wavelength for each demand; (2) FIXEDROUTE:
Here we are given demand routes and we need to specify
wavelengths only. The FIXEDROUTE variant allows us to
study wavelength assignment in isolation.\par
Combining these variants, we have six design problems.
Previously we have shown that general instances of the
problems MIN-SUMFIBER-CHOOSEROUTE and
MIN-MAXFIBER-FIXEDROUTE have no constant-approximation
algorithms. In this paper, we prove that a similar
statement holds for all four other problems. Our main
result shows that MIN-SUMFIBER-FIXEDROUTE cannot be
approximated within any constant factor unless NP-hard
problems have efficient algorithms. This, together with
the previous hardness result of
MIN-MAXFIBER-FIXEDROUTE, shows that the problem of
wavelength assignment is inherently hard by
itself.\par
We also study the complexity of problems that arise
when multiple demands can be time-multiplexed onto a
single wavelength (as in time-domain wavelength
interleaved networking (TWIN) networks) and when
wavelength converters can be placed along the path of a
demand.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; hardness of approximation;
optical networking; routing and wavelength assignment",
}
@Article{Kuppuswamy:2009:AAE,
author = "Kalyan Kuppuswamy and Daniel C. Lee",
title = "An analytic approach to efficiently computing call
blocking probabilities for multiclass {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "658--670",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001465",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "For all-optical WDM networks that provide multiple
classes of service, we present a methodology for
computing approximate blocking probabilities of dynamic
routing and wavelength assignment policies. Each
service class is characterized by its resource
requirements (number of wavelengths needed for a call)
and expected call holding time (or subscription
period). Under the wavelength continuity constraint on
lightpaths and loss network formulation, we develop
fixed-point approximation algorithms that compute
approximate blocking probabilities of all classes. We
then apply them to the random wavelength assignment
policy for the following wavelength routing policies:
Fixed Routing (FR), Least Loaded Routing (LLR) and
Fixed Alternate Routing (FAR). Simulation results on
different network topologies and routing policies
considered demonstrate that the simulation results
match closely with the blocking probabilities computed
by our methods for different multiclass call traffic
loading scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "blocking probability; knapsack approximation; loss
networks; multiclass fixed-point approximation; optical
WDM networks; performance evaluation",
}
@Article{Eshoul:2009:SAU,
author = "Abdelhamid E. Eshoul and Hussein T. Mouftah",
title = "Survivability approaches using $p$-cycles in {WDM}
mesh networks under static traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "2",
pages = "671--683",
month = apr,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001467",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jun 6 20:21:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The major challenge in survivable mesh networks is the
design of resource allocation algorithms that allocate
network resources efficiently while at the same time
are able to recover from a failure quickly. This issue
is particularly more challenging in optical networks
operating under wavelength continuity constraint, where
the same wavelength must be assigned on all links in
the selected path. This paper proposes two approaches
to solve the survivable routing and wavelength
assignment RWA problem under static traffic using
$p$-cycles techniques. The first is a nonjointly
approach, where the minimum backup capacity against any
single span failure is set up first. Then the working
lightpaths problem is solved by first generating the
most likely candidate routes for each source and
destination {\em s-d\/} pair. These candidate routes
are then used to formulate the overall problem as an
ILP problem. Alternatively, for a more optimum
solution, the problem can be solved jointly, where the
working routes and the backup $p$-cycles are jointly
formulated as an ILP problem to minimize the total
capacity required. Furthermore, only a subset of high
merit cycles that are most likely able to protect the
proposed working paths is used in the formulation.
Reducing the number of candidate cycles in the final
formulation plays a significant role in reducing the
number of variables required to solve the problem. To
reduce the number of candidate cycles in the
formulation, a new metric called Route Sensitive
Efficiency (RSE)--has been introduced to pre-select a
reduced number of high merit cycle candidates. The RSE
ranks each cycle based on the number of links of the
primary candidate routes that it can protect. The two
approaches were tested and their performances were
compared.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "$p$-cycles; optical networks; routing and wave-length
assignment; survivability",
}
@Article{Paschalidis:2009:STN,
author = "Ioannis Ch. Paschalidis and Georgios Smaragdakis",
title = "Spatio-temporal network anomaly detection by assessing
deviations of empirical measures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "685--697",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001468",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We introduce an Internet traffic anomaly detection
mechanism based on large deviations results for
empirical measures. Using past traffic traces we
characterize network traffic during various time-of-day
intervals, assuming that it is anomaly-free. We present
two different approaches to characterize traffic: (i) a
model-free approach based on the method of types and
Sanov's theorem, and (ii) a model-based approach
modeling traffic using a Markov modulated process.
Using these characterizations as a reference we
continuously monitor traffic and employ large
deviations and decision theory results to 'compare' the
empirical measure of the monitored traffic with the
corresponding reference characterization, thus,
identifying traffic anomalies in real-time. Our
experimental results show that applying our methodology
(even short-lived) anomalies are identified within a
small number of observations. Throughout, we compare
the two approaches presenting their advantages and
disadvantages to identify and classify temporal network
anomalies. We also demonstrate how our framework can be
used to monitor traffic from multiple network elements
in order to identify both spatial and temporal
anomalies. We validate our techniques by analyzing real
traffic traces with time-stamped anomalies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "large deviations; Markov processes; method of types;
network security; statistical anomaly detection",
}
@Article{Hu:2009:EBA,
author = "Yan Hu and Dah-Ming Chiu and John C. S. Lui",
title = "Entropy based adaptive flow aggregation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "698--711",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2002560",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet traffic flow measurement is vitally important
for network management, accounting and performance
studies. Cisco's NetFlow is a widely deployed flow
measurement solution that uses a configurable static
sampling rate to control processor and memory usage on
the router and the amount of reporting flow records
generated. But during flooding attacks the memory and
network bandwidth consumed by flow records can increase
beyond what is available. Currently available
countermeasures have their own problems: (1) reject new
flows when the cache is full--some legitimate new flows
will not be counted; (2) export not-terminated flows to
make room for new ones--this will exhaust the export
bandwidth; and (3) adapt the sampling rate to traffic
rate--this will reduce the overall accuracy of
accounting, including legitimate flows. In this paper,
we propose an entropy based adaptive flow aggregation
algorithm. Relying on information-theoretic techniques,
the algorithm efficiently identifies the clusters of
attack flows in real time and aggregates those large
number of short attack flows into a few metaflows.
Compared to currently available solutions, our solution
not only alleviates the problem in memory and export
bandwidth, but also significantly improves the accuracy
of legitimate flows. Finally, we evaluate our system
using both synthetic trace file and real trace files
from the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data summarization; information theory; network
monitoring; traffic measurement",
}
@Article{Vishwanath:2009:SRR,
author = "Kashi Venkatesh Vishwanath and Amin Vahdat",
title = "{Swing}: realistic and responsive network traffic
generation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "712--725",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020830",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents Swing, a closed-loop,
network-responsive traffic generator that accurately
captures the packet interactions of a range of
applications using a simple structural model. Starting
from observed traffic at a single point in the network,
Swing automatically extracts distributions for user,
application, and network behavior. It then generates
live traffic corresponding to the underlying models in
a network emulation environment running commodity
network protocol stacks. We find that the generated
traffic is statistically similar to the original
traffic. Furthermore, to the best of our knowledge, we
are the first to reproduce burstiness in traffic across
a range of time-scales using a model applicable to a
variety of network settings. An initial sensitivity
analysis reveals the importance of our individual model
parameters to accurately reproduce such burstiness.
Finally, we explore Swing's ability to vary user
characteristics, application properties, and wide-area
network conditions to project traffic characteristics
into alternate scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "burstiness; modeling; structural model; traffic
generator; wavelet scaling",
}
@Article{Wang:2009:RBE,
author = "Xiaoming Wang and Zhongmei Yao and Dmitri Loguinov",
title = "Residual-based estimation of peer and link lifetimes
in {P2P} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "726--739",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001727",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Existing methods of measuring lifetimes in P2P systems
usually rely on the so-called Create-Based Method
(CBM), which divides a given observation window into
two halves and samples users 'created' in the first
half every $ \Delta $ time units until they die or the
observation period ends. Despite its frequent use, this
approach has no rigorous accuracy or overhead analysis
in the literature. To shed more light on its
performance, we first derive a model for CBM and show
that small window size or large $ \Delta $ may lead to
highly inaccurate lifetime distributions. We then show
that create-based sampling exhibits an inherent
tradeoff between overhead and accuracy, which does not
allow any fundamental improvement to the method.
Instead, we propose a completely different approach for
sampling user dynamics that keeps track of only
residual lifetimes of peers and uses a simple
renewal-process model to recover the actual lifetimes
from the observed residuals. Our analysis indicates
that for reasonably large systems, the proposed method
can reduce bandwidth consumption by several orders of
magnitude compared to prior approaches while
simultaneously achieving higher accuracy. We finish the
paper by implementing a two-tier Gnutella network
crawler equipped with the proposed sampling method and
obtain the distribution of ultrapeer lifetimes in a
network of 6.4 million users and 60 million links. Our
experimental results show that ultrapeer lifetimes are
Pareto with shape $ \alpha \approx 1.1 $; however, link
lifetimes exhibit much lighter tails with $ \alpha
\approx 1.8 $.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Gnutella networks; lifetime estimation; peer-to-peer;
residual sampling",
}
@Article{Wang:2009:UTI,
author = "Feng Wang and Jian Qiu and Lixin Gao and Jia Wang",
title = "On understanding transient interdomain routing
failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "740--751",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001952",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The convergence time of the interdomain routing
protocol, BGP, can last as long as 30 minutes. Yet,
routing behavior during BGP route convergence is poorly
understood. During route convergence, an end-to-end
Internet path can experience a transient loss of
reachability. We refer to this loss of reachability as
transient routing failure. Transient routing failures
can lead to packet losses, and prolonged packet loss
bursts can make the performance of applications such as
Voice-over-IP and interactive games unacceptable. In
this paper, we study how routing failures can occur in
the Internet. With the aid of a formal model that
captures transient failures of the interdomain routing
protocol, we derive the sufficient conditions that
transient routing failures could occur. We further
study transient routing failures in typical BGP systems
where commonly used routing policies are applied.
Network administrators can apply our analysis to
improve their network performance and stability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BGP; border gateway protocol; interdomain routing;
transient routing failure",
}
@Article{Kodialam:2009:LRR,
author = "Murali Kodialam and T. V. Lakshman and Sudipta
Sengupta",
title = "Locally restorable routing of highly variable
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "752--763",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007432",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Two-phase routing, where traffic is first distributed
to intermediate nodes before being routed to the final
destination, has been recently proposed for handling
widely fluctuating traffic without the need to adapt
network routing to changing traffic. Preconfiguring the
network in a traffic independent manner using two-phase
routing simplifies network operation
considerably.\par
In this paper, we extend this routing scheme by
providing resiliency against link failures through fast
restoration along link backup detours. We view this as
important progress towards adding carrier-class
reliability to the robustness of the scheme so as to
facilitate its future deployment in Internet Service
Provider (ISP) networks. On the theoretical side, the
main contribution of the paper is the development of
linear programming based and fast combinatorial
algorithms for two-phase routing with link restoration
so as to minimize the maximum utilization of any link
in the network, or equivalently, maximize the
throughput. The algorithms developed are Fully
Polynomial Time Approximation Schemes (FPTAS)--for any
given $ \epsilon > 0 $, an FPTAS guarantees a solution
that is within a $ (1 + \epsilon)$-factor of the
optimum and runs in time polynomial in the input size
and $ 1 / \epsilon $. To the best of our knowledge,
this is the first work in the literature that considers
making the scheme resilient to link failures through
preprovisioned fast restoration mechanisms. We evaluate
the performance of link restoration (in terms of
throughput) and compare it with that of unprotected
routing. For our experiments, we use actual ISP network
topologies collected for the Rocketfuel project and
three research network topologies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "fast restoration; hose traffic model; link
restoration; oblivious routing; two-phase routing;
valiant load balancing; variable traffic",
}
@Article{Raghavan:2009:SPC,
author = "Barath Raghavan and Patric Verkaik and Alex C.
Snoeren",
title = "Secure and policy-compliant source routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "764--777",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007949",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In today's Internet, inter-domain route control
remains elusive; nevertheless, such control could
improve the performance, reliability, and utility of
the network for end users and ISPs alike. While
researchers have proposed a number of source routing
techniques to combat this limitation, there has thus
far been no way for independent ASes to ensure that
such traffic does not circumvent local traffic
policies, nor to accurately determine the correct party
to charge for forwarding the traffic.\par
We present Platypus, an authenticated source routing
system built around the concept of network
capabilities, which allow for accountable, fine-grained
path selection by cryptographically attesting to policy
compliance at each hop along a source route.
Capabilities can be composed to construct routes
through multiple ASes and can be delegated to third
parties. Platypus caters to the needs of both end users
and ISPs: users gain the ability to pool their
resources and select routes other than the default,
while ISPs maintain control over where, when, and whose
packets traverse their networks. We describe the design
and implementation of an extensive Platypus policy
framework that can be used to address several issues in
wide-area routing at both the edge and the core, and
evaluate its performance and security. Our results show
that incremental deployment of Platypus can achieve
immediate gains.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "authentication; capabilities; overlay networks; source
routing",
}
@Article{Chu:2009:OLW,
author = "Jian Chu and Chin-Tau Lea",
title = "Optimal link weights for {IP}-based networks
supporting hose-model {VPNs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "778--788",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006219",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "From traffic engineering point of view, hose-model
VPNs are much easier to use for customers than
pipe-model VPNs. In this paper we explore the optimal
weight setting to support hose-model VPN traffic in an
IP-based hop-by-hop routing network. We try to answer
the following questions: (1) What is the maximum amount
of hose-model VPN traffic with bandwidth guarantees
that can be admitted to an IP-based hop-by-hop routing
network (as opposed to an MPLS-based network), and (2)
what is the optimal link weight setting that can
achieve that? We first present a mixed-integer
programming formulation to compute the optimal link
weights that can maximize the ingress and egress VPN
traffic admissible to a hop-by-hop routing network. We
also present a heuristic algorithm for solving the link
weight searching problem for large networks. We show
simulation results to demonstrate the effectiveness of
the search algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hose model; IP-based VPN; link weight optimization",
}
@Article{Hohn:2009:CRC,
author = "Nicolas Hohn and Konstantina Papagiannaki and Darryl
Veitch",
title = "Capturing router congestion and delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "789--802",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927258",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Using a unique monitoring experiment, we capture all
packets crossing a (lightly utilized) operational
access router from a Tier-1 provider, and use them to
provide a detailed examination of router congestion and
packet delays. The complete capture enables not just
statistics as seen from outside the router, but also an
accurate physical router model to be identified. This
enables a comprehensive examination of congestion and
delay from three points of view: the understanding of
origins, measurement, and reporting. Our study defines
new methodologies and metrics. In particular, the
traffic reporting enables a rich description of the
diversity of microcongestion behavior, without model
assumptions, and at achievable computational cost.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "busy period; congestion; delay; modelling; router;
utilization",
}
@Article{Lu:2009:SRS,
author = "Wencheng Lu and Sartaj Sahni",
title = "Succinct representation of static packet classifiers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "803--816",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2010594",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We develop algorithms for the compact representation
of the 1- and 2-dimensional tries that are used for
Internet packet classification. Our compact
representations are experimentally compared with
competing compact representations for 1- and
multi-dimensional packet classifiers and found to
simultaneously reduce the number of memory accesses
required for a lookup as well as the memory required to
store the classifier.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic programming; one- and two-dimensional tries;
packet classification; succinct representation",
}
@Article{Li:2009:RAS,
author = "Jun Li and Yiqiang Q. Zhao",
title = "Resequencing analysis of stop-and-wait {ARQ} for
parallel multichannel communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "817--830",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020820",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider a multichannel data
communication system in which the stop-and-wait
automatic-repeat-request protocol for parallel channels
with an in-sequence delivery guarantee (MSW-ARQ-inS) is
used for error control. We evaluate the resequencing
delay and the resequencing buffer occupancy,
respectively. Under the assumption that all channels
have the same transmission rate but possibly different
time-invariant error rates, we derive the probability
generating function of the resequencing buffer
occupancy and the probability mass function of the
resequencing delay. Then, by assuming the
Gilbert--Elliott model for each channel, we extend our
analysis to time-varying channels. Through examples, we
compute the probability mass functions of the
resequencing buffer occupancy and the resequencing
delay for time-invariant channels. From numerical and
simulation results, we analyze trends in the mean
resequencing buffer occupancy and the mean resequencing
delay as functions of system parameters. We expect that
the modeling technique and analytical approach used in
this paper can be applied to the performance evaluation
of other ARQ protocols (e.g., the selective-repeat ARQ)
over multiple time-varying channels.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "in-sequence delivery; modeling and performance;
multichannel data communications; resequencing buffer
occupancy; resequencing delay; SW-ARQ",
}
@Article{Borrel:2009:SUS,
author = "Vincent Borrel and Franck Legendre and Marcelo {Dias
De Amorim} and Serge Fdida",
title = "{SIMPS}: using sociology for personal mobility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "831--842",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2003337",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Assessing mobility in a thorough fashion is a crucial
step toward more efficient mobile network design.
Recent research on mobility has focused on two main
points: analyzing models and studying their impact on
data transport. These works investigate the
consequences of mobility. In this paper, instead, we
focus on the causes of mobility. Starting from
established research in sociology, we propose SIMPS, a
mobility model of human crowds with pedestrian motion.
This model defines a process called sociostation,
rendered by two complimentary behaviors, namely
socialize and isolate, that regulate an individual with
regard to her/his own sociability level. SIMPS leads to
results that agree with scaling laws observed both in
small-scale and large-scale human motion. Although our
model defines only two simple individual behaviors, we
observe many emerging collective behaviors (group
formation/splitting, path formation, and evolution).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobility modeling; self-organized networks; social
networks; sociology",
}
@Article{Ganeriwal:2009:ECU,
author = "Saurabh Ganeriwal and Ilias Tsigkogiannis and Hohyun
Shim and Vlassios Tsiatsis and Mani B. Srivastava and
Deepak Ganesan",
title = "Estimating clock uncertainty for efficient
duty-cycling in sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "843--856",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001953",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Radio duty cycling has received significant attention
in sensor networking literature, particularly in the
form of protocols for medium access control and
topology management. While many protocols have claimed
to achieve significant duty-cycling benefits in theory
and simulation, these benefits have often not
translated into practice. The dominant factor that
prevents the optimal usage of the radio in real
deployment settings is time uncertainty between sensor
nodes which results in overhead in the form of long
packet preambles, guard bands, and excessive control
packets for synchronization. This paper proposes an
uncertainty-driven approach to duty-cycling, where a
model of long-term clock drift is used to minimize the
duty-cycling overhead. First, we use long-term
empirical measurements to evaluate and analyze in-depth
the interplay between three key parameters that
influence long-term synchronization: synchronization
rate, history of past synchronization beacons, and the
estimation scheme. Second, we use this
measurement-based study to design a rate-adaptive,
energy-efficient long-term time synchronization
algorithm that can adapt to changing clock drift and
environmental conditions, while achieving
application-specific precision with very high
probability. Finally, we integrate our
uncertainty-driven time synchronization scheme with the
BMAC medium access control protocol, and demonstrate
one to two orders of magnitude reduction in
transmission energy consumption with negligible impact
on packet loss rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "medium access control; time synchronization; wireless
sensor networks",
}
@Article{Kwon:2009:ASP,
author = "Sungoh Kwon and Ness B. Shroff",
title = "Analysis of shortest path routing for large multi-hop
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "857--869",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2002222",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we analyze the impact of straight line
routing in large homogeneous multi-hop wireless
networks. We estimate the nodal load, which is defined
as the number of packets served at a node, induced by
straight line routing. For a given total offered load
on the network, our analysis shows that the nodal load
at each node is a function of the node's Voronoi cell,
the node's location in the network, and the traffic
pattern specified by the source and destination
randomness and straight line routing. In the asymptotic
regime, we show that each node's probability that the
node serves a packet arriving to the network approaches
the products of half the length of the Voronoi cell
perimeter and the load density function that a packet
goes through the node's location. The density function
depends on the traffic pattern generated by straight
line routing, and determines where the hot spot is
created in the network. Hence, contrary to conventional
wisdom, straight line routing can balance the load over
the network, depending on the traffic patterns.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "analysis; geometric probability; multi-hop wireless
network; routing; simulations",
}
@Article{Djukic:2009:DAL,
author = "Petar Djukic and Shahrokh Valaee",
title = "Delay aware link scheduling for multi-hop {TDMA}
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "870--883",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2005219",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Time division multiple access (TDMA) based medium
access control (MAC) protocols can provide QoS with
guaranteed access to the wireless channel. However, in
multi-hop wireless networks, these protocols may
introduce scheduling delay if, on the same path, an
outbound link on a router is scheduled to transmit
before an inbound link on that router. The total
scheduling delay can be quite large since it
accumulates at every hop on a path. This paper presents
a method that finds conflict-free TDMA schedules with
minimum scheduling delay.\par
We show that the scheduling delay can be interpreted as
a cost, in terms of transmission order of the links,
collected over a cycle in the conflict graph. We use
this observation to formulate an optimization, which
finds a transmission order with the min-max delay
across a set of multiple paths. The min-max delay
optimization is NP-complete since the transmission
order of links is a vector of binary integer variables.
We devise an algorithm that finds the transmission
order with the minimum delay on overlay tree topologies
and use it with a modified Bellman-Ford algorithm, to
find minimum delay schedules in polynomial time. The
simulation results in 802.16 mesh networks confirm that
the proposed algorithm can find effective min-max delay
schedules.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "scheduling delay; stop-and-go queueing; TDMA
scheduling algorithms",
}
@Article{Cicconetti:2009:FBA,
author = "Claudio Cicconetti and Ian F. Akyildiz and Luciano
Lenzini",
title = "{FEBA}: a bandwidth allocation algorithm for service
differentiation in {IEEE 802.16} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "884--897",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2005221",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless mesh networks, the end-to-end throughput
of traffic flows depends on the path length, i.e., the
higher the number of hops, the lower becomes the
throughput. In this paper, a fair end-to-end bandwidth
allocation (FEBA) algorithm is introduced to solve this
problem. FEBA is implemented at the medium access
control (MAC) layer of single-radio, multiple channels
IEEE 802.16 mesh nodes, operated in a distributed
coordinated scheduling mode. FEBA negotiates bandwidth
among neighbors to assign a fair share proportional to
a specified weight to each end-to-end traffic flow.
This way traffic flows are served in a differentiated
manner, with higher priority traffic flows being
allocated more bandwidth on the average than the lower
priority traffic flows. In fact, a node requests/grants
bandwidth from/to its neighbors in a round-robin
fashion where the amount of service depends on both the
load on its different links and the priority of
currently active traffic flows. If multiple channels
are available, they are all shared evenly in order to
increase the network capacity due to frequency reuse.
The performance of FEBA is evaluated by extensive
simulations. It is shown that wireless resources are
shared fairly among best-effort traffic flows, while
multimedia streams are provided with a differentiated
service that enables quality of service.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access protocols; packet reservation multiaccess;
scheduling; wireless LAN",
}
@Article{Zafer:2009:CAE,
author = "Murtaza A. Zafer and Eytan Modiano",
title = "A calculus approach to energy-efficient data
transmission with quality-of-service constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "898--911",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020831",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Transmission rate adaptation in wireless devices
provides a unique opportunity to trade off data service
rate with energy consumption. In this paper, we study
optimal rate control to minimize transmission energy
expenditure subject to strict deadline or other
quality-of-service (QoS) constraints. Specifically, the
system consists of a wireless transmitter with
controllable transmission rate and with strict QoS
constraints on data transmission. The goal is to obtain
a rate-control policy that minimizes the total
transmission energy expenditure while ensuring that the
QoS constraints are met. Using a novel formulation
based on cumulative curves methodology, we obtain the
optimal transmission policy and show that it has a
simple and appealing graphical visualization. Utilizing
the optimal 'offline' results, we then develop an
online transmission policy for an arbitrary stream of
packet arrivals and deadline constraints, and show, via
simulations, that it is significantly more
energy-efficient than a simple head-of-line drain
policy. Finally, we generalize the optimal policy
results to the case of time-varying power-rate
functions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay; energy; network calculus; quality of service
(QoS); rate control; wireless",
}
@Article{Tan:2009:ERT,
author = "Chee Wei Tan and Daniel P. Palomar and Mung Chiang",
title = "Energy-robustness tradeoff in cellular network power
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "912--925",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2003336",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the seminal paper by Foschini and Miljanic in 1993,
a distributed power control algorithm was developed to
meet SIR targets with minimal powers in cellular
network uplinks. Since the SIR on an active link may
dip below the SIR target during the transient after a
new user enters the cell, Bambos et al. proposed an
active link protection algorithm to provide robustness,
at the expense of higher energy consumption. This paper
examines the tradeoff between energy and robustness. An
optimization problem is formulated where robustness is
captured in the constraint and the price of robustness
penalized in the objective function. A distributed
algorithm is developed to solve this problem. Local
convergence and optimality of equilibrium are proved
for the algorithm. The objective function modulates the
tradeoff between energy and robustness, and between
energy and speed of admission, as illustrated through a
series of numerical experiments. A parameterized family
of objective functions is constructed to control the
transient and equilibrium properties of robust
distributed power control.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed optimization; duality; power control;
wireless networks",
}
@Article{Choi:2009:RAO,
author = "Kae Won Choi and Wha Sook Jeon and Dong Geun Jeong",
title = "Resource allocation in {OFDMA} wireless communications
systems supporting multimedia services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "926--935",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001470",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We design a resource allocation algorithm for
down-link of orthogonal frequency division multiple
access (OFDMA) systems supporting real-time (RT) and
best-effort (BE) services simultaneously over a
time-varying wireless channel. The proposed algorithm
aims at maximizing system throughput while satisfying
quality of service (QoS) requirements of the RT and BE
services. We take two kinds of QoS requirements into
account. One is the required average transmission rate
for both RT and BE services. The other is the tolerable
average absolute deviation of transmission rate (AADTR)
just for the RT services, which is used to control the
fluctuation in transmission rates and to limit the RT
packet delay to a moderate level. We formulate the
optimization problem representing the resource
allocation under consideration and solve it by using
the dual optimization technique and the projection
stochastic subgradient method. Simulation results show
that the proposed algorithm well meets the QoS
requirements with the high throughput and outperforms
the modified largest weighted delay first (M-LWDF)
algorithm that supports similar QoS requirements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multimedia communications; orthogonal frequency
division multiple access (OFDMA); quality of service
(QoS); radio resource allocation; wireless network",
}
@Article{Ma:2009:AGS,
author = "Richard T. B. Ma and Vishal Misra and Dan Rubenstein",
title = "An analysis of generalized slotted-{Aloha} protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "936--949",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.925633",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Aloha and its slotted variation are commonly deployed
Medium Access Control (MAC) protocols in environments
where multiple transmitting devices compete for a
medium, yet may have difficulty sensing each other's
presence (the 'hidden terminal problem'). Competing
802.11 gateways, as well as most modern digital
cellular systems, like GSM, are examples. This paper
models and evaluates the throughput that can be
achieved in a system where nodes compete for bandwidth
using a generalized version of slotted-Aloha protocols.
The protocol is implemented as a two-state system,
where the probability that a node transmits in a given
slot depends on whether the node's prior transmission
attempt was successful. Using Markov Models, we
evaluate the channel utilization and fairness of this
class of protocols for a variety of node objectives,
including maximizing aggregate throughput of the
channel, each node selfishly maximizing its own
throughput, and attacker nodes attempting to jam the
channel. If all nodes are selfish and strategically
attempt to maximize their own throughput, a situation
similar to the traditional Prisoner's Dilemma arises.
Our results reveal that under heavy loads, a greedy
strategy reduces the utilization, and that attackers
cannot do much better than attacking during randomly
selected slots.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MAC protocols; Markovian decision; Prisoner's Dilemma;
short-term fairness; slotted-Aloha; Stackelberg game",
}
@Article{Li:2009:MCW,
author = "Xiang-Yang Li",
title = "Multicast capacity of wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "950--961",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927256",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Assume that $n$ wireless nodes are uniformly randomly
deployed in a square region with side-length $a$ and
all nodes have the uniform transmission range $r$ and
uniform interference range $ R > r$. We further assume
that each wireless node can transmit (or receive) at
$W$ bits/second over a common wireless channel. For
each node $ v_i$, we randomly and independently pick $
k 1$ points $ p_{i, j} (1 \leq j \leq k - 1)$ from the
square, and then multicast data to the nearest node for
each $ p_{i, j}$. We derive matching asymptotic upper
bounds and lower bounds on multicast capacity of random
wireless networks. Under protocol interference model,
when $ a^2 / r^2 = O (n / \log (n))$, we show that the
total multicast capacity is $ \Theta (\sqrt n / \log n
c (W / \sqrt k))$ when $ k = O(n / \log n)$; the total
multicast capacity is $ \Theta (W)$ when $ k = \Omega
(n / \log n)$. We also study the capacity of
group-multicast for wireless networks where for each
source node, we randomly select $ k - 1$ groups of
nodes as receivers and the nodes in each group are
within a constant hops from the group leader. The same
asymptotic upper bounds and lower bounds still hold. We
also extend our capacity bounds to $d$-dimensional
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadcast; capacity; multicast; optimization;
scheduling; unicast; VC-dimension; wireless ad hoc
networks",
}
@Article{Lai:2009:TBA,
author = "Yuan-Cheng Lai and Chih-Chung Lin",
title = "Two blocking algorithms on adaptive binary splitting:
single and pair resolutions for {RFID} tag
identification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "962--975",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2002558",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In radio frequency identification (RFID) systems, the
reader identifies tags through communication over a
shared wireless channel. When multiple tags transmit
their IDs simultaneously, their signals collide,
increasing the identification delay. Therefore, many
previous anti-collision algorithms, including an
adaptive query splitting algorithm (AQS) and an
adaptive binary splitting algorithm (ABS), focused on
solving this problem. This paper proposes two blocking
algorithms, a single resolution blocking ABS algorithm
(SRB) and a pair resolution blocking ABS algorithm
(PRB), based on ABS. SRB not only inherits the essence
of ABS which uses the information of recognized tags
obtained from the last process of tag identification,
but also adopts a blocking technique which prevents
recognized tags from being collided by unrecognized
tags. PRB further adopts a pair resolution technique
which couples recognized tags and thus only needs half
time for next identifying these recognized tags. We
formally analyze the performance of SRB and PRB.
Finally, the analytic and simulation results show that
SRB slightly outperforms ABS and PRB significantly
surpasses ABS.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anti-collision; blocking algorithm; RFID; tag
identification",
}
@Article{Ross:2009:PCS,
author = "Kevin Ross and Nicholas Bambos",
title = "Projective cone scheduling {(PCS)} algorithms for
packet switches of maximal throughput",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "976--989",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2002557",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the (generalized) packet switch scheduling
problem, where service configurations are dynamically
chosen in response to queue backlogs, so as to maximize
the throughput without any knowledge of the long term
traffic load. Service configurations and traffic traces
are arbitrary.\par
First, we identify a rich class of throughput-optimal
linear controls, which choose the service configuration
$S$ maximizing the projection $ \langle S, B X \rangle
$ when the backlog is $X$. The matrix $B$ is
arbitrarily fixed in the class of positive-definite,
symmetric matrices with negative or zero off-diagonal
elements. In contrast, positive off-diagonal elements
may drive the system unstable, even for subcritical
loads. The associated rich Euclidian geometry of
projective cones is explored (hence the name projective
cone scheduling PCS). The maximum-weight-matching (MWM)
rule is seen to be a special case, where $B$ is the
identity matrix.\par
Second, we extend the class of throughput maximizing
controls by identifying a tracking condition which
allows applying PCS with any bounded time-lag without
compromising throughput. It enables asynchronous or
delayed PCS implementations and various examples are
discussed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cone scheduling; maximal throughput; packet switch;
queueing network; stability",
}
@Article{Ngo:2009:RNW,
author = "Hung Q. Ngo and Yang Wang and Dazhen Pan",
title = "Rearrangeable and nonblocking $ [w, f]$-distributors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "990--1001",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2001728",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We formulate a graph model called $ [w,
f]$-distributors which is useful in analyzing the
structures and comparing the quantitative complexities
and qualitative features of optical multicast
cross-connects. Using the formulation we show that two
strictly nonblocking multicast optical cross-connects
under two different request models are equivalent
topologically, even though one request model is much
less restrictive than the other. We then investigate
the tradeoff between the depth and the complexity of an
optical multicast cross-connect using the graph model.
Upper and lower complexity bounds are proved. In the
process, we also give a generic recursive construction
that can be used to construct optimal and near-optimal
$ [w, f]$-distributors. The recursive construction can
also be used to construct cost-effective optical
multicast cross-connects. Another important result that
follows is the exact asymptotic behavior of the size of
optimal $ [w, f]$-connectors, the unicast version of $
[w, f]$-distributors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "complexity; distributors; multicast; optimal
connectors; WDM optical cross-connects",
}
@Article{VanMeter:2009:SDL,
author = "Rodney {Van Meter} and Thaddeus D. Ladd and W. J.
Munro and Kae Nemoto",
title = "System design for a long-line quantum repeater",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "3",
pages = "1002--1013",
month = jun,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.927260",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Jul 17 16:07:33 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a new control algorithm and system design
for a network of quantum repeaters, and outline the
end-to-end protocol architecture. Such a network will
create long-distance quantum states, supporting quantum
key distribution as well as distributed quantum
computation. Quantum repeaters improve the reduction of
quantum-communication throughput with distance from
exponential to polynomial. Because a quantum state
cannot be copied, a quantum repeater is not a signal
amplifier. Rather, it executes algorithms for quantum
teleportation in conjunction with a specialized type of
quantum error correction called purification to raise
the fidelity of the quantum states. We introduce our
banded purification scheme, which is especially
effective when the fidelity of coupled qubits is low,
improving the prospects for experimental realization of
such systems. The resulting throughput is calculated
via detailed simulations of a long line composed of
shorter hops. Our algorithmic improvements increase
throughput by a factor of up to 50 compared to earlier
approaches, for a broad range of physical
characteristics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "purification; quantum information; quantum networking;
quantum repeaters; resource scheduling",
}
@Article{Turner:2009:SPG,
author = "Jonathan S. Turner",
title = "Strong performance guarantees for asynchronous
buffered crossbar scheduler",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1017--1028",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006221",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Crossbar-based switches are commonly used to implement
routers with throughputs up to about 1 Tb/s. The advent
of crossbar scheduling algorithms that provide strong
performance guarantees now makes it possible to
engineer systems that perform well, even under extreme
traffic conditions. Until recently, such performance
guarantees have only been developed for crossbars that
switch cells rather than variable length packets.
Cell-based crossbars incur a worst-case bandwidth
penalty of up to a factor of two, since they must
fragment variable length packets into fixed length
cells. In addition, schedulers for cell-based crossbars
may fail to deliver the expected performance guarantees
when used in routers that forward packets. We show how
to obtain performance guarantees for asynchronous
crossbars that are directly comparable to those
previously developed for synchronous, cell-based
crossbars. In particular we define derivatives of the
Group by Virtual Output Queue (GVOQ) scheduler of
Chuang et al. and the Least Occupied Output First
Scheduler of Krishna et al. and show that both can
provide strong performance guarantees in systems with
speedup 2. Specifically, we show that these schedulers
are work-conserving and that they can emulate an
output-queued switch using any queueing discipline in
the class of restricted Push-In, First-Out queueing
disciplines. We also show that there are schedulers for
segment-based crossbars, (introduced recently by
Katevenis and Passas) that can deliver strong
performance guarantees with small buffer requirements
and no bandwidth fragmentation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asynchronous crossbars; crossbar schedulers;
performance guarantees; routers; switches",
}
@Article{Agrawal:2009:HBN,
author = "Banit Agrawal and Timothy Sherwood",
title = "High-bandwidth network memory system through virtual
pipelines",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1029--1041",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008646",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As network bandwidth increases, designing an effective
memory system for network processors becomes a
significant challenge. The size of the routing tables,
the complexity of the packet classification rules, and
the amount of packet buffering required all continue to
grow at a staggering rate. Simply relying on large,
fast SRAMs alone is not likely to be scalable or
cost-effective. Instead, trends point to the use of
low-cost commodity DRAM devices as a means to deliver
the worst-case memory performance that network
data-plane algorithms demand. While DRAMs can deliver a
great deal of throughput, the problem is that memory
banking significantly complicates the worst-case
analysis, and specialized algorithms are needed to
ensure that specific types of access patterns are
conflict-free.\par
We introduce virtually pipelined memory, an
architectural technique that efficiently supports high
bandwidth, uniform latency memory accesses, and
high-confidence throughput even under adversarial
conditions. Virtual pipelining provides a
simple-to-analyze programming model of a deep pipeline
(deterministic latencies) with a completely different
physical implementation (a memory system with banks and
probabilistic mapping). This allows designers to
effectively decouple the analysis of their algorithms
and data structures from the analysis of the memory
buses and banks. Unlike specialized hardware customized
for a specific data-plane algorithm, our system makes
no assumption about the memory access patterns. We
present a mathematical argument for our system's
ability to provably provide bandwidth with high
confidence and demonstrate its functionality and area
overhead through a synthesizable design. We further
show that, even though our scheme is general purpose to
support new applications such as packet reassembly, it
outperforms the state-of-the-art in specialized packet
buffering architectures.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bank conflicts; DRAM; mean time to stall; memory;
memory controller; MTS; network; packet buffering;
packet reassembly; universal hashing; virtual pipeline;
VPNM",
}
@Article{Menth:2009:SMS,
author = "Michael Menth and Andreas Binzenh{\"o}fer and Stefan
M{\"u}hleck",
title = "Source models for speech traffic revisited",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1042--1051",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006222",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we analyze packet traces of widely used
voice codecs and present analytical source models which
describe their output by stochastic processes. Both the
G.711 and the G.729.1 codec yield periodic packet
streams with a fixed packet size, the G.723.1 as well
as the iLBC codec use silence detection leading to an
on/off process, and the GSM AMR and the iSAC codec
produce periodic packet streams with variable packet
sizes. We apply all codecs to a large set of typical
speech samples and analyze the output of the codecs
statistically. Based on these evaluations we provide
quantitative models using standard and modified on/off
processes as well as memory Markov chains. Our models
are simple and easy to use. They are in good accordance
with the original traces as they capture not only the
complementary cumulative distribution function (CCDF)
of the on/off phase durations and the packet sizes, but
also the autocorrelation function (ACF) of consecutive
packet sizes as well as the queueing properties of the
original traces. In contrast, voice traffic models used
in most of today's simulations or analytical studies
fail to reproduce the ACF and the queueing properties
of original traces. This possibly leads to
underestimation of performance measures like the
waiting time or loss probabilities. The models proposed
in this paper do not suffer from this shortcoming and
present an attractive alternative for use in future
performance studies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "correlation; queueing behavior; traffic models; voice
codecs",
}
@Article{Magharei:2009:PPP,
author = "Nazanin Magharei and Reza Rejaie",
title = "{PRIME}: peer-to-peer receiver-driven mesh-based
streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1052--1065",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007434",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The success of file swarming mechanisms such as
BitTorrent has motivated a new approach for scalable
streaming of live content that we call mesh-based
Peer-to-Peer (P2P) streaming. In this approach,
participating end-systems (or peers) form a randomly
connected mesh and incorporate swarming content
delivery to stream live content. Despite the growing
popularity of this approach, neither the fundamental
design tradeoffs nor the basic performance bottlenecks
in mesh-based P2P streaming are well understood.\par
In this paper, we follow a performance-driven approach
to design PRIME, a scalable mesh-based P2P streaming
mechanism for live content. The main design goal of
PRIME is to minimize two performance bottlenecks,
namely bandwidth bottleneck and content bottleneck. We
show that the global pattern of delivery for each
segment of live content should consist of a diffusion
phase which is followed by a swarming phase. This leads
to effective utilization of available resources to
accommodate scalability and also minimizes content
bottleneck. Using packet level simulations, we
carefully examine the impact of overlay connectivity,
packet scheduling scheme at individual peers and source
behavior on the overall performance of the system. Our
results reveal fundamental design tradeoffs of
mesh-based P2P streaming for live content.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "communication systems; computer networks; Internet;
multimedia communication; multimedia systems",
}
@Article{Sivaraman:2009:PPS,
author = "Vijay Sivaraman and Hossam Elgindy and David Moreland
and Diethelm Ostry",
title = "Packet pacing in small buffer optical packet switched
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1066--1079",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2005622",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the absence of a cost-effective technology for
storing optical signals, emerging optical packet
switched (OPS) networks are expected to have severely
limited buffering capability. To mitigate the
performance degradation resulting from small buffers,
this paper proposes that optical edge nodes 'pace' the
injection of traffic into the OPS core. Our
contributions relating to pacing in OPS networks are
three-fold: first, we develop real-time pacing
algorithms of poly-logarithmic complexity that are
feasible for practical implementation in emerging
high-speed OPS networks. Second, we provide an
analytical quantification of the benefits of pacing in
reducing traffic burstiness and traffic loss at a link
with very small buffers. Third, we show via simulations
of realistic network topologies that pacing can
significantly reduce network losses at the expense of a
small and bounded increase in end-to-end delay for
real-time traffic flows. We argue that the loss-delay
tradeoff mechanism provided by pacing can be
instrumental in overcoming the performance hurdle
arising from the scarcity of buffers in OPS networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "optical packet switch; small buffers; traffic
burstiness; traffic pacing",
}
@Article{Ahuja:2009:SLF,
author = "Satyajeet S. Ahuja and Srinivasan Ramasubramanian and
Marwan M. Krunz",
title = "Single-link failure detection in all-optical networks
using monitoring cycles and paths",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1080--1093",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008000",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the problem of fault
localization in all-optical networks. We introduce the
concept of monitoring cycles (MCs) and monitoring paths
(MPs) for unique identification of single-link
failures. MCs and MPs are required to pass through one
or more monitoring locations. They are constructed such
that any single-link failure results in the failure of
a unique combination of MCs and MPs that pass through
the monitoring location(s). For a network with only one
monitoring location, we prove that three-edge
connectivity is a necessary and sufficient condition
for constructing MCs that uniquely identify any
single-link failure in the network. For this case, we
formulate the problem of constructing MCs as an integer
linear program (ILP). We also develop heuristic
approaches for constructing MCs in the presence of one
or more monitoring locations. For an arbitrary network
(not necessarily three-edge connected), we describe a
fault localization technique that uses both MPs and MCs
and that employs multiple monitoring locations. We also
provide a linear-time algorithm to compute the minimum
number of required monitoring locations. Through
extensive simulations, we demonstrate the effectiveness
of the proposed monitoring technique.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "all-optical networks; fault localization",
}
@Article{Sarkar:2009:HWO,
author = "Suman Sarkar and Hong-Hsu Yen and Sudhir Dixit and
Biswanath Mukherjee",
title = "Hybrid wireless-optical broadband access network
{(WOBAN)}: network planning using {Lagrangean}
relaxation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1094--1105",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008692",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The concept of a hybrid wireless-optical broadband
access network (WOBAN) is a very attractive one. This
is because it may be costly in several situations to
run fiber to every home (or equivalent end-user
premises) from the telecom central office (CO); also,
providing wireless access from the CO to every end user
may not be possible because of limited spectrum. Thus,
running fiber as far as possible from the CO toward the
end user and then having wireless access technologies
take over may be an excellent compromise. How far
should fiber penetrate before wireless takes over is an
interesting engineering design and optimization
problem, which we address in this paper. We propose and
investigate the characteristics of an analytical model
for network planning, namely optimum placements of base
stations (BSs) and optical network units (ONUs) in
aWOBAN (called the primal model, or PM). We develop
several constraints to be satisfied: BS and ONU
installation constraints, user assignment constraints,
channel assignment constraints, capacity constraints,
and signal-quality and interference constraints. To
solve this PM with reasonable accuracy, we use
'Lagrangean relaxation' to obtain the corresponding
'Lagrangean dual' model. We solve this dual problem to
obtain a lower bound (LB) of the primal problem. We
also develop an algorithm (called the primal algorithm)
to solve the PM to obtain an upper bound (UB). Via
simulation, we compare this PM to a placement heuristic
(called the cellular heuristic) and verify that the
placement problem is quite sensitive to a set of chosen
metrics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadband access; duality gap; Lagrangean relaxation;
network planning; optical network; primal model (PM);
wireless network",
}
@Article{Li:2009:ACW,
author = "Pan Li and Chi Zhang and Yuguang Fang",
title = "Asymptotic connectivity in wireless ad hoc networks
using directional antennas",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1106--1117",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006224",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Connectivity is a crucial issue in wireless ad hoc
networks (WANETs). Gupta and Kumar have shown that in
WANETs using omnidirectional antennas, the critical
transmission range to achieve asymptotic connectivity
is $ O(\sqrt {\log n} / n) $ if $n$ nodes are uniformly
and independently distributed in a disk of unit area.
In this paper, we investigate the connectivity problem
when directional antennas are used. We first assume
that each node in the network randomly beamforms in one
beam direction. We find that there also exists a
critical transmission range for a WANET to achieve
asymptotic connectivity, which corresponds to a
critical transmission power (CTP). Since CTP is
dependent on the directional antenna pattern, the
number of beams, and the propagation environment, we
then formulate a non-linear programming problem to
minimize the CTP. We show that when directional
antennas use the optimal antenna pattern, the CTP in a
WANET using directional antennas at both transmitter
and receiver is smaller than that when either
transmitter or receiver uses directional antenna and is
further smaller than that when only omnidirectional
antennas are used. Moreover, we revisit the
connectivity problem assuming that two neighboring
nodes using directional antennas can be guaranteed to
beamform to each other to carry out the transmission. A
smaller critical transmission range than that in the
previous case is found, which implies smaller CTP.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "asymptotic connectivity; critical transmission power;
critical transmission range; directional antenna;
wireless ad hoc networks",
}
@Article{Jindal:2009:ARR,
author = "Apoorva Jindal and Konstantinos Psounis",
title = "The achievable rate region of 802.11-scheduled
multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1118--1131",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007844",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we characterize the achievable rate
region for any IEEE 802.11-scheduled static multihop
network. To do so, we first characterize the achievable
edge-rate region, that is, the set of edge rates that
are achievable on the given topology. This requires a
careful consideration of the interdependence among
edges since neighboring edges collide with and affect
the idle time perceived by the edge under study. We
approach this problem in two steps. First, we consider
two-edge topologies and study the fundamental ways they
interact. Then, we consider arbitrary multihop
topologies, compute the effect that each neighboring
edge has on the edge under study in isolation, and
combine to get the aggregate effect. We then use the
characterization of the achievable edge-rate region to
characterize the achievable rate region. We verify the
accuracy of our analysis by comparing the achievable
rate region derived from simulations with the one
derived analytically. We make a couple of interesting
and somewhat surprising observations while deriving the
rate regions. First, the achievable rate region with
802.11 scheduling is not necessarily convex. Second,
the performance of 802.11 is surprisingly good. For
example, in all the topologies used for model
verification, the max-min allocation under 802.11 is at
least 64\% of the max-min allocation under a perfect
scheduler.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity region; IEEE 802.11; multihop networks",
}
@Article{Joo:2009:UCR,
author = "Changhee Joo and Xiaojun Lin and Ness B. Shroff",
title = "Understanding the capacity region of the {Greedy}
maximal scheduling algorithm in multihop wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1132--1145",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026276",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we characterize the performance of an
important class of scheduling schemes, called greedy
maximal scheduling (GMS), for multihop wireless
networks. While a lower bound on the throughput
performance of GMS has been well known, empirical
observations suggest that it is quite loose and that
the performance of GMS is often close to optimal. In
this paper, we provide a number of new analytic results
characterizing the performance limits of GMS. We first
provide an equivalent characterization of the
efficiency ratio of GMS through a topological property
called the local-pooling factor of the network graph.
We then develop an iterative procedure to estimate the
local-pooling factor under a large class of network
topologies and interference models. We use these
results to study the worst-case efficiency ratio of GMS
on two classes of network topologies. We show how these
results can be applied to tree networks to prove that
GMS achieves the full capacity region in tree networks
under the $K$-hop interference model. Then, we show
that the worst-case efficiency ratio of GMS in
geometric unit-disk graphs is between 1/6 and 1/3.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity region; communication systems; greedy maximal
scheduling (GMS); longest queue first; multihop
wireless networks",
}
@Article{Neely:2009:DAM,
author = "Michael J. Neely",
title = "Delay analysis for maximal scheduling with flow
control in wireless networks with bursty traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1146--1159",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008232",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the delay properties of one-hop networks
with general interference constraints and multiple
traffic streams with time-correlated arrivals. We first
treat the case when arrivals are modulated by
independent finite state Markov chains. We show that
the well known maximal scheduling algorithm achieves
average delay that grows at most logarithmically in the
largest number of interferers at any link. Further, in
the important special case when each Markov process has
at most two states (such as bursty ON/OFF sources), we
prove that average delay is independent of the number
of nodes and links in the network, and hence is
order-optimal. We provide tight delay bounds in terms
of the individual auto-correlation parameters of the
traffic sources. These are perhaps the first
order-optimal delay results for controlled queueing
networks that explicitly account for such statistical
information. Our analysis treats cases both with and
without flow control.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "flow control; Markov chains; queueing analysis",
}
@Article{Bahl:2009:OUC,
author = "Paramvir Bahl and Ranveer Chandra and Patrick P. C.
Lee and Vishal Misra and Jitendra Padhye and Dan
Rubenstein and Yan Yu",
title = "Opportunistic use of client repeaters to improve
performance of {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1160--1171",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026414",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Currently deployed IEEE 802.11 WLANs (Wi-Fi networks)
share access point (AP) bandwidth on a per-packet
basis. However, various stations communicating with the
AP often have different signal qualities, resulting in
different transmission rates. This induces a phenomenon
known as the rate anomaly problem, in which stations
with lower signal quality transmit at lower rates and
consume a significant majority of airtime, thereby
dramatically reducing the throughput of stations
transmitting at higher rates.\par
We propose SoftRepeater, a practical, deployable system
in which stations cooperatively address the rate
anomaly problem. Specifically, higher rate Wi-Fi
stations opportunistically transform themselves into
repeaters for lower rate stations when transmitting
data to/from the AP. The key challenge is to determine
when it is beneficial to enable the repeater
functionality. In view of this, we propose an
initiation protocol that ensures that repeater
functionality is enabled only when appropriate. Also,
our system can run directly on top of today's 802.11
infrastructure networks. In addition, we describe a
novel, zero-overhead network coding scheme that further
alleviates undesirable symptoms of the rate anomaly
problem. Using simulation and testbed implementation,
we find that SoftRepeater can improve cumulative
throughput by up to 200\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "IEEE 802.11; rate anomaly; wireless",
}
@Article{Kim:2009:AAA,
author = "Kyu-Han Kim and Kang G. Shin",
title = "On accurate and asymmetry-aware measurement of link
quality in wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1172--1185",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008001",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a highly efficient and accurate
link-quality measurement framework, called Efficient
and Accurate link-quality monitoR (EAR), for multihop
wireless mesh networks (WMNs) that has several salient
features. First, it exploits three complementary
measurement schemes: passive, cooperative, and active
monitoring. By adopting one of these schemes
dynamically and adaptively, EAR maximizes the
measurement accuracy, and its opportunistic use of the
unicast application traffic present in the network
minimizes the measurement overhead. Second, EAR
effectively identifies the existence of wireless link
asymmetry by measuring the quality of each link in both
directions of the link, thus improving the utilization
of network capacity by up to 114\%. Finally, its
cross-layer architecture across both the network layer
and the IEEE 802.11-based device driver makes EAR
easily deployable in existing multihop wireless mesh
networks without system recompilation or MAC firmware
modification. EAR has been evaluated extensively via
both ns-2-based simulation and experimentation on our
Linux-based implementation in a real-life testbed. Both
simulation and experimentation results have shown EAR
to provide highly accurate link-quality measurements
with minimum overhead.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed systems; link asymmetry; measurement;
wireless link quality; wireless mesh networks (WMNs)",
}
@Article{Vuran:2009:ECW,
author = "Mehmet C. Vuran and Ian F. Akyildiz",
title = "Error control in wireless sensor networks: a cross
layer analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1186--1199",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2009971",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Error control is of significant importance for
Wireless Sensor Networks (WSNs) because of their severe
energy constraints and the low power communication
requirements. In this paper, a cross-layer methodology
for the analysis of error control schemes in WSNs is
presented such that the effects of multi-hop routing
and the broadcast nature of the wireless channel are
investigated. More specifically, the cross-layer
effects of routing, medium access, and physical layers
are considered. This analysis enables a comprehensive
comparison of forward error correction (FEC) codes,
automatic repeat request (ARQ), and hybrid ARQ schemes
in WSNs. The validation results show that the developed
framework closely follows simulation
results.\par
Hybrid ARQ and FEC schemes improve the error resiliency
of communication compared to ARQ. In a multi-hop
network, this improvement can be exploited by
constructing longer hops (hop length extension), which
can be achieved through channel-aware routing
protocols, or by reducing the transmit power (transmit
power control). The results of our analysis reveal that
for hybrid ARQ schemes and certain FEC codes, the hop
length extension decreases both the energy consumption
and the end-to-end latency subject to a target packet
error rate (PER) compared to ARQ. This decrease in
end-to-end latency is crucial for delay sensitive,
real-time applications, where both hybrid ARQ and FEC
codes are strong candidates. We also show that the
advantages of FEC codes are even more pronounced as the
network density increases. On the other hand, transmit
power control results in significant savings in energy
consumption at the cost of increased latency for
certain FEC codes. The results of our analysis also
indicate the cases where ARQ outperforms FEC codes for
various end-to-end distance and target PER values.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "automatic repeat request; cross layer analysis; energy
consumption; forward error correction; hybrid ARQ;
latency; wireless sensor networks",
}
@Article{Sengupta:2009:EFD,
author = "Shamik Sengupta and Mainak Chatterjee",
title = "An economic framework for dynamic spectrum access and
service pricing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1200--1213",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007758",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The concept of dynamic spectrum access will allow the
radio spectrum to be traded in a market like scenario
allowing wireless service providers (WSPs) to lease
chunks of spectrum on a short-term basis. Such market
mechanisms will lead to competition among WSPs where
they not only compete to acquire spectrum but also
attract and retain users. Currently, there is little
understanding on how such a dynamic trading system will
operate so as to make the system feasible under
economic terms.\par
In this paper, we propose an economic framework that
can be used to guide (i) the dynamic spectrum
allocation process and (ii) the service pricing
mechanisms that the providers can use. We propose a
knapsack based auction model that dynamically allocates
spectrum to the WSPs such that revenue and spectrum
usage are maximized. We borrow techniques from game
theory to capture the conflict of interest between WSPs
and end users. A dynamic pricing strategy for the
providers is also proposed. We show that even in a
greedy and non-cooperative behavioral game model, it is
in the best interest of the WSPs to adhere to a price
and channel threshold which is a direct consequence of
price equilibrium. Through simulation results, we show
that the proposed auction model entices WSPs to
participate in the auction, makes optimal use of the
spectrum, and avoids collusion among WSPs. We
demonstrate how pricing can be used as an effective
tool for providing incentives to the WSPs to upgrade
their network resources and offer better services.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "auction theory; dynamic spectrum access; game theory;
pricing",
}
@Article{Froc:2009:DPW,
author = "Gwillerm Froc and Issam Mabrouki and Xavier Lagrange",
title = "Design and performance of wireless data gathering
networks based on unicast random walk routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1214--1227",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006223",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless environment monitoring applications with
significantly relaxed quality-of-service constraints
are emerging. Hence, the possibility to use rough low
knowledge routing in sensor networks to reduce hardware
resource and software complexity is questionable.
Moreover, low knowledge handling allows better
genericity, which is of interest, for instance, for
basic operation enabling system set-up. In this
framework, this paper revisits stateless unicast random
walk routing in wireless sensor networks. Based on
random walk theory, original closed-form expressions of
the delay, the power consumption and related spatial
behaviors are provided according to the scale of the
system. Basic properties of such a random routing are
discussed. Exploiting its properties, data gathering
schemes that fulfill the requirements of the
application with rather good energy efficiency are then
identified.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data gathering; quality of service (QoS); random walk;
routing; wireless sensor networks",
}
@Article{Tsai:2009:VCB,
author = "Ming-Jer Tsai and Hong-Yen Yang and Bing-Hong Liu and
Wen-Qian Huang",
title = "Virtual-coordinate-based delivery-guaranteed routing
protocol in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1228--1241",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008002",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we first propose a method, ABVCap, to
construct a virtual coordinate system in a wireless
sensor network. ABVCap assigns each node multiple
5-tuple virtual coordinates. Subsequently, we introduce
a protocol, ABVCap routing, to route packets based on
the ABVCap virtual coordinate system. ABVCap routing
guarantees packet delivery without the computation and
storage of the global topological features. Finally, we
demonstrate an approach, ABVCap maintenance, to
reconstruct an ABVCap virtual coordinate system in a
network with node failures. Simulations show ABVCap
routing ensures moderate routing path length, as
compared to virtual-coordinate-based routing, GLIDER,
Hop ID, GLDR, and VCap.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delivery-guaranteed routing; GPS-free routing; virtual
coordinate assignment; wireless sensor network",
}
@Article{Ahn:2009:SLD,
author = "Joon Ahn and Bhaskar Krishnamachari",
title = "Scaling laws for data-centric storage and querying in
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1242--1255",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2009220",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We use a constrained optimization framework to derive
scaling laws for data-centric storage and querying in
wireless sensor networks. We consider both unstructured
sensor networks, which use blind sequential search for
querying, and structured sensor networks, which use
efficient hash-based querying. We find that the
scalability of a sensor network's performance depends
upon whether the increase in energy and storage
resources with more nodes is outweighed by the
concomitant application-specific increase in event and
query loads. We derive conditions that determine: (1)
whether the energy requirement per node grows without
bound with the network size for a fixed-duration
deployment, (2) whether there exists a maximum network
size that can be operated for a specified duration on a
fixed energy budget, and (3) whether the network
lifetime increases or decreases with the size of the
network for a fixed energy budget. An interesting
finding of this work is that three-dimensional (3D)
uniform deployments are inherently more scalable than
two-dimensional (2D) uniform deployments, which in turn
are more scalable than one-dimensional (1D) uniform
deployments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "energy efficiency; modeling; performance analysis;
querying; scalability; wireless sensor networks",
}
@Article{Li:2009:PFD,
author = "Ming Li and Deepak Ganesan and Prashant Shenoy",
title = "{PRESTO}: feedback-driven data management in sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1256--1269",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2006818",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents PRESTO, a novel two-tier sensor
data management architecture comprising proxies and
sensors that cooperate with one another for acquiring
data and processing queries. PRESTO proxies construct
time-series models of observed trends in the sensor
data and transmit the parameters of the model to
sensors. Sensors check sensed data with model-predicted
values and transmit only deviations from the
predictions back to the proxy. Such a model-driven push
approach is energy-efficient, while ensuring that
anomalous data trends are never missed. In addition to
supporting queries on current data, PRESTO also
supports queries on historical data using interpolation
and local archival at sensors. PRESTO can adapt model
and system parameters to data and query dynamics to
further extract energy savings. We have implemented
PRESTO on a sensor testbed comprising Intel Stargates
and Telos Motes. Our experiments show that in a
temperature monitoring application, PRESTO yields one
to two orders of magnitude reduction in energy
requirements over on-demand, proactive or model-driven
pull approaches. PRESTO also results in an order of
magnitude reduction in query latency in a 1\%
duty-cycled five hop sensor network over a system that
forwards all queries to remote sensor nodes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data management; model-driven push; sensor networks;
time-series models",
}
@Article{Casado:2009:REN,
author = "Mart{\'\i}n Casado and Michael J. Freedman and Justin
Pettit and Jianying Luo and Natasha Gude and Nick
McKeown and Scott Shenker",
title = "Rethinking enterprise network control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1270--1283",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026415",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents Ethane, a new network architecture
for the enterprise. Ethane allows managers to define a
single network-wide fine-grain policy and then enforces
it directly. Ethane couples extremely simple flow-based
Ethernet switches with a centralized controller that
manages the admittance and routing of flows. While
radical, this design is backwards-compatible with
existing hosts and switches. We have implemented Ethane
in both hardware and software, supporting both wired
and wireless hosts. We also show that it is compatible
with existing high-fanout switches by porting it to
popular commodity switching chipsets. We have deployed
and managed two operational Ethane networks, one in the
Stanford University Computer Science Department
supporting over 300 hosts, and another within a small
business of 30 hosts. Our deployment experiences have
significantly affected Ethane's design.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "architecture; management; network; security",
}
@Article{Argyraki:2009:SNL,
author = "Katerina Argyraki and David R. Cheriton",
title = "Scalable network-layer defense against {Internet}
bandwidth-flooding attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1284--1297",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a bandwidth-flooding attack, compromised sources
send high-volume traffic to the target with the purpose
of causing congestion in its tail circuit and
disrupting its legitimate communications. In this
paper, we present Active Internet Traffic Filtering
(AITF), a network-layer defense mechanism against such
attacks. AITF enables a receiver to contact misbehaving
sources and ask them to stop sending it traffic; each
source that has been asked to stop is policed by its
own Internet service provider (ISP), which ensures its
compliance. An ISP that hosts misbehaving sources
either supports AITF (and accepts to police its
misbehaving clients), or risks losing all access to the
complaining receiver--this is a strong incentive to
cooperate, especially when the receiver is a popular
public-access site. We show that AITF preserves a
significant fraction of a receiver's bandwidth in the
face of bandwidth flooding, and does so at a per-client
cost that is already affordable for today's ISPs; this
per-client cost is not expected to increase, as long as
botnet-size growth does not outpace Moore's law. We
also show that even the first two networks that deploy
AITF can maintain their connectivity to each other in
the face of bandwidth flooding. We conclude that the
network-layer of the Internet can provide an effective,
scalable, and incrementally deployable solution against
bandwidth-flooding attacks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "denial-of-service defenses; network-level security and
protection; traffic filtering",
}
@Article{Roy:2009:PIO,
author = "Sabyasachi Roy and Himabindu Pucha and Zheng Zhang and
Y. Charlie Hu and Lili Qiu",
title = "On the placement of infrastructure overlay nodes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1298--1311",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2007433",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Overlay routing has emerged as a promising approach to
improving performance and reliability of Internet
paths. To fully realize the potential of overlay
routing under the constraints of deployment costs in
terms of hardware, network connectivity and human
effort, it is critical to carefully place
infrastructure overlay nodes to balance the tradeoff
between performance and resource constraints. In this
paper, we investigate approaches to perform intelligent
placement of overlay nodes to facilitate (i) resilient
routing and (ii) TCP performance improvement. We
formulate objective functions to capture application
behavior: reliability and TCP performance, and develop
several placement algorithms, which offer a wide range
of tradeoffs in complexity and required knowledge of
the client-server location and traffic load. Using
simulations on synthetic and real Internet topologies,
and PlanetLab experiments, we demonstrate the
effectiveness of the placement algorithms and objective
functions developed, respectively. We conclude that a
hybrid approach combining greedy and random approaches
provides the best tradeoff between computational
efficiency and accuracy. We also uncover the
fundamental challenge in simultaneously optimizing for
reliability and TCP performance, and propose a simple
unified algorithm to achieve both.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "NP-completeness; overlay networks; placement;
reliability; TCP",
}
@Article{Nair:2009:DIO,
author = "Jayakrishnan Nair and D. Manjunath",
title = "Distributed iterative optimal resource allocation with
concurrent updates of routing and flow control
variables",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1312--1325",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008419",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Consider a set of active elastic sessions over a
network. Session traffic is routed at each hop
(potentially through multiple network paths) based only
on its destination. Each session is associated with a
concave increasing utility function of its transfer
rate. The transfer rates of all sessions and the
routing policy define the operating point of the
network. We construct a metric $f$ of the goodness of
this operating point. $f$ is an increasing function of
the session utilities and a decreasing function of the
extent of congestion in the network. We define 'good'
operating points as those that maximize $f$, subject to
the capacity constraints in the network. This paper
presents a distributed, iterative algorithm for
adapting the session rates and the routing policy
across the network so as to converge asymptotically to
the set of 'good' operating points. The algorithm
updates session rates and routing variables
concurrently and is, therefore, amenable to distributed
online implementation. The convergence of the
concurrent update scheme is proved rigorously.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "multipath routing; optimal rate control; optimal
routing; two timescale iterations",
}
@Article{Okamura:2009:MAP,
author = "Hiroyuki Okamura and Tadashi Dohi and Kishor S.
Trivedi",
title = "{Markovian} arrival process parameter estimation with
group data",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1326--1339",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2008750",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses a parameter estimation problem of
Markovian arrival process (MAP). In network traffic
measurement experiments, one often encounters the group
data where arrival times for a group are collected as
one bin. Although the group data are observed in many
situations, nearly all existing estimation methods for
MAP are based on nongroup data. This paper proposes a
numerical procedure for fitting a MAP and a
Markov-modulated Poisson process (MMPP) to group data.
The proposed algorithm is based on the
expectation-maximization (EM) approach and is a natural
but significant extension of the existing EM algorithms
to estimate parameters of the MAP and MMPP.
Specifically for the MMPP estimation, we provide an
efficient approximation based on the proposed EM
algorithm. We examine the performance of proposed
algorithms via numerical experiments and present an
example of traffic analysis with real traffic data.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "expectation-maximization (EM) algorithm; group data;
Markov-modulated Poisson process (MMPP); Markovian
arrival process (MAP); maximum-likelihood (ML)
estimation; network traffic",
}
@Article{Baccelli:2009:RPN,
author = "Fran{\c{c}}is Baccelli and Sridhar Machiraju and
Darryl Veitch and Jean Bolot",
title = "The role of {PASTA} in network measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "4",
pages = "1340--1353",
month = aug,
year = "2009",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2008.2011129",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Sep 22 12:40:59 MDT 2009",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Poisson Arrivals SeeTimeAverages (PASTA) is a
well-known property applicable to many stochastic
systems. In active probing, PASTA is invoked to justify
the sending of probe packets (or trains) at Poisson
times in a variety of contexts. However, due to the
diversity of aims and analysis techniques used in
active probing, the benefits of Poisson-based
measurement, and the utility and role of PASTA, are
unclear. Using a combination of rigorous results and
carefully constructed examples and counterexamples, we
map out the issues involved and argue that PASTA is of
very limited use in active probing. In particular,
Poisson probes are not unique in their ability to
sample without bias. Furthermore, PASTA ignores the
issue of estimation variance and the central need for
an inversion phase to estimate the quantity of interest
based on what is directly observable. We give concrete
examples of when Poisson probes should not be used,
explain why, and offer initial guidelines on suitable
alternative sending processes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "active probing; network measurement; Nonintrusive
Mixing Arrivals See Time Averages (NIMASTA); Poisson
Arrivals See Time Averages (PASTA)",
}
@Article{Cha:2009:AVP,
author = "Meeyoung Cha and Haewoon Kwak and Pablo Rodriguez and
Yong-Yeol Ahn and Sue Moon",
title = "Analyzing the video popularity characteristics of
large-scale user generated content systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1357--1370",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Steiner:2009:LTS,
author = "Moritz Steiner and Taoufik En-Najjary and Ernst W.
Biersack",
title = "Long term study of peer behavior in the {KAD DHT}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1371--1384",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bejerano:2009:TSC,
author = "Yigal Bejerano",
title = "Taking the skeletons out of the closets: a simple and
efficient topology discovery scheme for large {Ethernet
LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1385--1398",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Srivatsa:2009:SKM,
author = "Mudhakar Srivatsa and Arun Iyengar and Jian Yin and
Ling Liu",
title = "Scalable key management algorithms for location-based
services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1399--1412",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paganini:2009:UAC,
author = "Fernando Paganini and Enrique Mallada",
title = "A unified approach to congestion control and
node-based multipath routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1413--1426",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2009:GPR,
author = "Murali Kodialam and T. V. Lakshman and Sudipta
Sengupta",
title = "Guaranteed performance routing of unpredictable
traffic with fast path restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1427--1438",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yuan:2009:ORF,
author = "Xin Yuan and Wickus Nienaber and Zhenhai Duan and Rami
Melhem",
title = "Oblivious routing in fat-tree based system area
networks with uncertain traffic demands",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1439--1452",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Boche:2009:NBP,
author = "Holger Boche and Martin Schubert",
title = "{Nash} bargaining and proportional fairness for
wireless systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1453--1466",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bui:2009:DLS,
author = "Loc X. Bui and Sujay Sanghavi and R. Srikant",
title = "Distributed link scheduling with constant overhead",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1467--1480",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Joo:2009:PRA,
author = "Changhee Joo and Ness B. Shroff",
title = "Performance of random access scheduling schemes in
multi-hop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1481--1493",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ye:2009:OSP,
author = "Zhenzhen Ye and Alhussein A. Abouzeid and Jing Ai",
title = "Optimal stochastic policies for distributed data
aggregation in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1494--1507",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2009:OSW,
author = "Yan Wu and Sonia Fahmy and Ness B. Shroff",
title = "Optimal sleep\slash wake scheduling for
time-synchronized sensor networks with {QoS}
guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1508--1521",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Garetto:2009:CSAa,
author = "Michele Garetto and Paolo Giaccone and Emilio
Leonardi",
title = "Capacity scaling in ad hoc networks with heterogeneous
mobile nodes: the super-critical regime",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1522--1535",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2009:SPE,
author = "Suli Zhao and Dipankar Raychaudhuri",
title = "Scalability and performance evaluation of hierarchical
hybrid wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1536--1549",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2009:OWM,
author = "Hui Ma and Rajiv Vijayakumar and Sumit Roy and Jing
Zhu",
title = "Optimizing 802.11 wireless mesh networks based on
physical carrier sensing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1550--1563",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hsu:2009:MST,
author = "Wei-Jen Hsu and Thrasyvoulos Spyropoulos and
Konstantinos Psounis and Ahmed Helmy",
title = "Modeling spatial and temporal dependencies of user
mobility in wireless mobile networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1564--1577",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cai:2009:CBD,
author = "Han Cai and Do Young Eun",
title = "Crossing over the bounded domain: from exponential to
power-law intermeeting time in mobile ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1578--1591",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2009:OEE,
author = "Wei Wang and Mehul Motani and Vikram Srinivasan",
title = "Opportunistic energy-efficient contact probing in
delay-tolerant applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1592--1605",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liew:2009:BMD,
author = "Soung Chang Liew and Ying Jun Zhang and Da Rui Chen",
title = "Bounded-mean-delay throughput and nonstarvation
conditions in {Aloha} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1606--1618",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pascu:2009:CFA,
author = "Stefan Alexandru Pascu and Ahmed A. El-Amawy",
title = "On conflict-free all-to-all broadcast in one-hop
optical networks of arbitrary topologies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1619--1630",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mandjes:2009:RDT,
author = "Michel Mandjes and Remco {Van De Meent}",
title = "Resource dimensioning through buffer sampling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1631--1644",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Prasad:2009:RBS,
author = "Ravi S. Prasad and Constantine Dovrolis and Marina
Thottan",
title = "Router buffer sizing for {TCP} traffic and the role of
the output\slash input capacity ratio",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1645--1658",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yu:2009:CSL,
author = "Chao-Lin Yu and Cheng-Shang Chang and Duan-Shin Lee",
title = "{CR} switch: a load-balanced switch with contention
and reservation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1659--1671",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lazarou:2009:DNT,
author = "Georgios Y. Lazarou and Julie Baca and Victor S. Frost
and Joseph B. Evans",
title = "Describing network traffic using the index of
variability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1672--1683",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2009:PSG,
author = "Reuven Cohen and Niloofar Fazlollahi and David
Starobinski",
title = "Path switching and grading algorithms for advance
channel reservation architectures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "5",
pages = "1684--1695",
month = oct,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:37 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Andrew:2009:UXE,
author = "Lachlan L. H. Andrew and Steven H. Low and Bartek P.
Wydrowski",
title = "Understanding {XCP}: equilibrium and fairness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1697--1710",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chou:2009:PSP,
author = "Jerry Chi-Yuan Chou and Bill Lin and Subhabrata Sen
and Oliver Spatscheck",
title = "Proactive surge protection: a defense mechanism for
bandwidth-based attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1711--1723",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2009:TUE,
author = "Yao Zhao and Yan Chen and David Bindel",
title = "Towards unbiased end-to-end network diagnosis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1724--1737",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gunes:2009:RIA,
author = "Mehmet H. Gunes and Kamil Sarac",
title = "Resolving {IP} aliases in building traceroute-based
{Internet} maps",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1738--1751",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Su:2009:DBA,
author = "Ao-Jan Su and David R. Choffnes and Aleksandar
Kuzmanovic and Fabi{\'a}n E. Bustamante",
title = "Drafting behind {Akamai}: inferring network conditions
based on {CDN} redirections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1752--1765",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sirivianos:2009:REI,
author = "Michael Sirivianos and Xiaowei Yang and Stanislaw
Jarecki",
title = "Robust and efficient incentives for cooperative
content distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1766--1779",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rouskas:2009:BTS,
author = "George N. Rouskas and Nikhil Baradwaj",
title = "On bandwidth tiered service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1780--1793",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mutlu:2009:SPS,
author = "Huseyin Mutlu and Murat Alanyali and David
Starobinski",
title = "Spot pricing of secondary spectrum access in wireless
cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1794--1804",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2009:OCP,
author = "Nicholas B. Chang and Mingyan Liu",
title = "Optimal channel probing and transmission scheduling
for opportunistic spectrum access",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1805--1818",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sharma:2009:EBD,
author = "Shrutivandana Sharma and Demosthenis Teneketzis",
title = "An externalities-based decentralized optimal power
allocation algorithm for wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1819--1831",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gurewitz:2009:MMO,
author = "Omer Gurewitz and Vincenzo Mancuso and Jingpu Shi and
Edward W. Knightly",
title = "Measurement and modeling of the origins of starvation
of congestion-controlled flows in wireless mesh
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1832--1845",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gupta:2009:LCD,
author = "Abhinav Gupta and Xiaojun Lin and R. Srikant",
title = "Low-complexity distributed scheduling algorithms for
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1846--1859",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See comments and corrections \cite{Zhang:2015:CCN}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lotfinezhad:2009:SRD,
author = "Mahdi Lotfinezhad and Ben Liang and Elvino S. Sousa",
title = "On stability region and delay performance of
linear-memory randomized scheduling for time-varying
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1860--1873",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2009:DPE,
author = "Xiaojun Lin and Shahzada B. Rasool",
title = "Distributed and provably efficient algorithms for
joint channel-assignment, scheduling, and routing in
multichannel ad hoc wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1874--1887",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Garetto:2009:CSAb,
author = "Michele Garetto and Paolo Giaccone and Emilio
Leonardi",
title = "Capacity scaling in ad hoc networks with heterogeneous
mobile nodes: the subcritical regime",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1888--1901",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sarkar:2009:DRI,
author = "Rik Sarkar and Xianjin Zhu and Jie Gao",
title = "Double rulings for information brokerage in sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1902--1915",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Martinez:2009:DFN,
author = "Christopher J. Martinez and Devang K. Pandya and
Wei-Ming Lin",
title = "On designing fast nonuniformly distributed {IP}
address lookup hashing algorithms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1916--1925",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Choi:2009:SPC,
author = "Lynn Choi and Hyogon Kim and Sunil Kim and Moon Hae
Kim",
title = "Scalable packet classification through rulebase
partitioning using the maximum entropy hashing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1926--1935",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baldi:2009:PFP,
author = "Mario Baldi and Guido Marchetto",
title = "Pipeline forwarding of packets based on a low-accuracy
network-distributed common time reference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1936--1949",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Menth:2009:RAP,
author = "Michael Menth and Michael Duelli and Ruediger Martin
and Jens Milbrandt",
title = "Resilience analysis of packet-switched communication
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1950--1963",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Seetharaman:2009:RCL,
author = "Srini Seetharaman and Volker Hilt and Markus Hofmann
and Mostafa Ammar",
title = "Resolving cross-layer conflict between overlay routing
and traffic engineering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1964--1977",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gourgy:2009:TBO,
author = "Amir Gourgy and Ted H. Szymanski and Douglas G. Down",
title = "On tracking the behavior of an output-queued switch
using an input-queued switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1978--1988",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rai:2009:PAO,
author = "Smita Rai and Ching-Fong Su and Biswanath Mukherjee",
title = "On provisioning in all-optical networks: an
impairment-aware approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "1989--2001",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Turkcu:2009:PON,
author = "Onur Turkcu and Suresh Subramaniam",
title = "Performance of optical networks with limited
reconfigurability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "2002--2013",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2009:CLC,
author = "Yi-Ting Chen and Jay Cheng and Duan-Shin Lee",
title = "Constructions of linear compressors, nonovertaking
delay lines, and flexible delay lines for optical
packet switching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "17",
number = "6",
pages = "2014--2027",
month = dec,
year = "2009",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 15 18:25:46 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lu:2010:PUL,
author = "Guohan Lu and Yan Chen and Stefan Birrer and
Fabi{\'a}n E. Bustamante and Xing Li",
title = "{POPI}: a user-level tool for inferring router packet
forwarding priority",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "1--14",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020799",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet forwarding prioritization (PFP) in routers is
one of the mechanisms commonly available to network
operators. PFP can have a significant impact on the
accuracy of network measurements, the performance of
applications and the effectiveness of network
troubleshooting procedures. Despite its potential
impacts, no information on PFP settings is readily
available to end users. In this paper, we present an
end-to-end approach for PFP inference and its
associated tool, POPI. This is the first attempt to
infer router packet forwarding priority through
end-to-end measurement. POPI enables users to discover
such network policies through measurements of packet
losses of different packet types. We evaluated our
approach via statistical analysis, simulation and
wide-area experimentation in PlanetLab. We employed
POPI to analyze 156 paths among 162 PlanetLab sites.
POPI flagged 15 paths with multiple priorities, 13 of
which were further validated through hop-by-hop loss
rates measurements. In addition, we surveyed all
related network operators and received responses for
about half of them all confirming our inferences.
Besides, we compared POPI with the inference mechanisms
through other metrics such as packet reordering [called
out-of-order (OOO)]. OOO is unable to find many
priority paths such as those implemented via traffic
policing. On the other hand, interestingly, we found it
can detect existence of the mechanisms which induce
delay differences among packet types such as slow
processing path in the router and port-based load
sharing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network inference; network neutrality; packet
forwarding priority",
}
@Article{Cohen:2010:CAE,
author = "Reuven Cohen and Liran Katzir",
title = "Computational analysis and efficient algorithms for
micro and macro {OFDMA} downlink scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "15--26",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022937",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Orthogonal frequency-division multiple access (OFDMA)
is one of the most important modulation and access
methods for the future mobile networks. Before
transmitting a frame on the downlink, an OFDMA base
station has to invoke an algorithm that determines
which of the pending packets will be transmitted, what
modulation should be used for each of them, and how to
construct the complex OFDMA frame matrix as a
collection of rectangles that fit into a single matrix
with fixed dimensions. We propose efficient algorithms,
with performance guarantee, that solve this intricate
OFDMA scheduling problem by breaking it down into two
subproblems, referred to as macro and micro scheduling.
We analyze the computational complexity of these
subproblems and develop efficient algorithms for
solving them.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "orthogonal frequency-division multiple access (OFDMA);
scheduling; wireless",
}
@Article{Lee:2010:SEE,
author = "Sanghwan Lee and Zhi-Li Zhang and Sambit Sahu and
Debanjan Saha",
title = "On suitability of {Euclidean} embedding for host-based
network coordinate systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "27--40",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2023322",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the suitability of
embedding Internet hosts into a Euclidean space given
their pairwise distances (as measured by round-trip
time). Using the classical scaling and matrix
perturbation theories, we first establish the (sum of
the) magnitude of negative eigenvalues of the (doubly
centered, squared) distance matrix as a measure of
suitability of Euclidean embedding. We then show that
the distance matrix among Internet hosts contains
negative eigenvalues of large magnitude, implying that
embedding the Internet hosts in a Euclidean space would
incur relatively large errors. Motivated by earlier
studies, we demonstrate that the inaccuracy of
Euclidean embedding is caused by a large degree of
triangle inequality violation (TIV) in the Internet
distances, which leads to negative eigenvalues of large
magnitude. Moreover, we show that the TIVs are likely
to occur locally; hence the distances among these
close-by hosts cannot be estimated accurately using a
global Euclidean embedding. In addition, increasing the
dimension of embedding does not reduce the embedding
errors. Based on these insights, we propose a new
hybrid model for embedding the network nodes using only
a two-dimensional Euclidean coordinate system and small
error adjustment terms. We show that the accuracy of
the proposed embedding technique is as good as, if not
better than, that of a seven-dimensional Euclidean
embedding.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Euclidean embedding; suitability; triangle
inequality",
}
@Article{Chin:2010:DIM,
author = "Jren-Chit Chin and Yu Dong and Wing-Kai Hon and Chris
Yu-Tak Ma and David K. Y. Yau",
title = "Detection of intelligent mobile target in a mobile
sensor network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "41--52",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024309",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of a mobile target (the mouse)
trying to evade detection by one or more mobile sensors
(we call such a sensor a cat) in a closed network area.
We view our problem as a game between two players: the
mouse, and the collection of cats forming a single
(meta-)player. The game ends when the mouse falls
within the sensing range of one or more cats. A cat
tries to determine its optimal strategy to minimize the
worst case expected detection time of the mouse. The
mouse tries to determine an optimal counter movement
strategy to maximize the expected detection time. We
divide the problem into two cases based on the relative
sensing capabilities of the cats and the mouse. When
the mouse has a sensing range smaller than or equal to
the cats', we develop a dynamic programming solution
for the mouse's optimal strategy, assuming high level
information about the cats' movement model. We discuss
how the cats' chosen movement model will affect its
presence matrix in the network, and hence its payoff in
the game. When the mouse has a larger sensing range
than the cats, we show how the mouse can determine its
optimal movement strategy based on local observations
of the cats' movements. We further present a
coordination protocol for the cats to collaboratively
catch the mouse by: (1) forming opportunistically a
cohort to limit the mouse's degree of freedom in
escaping detection; and (2) minimizing the overlap in
the spatial coverage of the cohort's members. Extensive
experimental results verify and illustrate the
analytical results, and evaluate the game's payoffs as
a function of several important system parameters.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "mobile sensor coverage; mobile target detection;
mobility control; sensor coordination",
}
@Article{Wang:2010:TZD,
author = "Lanjia Wang and Zhichun Li and Yan Chen and Zhi Fu and
Xing Li",
title = "Thwarting zero-day polymorphic worms with
network-level length-based signature generation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "53--66",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is crucial to detect zero-day polymorphic worms and
to generate signatures at network gateways or honeynets
so that we can prevent worms from propagating at their
early phase. However, most existing network-based
signatures are specific to exploit and can be easily
evaded. In this paper, we propose generating
vulnerability-driven signatures at network level
without any host-level analysis of worm execution or
vulnerable programs. As the first step, we design a
network-based length-based signature generator (LESG)
for the worms exploiting buffer overflow
vulnerabilities. The signatures generated are intrinsic
to buffer overflows, and are very difficult for
attackers to evade. We further prove the attack
resilience bounds even under worst-case attacks with
deliberate noise injection. Moreover, LESG is fast and
noise tolerant and has efficient signature matching.
Evaluation based on real-world vulnerabilities of
various protocols and real network traffic demonstrates
that LESG is promising in achieving these goals.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "length-based signature; polymorphic worm; worm
signature generation; zero-day vulnerability",
}
@Article{Kamal:2010:NPM,
author = "Ahmed E. Kamal",
title = "{$ 1 + N $} network protection for mesh networks:
network coding-based protection using $p$-cycles",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "67--80",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020503",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "p-Cycles have been proposed for preprovisioned 1 + N
protection in optical mesh networks. Although the
protection circuits are preconfigured, the detection of
failures and the rerouting of traffic can be a time
consuming operation. Another survivable mode of
operation is the 1 + 1 protection mode, in which a
signal is transmitted to the destination on two link
disjoint circuits, hence recovery from failures is
expeditious. However, this requires a large number of
protection circuits. In this paper, we introduce a new
concept in protection: 1 + N protection, in which a
p-Cycle, similar to FIPP $p$-cycles, can be used to
protect a number of bidirectional connections, which
are mutually link disjoint, and also link disjoint from
all links of the p-Cycle. However, data units from
different circuits are combined using network coding,
which can be implemented in a number of technologies,
such as Next Generation SONET (NGS), MPLS/GMPLS, or
IP-over-WDM. The maximum outage time under this
protection scheme can be limited to no more than the
p-Cycle propagation delay. It is also shown how to
implement a hybrid 1 + N and 1 + N protection scheme,
in which on-cycle links are protected using 1 + N
protection, while straddling links, or paths, are
protected using 1 + N protection. Extensions of this
technique to protect multipoint connections are also
introduced. A performance study based on optimal
formulations of the 1 + 1, 1 + N and the hybrid scheme
is introduced. Although 1 + N speed of recovery is
comparable to that of 1 + N protection, numerical
results for small networks indicate that 1 + N is about
30\% more efficient than 1 + 1 protection, in terms of
the amount of protection resources, especially as the
network graph density increases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "$p$-cycles; 1 + N protection; network coding; optical
networks; protection; survivability",
}
@Article{Pong:2010:SSS,
author = "Fong Pong and Nian-Feng Tzeng",
title = "{SUSE}: superior storage-efficiency for routing tables
through prefix transformation and aggregation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "81--94",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022085",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A novel storage design for IP routing table
construction is introduced on the basis of a single
set-associative hash table to support fast longest
prefix matching (LPM). The proposed design involves two
key techniques to lower table storage required
drastically: (1) storing transformed prefix
representations; and (2) accommodating multiple
prefixes per table entry via prefix aggregation,
achieving superior storage-efficiency (SUSE). With each
prefix ($ p(x)$) maneuvered as a polynomial, $ p(x) =
q(x) \times g(x) + r(x)$ based on a divisor $ g(x)$,
SUSE keeps only $ q(x)$ rather than full and long $
p(x)$ in an $ r(x)$-indexed table with $ 2^{\hbox
{degree}(g(x))}$ entries, because $ q(x)$ and $ r(x)$
uniquely identify $ p(x)$. Additionally, using $ r(x)$
as the hash index exhibits better distribution than do
original prefixes, reducing hash collisions, which can
be tolerated further by the set-associative design.
Given a set of chosen prefix lengths (called 'treads'),
all prefixes are rounded down to nearest treads under
SUSE before hashed to the table using their transformed
representations so that prefix aggregation
opportunities abound in hash entries. SUSE yields
significant table storage reduction and enjoys fast
lookups and speedy incremental updates not possible for
a typical trie-based design, with the worst-case lookup
time shown upper-bounded theoretically by the number of
treads $ \zeta $ but found experimentally to be 4
memory accesses when $ \zeta $ equals 8. SUSE makes it
possible to fit a large routing table with 256 K (or
even 1 M) prefixes in on-chip SRAM by today's ASIC
technology. It solves both the memory- and the
bandwidth-intensive problems faced by IP routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "hash tables; linear feedback shift registers; longest
prefix matching; prefix aggregation; prefix
transformation; routing tables; table storage; tries",
}
@Article{Ruhrup:2010:MEB,
author = "Stefan R{\"u}hrup and Hanna Kalosha and Amiya Nayak
and Ivan Stojmenovi{\'c}",
title = "Message-efficient beaconless georouting with
guaranteed delivery in wireless sensor, ad hoc, and
actuator networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "95--108",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022084",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Beaconless georouting algorithms are fully reactive
and work without prior knowledge of their neighbors.
However, existing approaches can either not guarantee
delivery or they require the exchange of complete
neighborhood information. We describe two general
methods for completely reactive face routing with
guaranteed delivery. The Beaconless Forwarder
Planarization (BFP) scheme determines correct edges of
a local planar subgraph without hearing from all
neighbors. Face routing then continues properly.
Angular Relaying determines directly the next hop of a
face traversal. Both schemes are based on the
Select-and-Protest principle. Neighbors respond
according to a delay function, but only if they do not
violate a planar subgraph condition. Protest messages
are used to remove falsely selected neighbors that are
not in the planar subgraph. We show that a correct
beaconless planar subgraph construction is not possible
without protests. We also show the impact of the chosen
planar subgraph on the message complexity. With the new
Circlunar Neighborhood Graph (CNG) we can bound the
worst case message complexity of BFP, which is not
possible when using the Gabriel graph (GG) for
planarization. Simulation results show similar message
complexities in the average case when using CNG and GG.
Angular Relaying uses a delay function that is based on
the angular distance to the previous hop. We develop a
theoretical framework for delay functions and show both
theoretically and in simulations that with a function
of angle and distance we can reduce the number of
protests by a factor of 2 compared to a simple
angle-based delay function.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "ad hoc networks; beaconless routing; contention-based
forwarding; geographic routing; wireless sensor
networks",
}
@Article{Oliveira:2010:COI,
author = "Ricardo Oliveira and Dan Pei and Walter Willinger and
Beichuan Zhang and Lixia Zhang",
title = "The (in)completeness of the observed {Internet}
{AS}-level structure",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "109--122",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2020798",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Despite significant efforts to obtain an accurate
picture of the Internet's connectivity structure at the
level of individual autonomous systems (ASes), much has
remained unknown in terms of the quality of the
inferred AS maps that have been widely used by the
research community. In this paper, we assess the
quality of the inferred Internet maps through case
studies of a sample set of ASes. These case studies
allow us to establish the ground truth of connectivity
between this set of ASes and their directly connected
neighbors. A direct comparison between the ground truth
and inferred topology maps yield insights into
questions such as which parts of the actual topology
are adequately captured by the inferred maps, which
parts are missing and why, and what is the percentage
of missing links in these parts. This information is
critical in assessing, for each class of real-world
networking problems, whether the use of currently
inferred AS maps or proposed AS topology models is, or
is not, appropriate. More importantly, our newly gained
insights also point to new directions towards building
realistic and economically viable Internet topology
maps.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "border gateway protocol (BGP); interdomain routing;
Internet topology",
}
@Article{Ni:2010:EDR,
author = "Jian Ni and Haiyong Xie and Sekhar Tatikonda and Yang
Richard Yang",
title = "Efficient and dynamic routing topology inference from
end-to-end measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "123--135",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022538",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Inferring the routing topology and link performance
from a node to a set of other nodes is an important
component in network monitoring and application design.
In this paper, we propose a general framework for
designing topology inference algorithms based on
additive metrics. The framework can flexibly fuse
information from multiple measurements to achieve
better estimation accuracy. We develop computationally
efficient (polynomial-time) topology inference
algorithms based on the framework. We prove that the
probability of correct topology inference of our
algorithms converges to one exponentially fast in the
number of probing packets. In particular, for
applications where nodes may join or leave frequently
such as overlay network construction, application-layer
multicast, and peer-to-peer file sharing/streaming, we
propose a novel sequential topology inference algorithm
that significantly reduces the probing overhead and can
efficiently handle node dynamics. We demonstrate the
effectiveness of the proposed inference algorithms via
Internet experiments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "network measurement; network monitoring; network
tomography; routing topology inference",
}
@Article{Chamberland:2010:GAN,
author = "Steven Chamberland",
title = "Global access network evolution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "136--149",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2021430",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose to tackle the problem of
updating the access network in order to connect new
subscribers and to satisfy the new class of service
requirements for the existing subscribers to offer, for
instance, new services such as high-definition
television (HDTV) over the Internet protocol (IPTV).
Four important access network
architectures/technologies are considered: the digital
subscriber line (xDSL) technologies deployed directly
from the central office (CO), the fiber-to-the-node
(FTTN), the fiber-to-the-micro-node (FTTn) and the
fiber-to-the-premises (FTTP). An integer mathematical
programming model is proposed for this network planning
problem. Next, a heuristic algorithm based on the tabu
search principle is proposed to find 'good' feasible
solutions within a reasonable amount of computational
time. Finally, numerical results are presented and
analyzed. To assess the quality of the solutions found
with the proposed algorithm, they are compared to the
optimal solutions found using a commercial
implementation of the branch-and-bound algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "access network evolution problem; branch-and-bound;
digital subscriber line (xDSL) technologies;
fiber-to-the-micro-node (FTTn); fiber-to-the-node
(FTTN); fiber-to-the-premises (FTTP); integer
mathematical programming; tabu search; xDSL from the
central office (CO)",
}
@Article{Yu:2010:DRF,
author = "Zhen Yu and Yong Guan",
title = "A dynamic en-route filtering scheme for data reporting
in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "150--163",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026901",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless sensor networks, adversaries can inject
false data reports via compromised nodes and launch DoS
attacks against legitimate reports. Recently, a number
of filtering schemes against false reports have been
proposed. However, they either lack strong filtering
capacity or cannot support highly dynamic sensor
networks very well. Moreover, few of them can deal with
DoS attacks simultaneously. In this paper, we propose a
dynamic en-route filtering scheme that addresses both
false report injection and DoS attacks in wireless
sensor networks. In our scheme, each node has a hash
chain of authentication keys used to endorse reports;
meanwhile, a legitimate report should be authenticated
by a certain number of nodes. First, each node
disseminates its key to forwarding nodes. Then, after
sending reports, the sending nodes disclose their keys,
allowing the forwarding nodes to verify their reports.
We design the Hill Climbing key dissemination approach
that ensures the nodes closer to data sources have
stronger filtering capacity. Moreover, we exploit the
broadcast property of wireless communication to defeat
DoS attacks and adopt multipath routing to deal with
the topology changes of sensor networks. Simulation
results show that compared to existing solutions, our
scheme can drop false reports earlier with a lower
memory requirement, especially in highly dynamic sensor
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "data reporting; en-route filtering scheme; wireless
sensor networks",
}
@Article{Fay:2010:WSD,
author = "Damien Fay and Hamed Haddadi and Andrew Thomason and
Andrew W. Moore and Richard Mortier and Almerima
Jamakovic and Steve Uhlig and Miguel Rio",
title = "Weighted spectral distribution for {Internet} topology
analysis: theory and applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "164--176",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022369",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Comparing graphs to determine the level of underlying
structural similarity between them is a widely
encountered problem in computer science. It is
particularly relevant to the study of Internet
topologies, such as the generation of synthetic
topologies to represent the Internet's AS topology. We
derive a new metric that enables exactly such a
structural comparison: the weighted spectral
distribution. We then apply this metric to three
aspects of the study of the Internet's AS topology. (i)
We use it to quantify the effect of changing the mixing
properties of a simple synthetic network generator.
(ii) We use this quantitative understanding to examine
the evolution of the Internet's AS topology over
approximately seven years, finding that the distinction
between the Internet core and periphery has blurred
over time. (iii) We use the metric to derive optimal
parameterizations of several widely used AS topology
generators with respect to a large-scale measurement of
the real AS topology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "graph metrics; Internet topology; spectral graph
theory; topology generation",
}
@Article{Ohsita:2010:GRV,
author = "Yuichi Ohsita and Takashi Miyamura and Shin'ichi
Arakawa and Shingo Ata and Eiji Oki and Kohei Shiomoto
and Masayuki Murata",
title = "Gradually reconfiguring virtual network topologies
based on estimated traffic matrices",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "177--189",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022263",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic matrix is essential to traffic engineering
(TE) methods. Because it is difficult to monitor
traffic matrices directly, several methods for
estimating them from link loads have been proposed.
However, estimated traffic matrix includes estimation
errors which degrade the performance of TE
significantly. In this paper, we propose a method that
reduces estimation errors while reconfiguring the
virtual network topology (VNT) by cooperating with the
VNT reconfiguration. In our method, the VNT
reconfiguration is divided into multiple stages instead
of reconfiguring the suitable VNT at once. By dividing
the VNT reconfiguration into multiple stages, our
traffic matrix estimation method calibrates and reduces
the estimation errors in each stage by using
information monitored in prior stages. We also
investigate the effectiveness of our proposal using
simulations. The results show that our method can
improve the accuracy of the traffic matrix estimation
and achieve an adequate VNT as is the case with the
reconfiguration using the actual traffic matrices.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "GMPLS; traffic engineering; traffic matrix estimation;
virtual network topology (VNT)",
}
@Article{Rezaei:2010:DRS,
author = "Behnam A. Rezaei and Nima Sarshar and Vwani P.
Roychowdhury",
title = "Distributed resource sharing in low-latency wireless
ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "190--201",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2025928",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the growing abundance of portable wireless
communication devices, a challenging question that
arises is whether one can efficiently harness the
collective communication and computation power of these
devices. In this paper, we investigate this question by
studying a streaming application. Consider a network of
$N$ wireless nodes, each of power $P$, in which one or
more nodes are interested in receiving a data stream
from a fixed server node $S$. We ask whether
distributed communication mechanisms exist to route
media packets from $S$ to the arbitrary but fixed
receiver, such that (1) the average communication delay
$L$ is short, (2) the load is balanced, i.e., all nodes
in the ensemble spend roughly the same amount of
average power, and, more importantly, (3) power
resources of all nodes are optimally shared, i.e., the
lifetime of the network is comparable to an optimally
designed network with $L$ nodes whose total power is $
N \times P$.\par
We develop a theoretical framework for incorporation of
random long range routes into wireless ad hoc
networking protocols that can achieve such performance.
Surprisingly, we show that wireless ad hoc routing
algorithms, based on this framework, exist that can
deliver this performance. The proposed solution is a
randomized network structuring and packet routing
framework whose communication latency is only $ L =
O(\log^2 N)$ hops, on average, compared to $ O(\sqrt
N)$ in nearest neighbor communications while
distributing the power requirement almost equally over
all nodes. Interestingly, all network formation and
routing algorithms are completely decentralized, and
the packets arriving at a node are routed randomly and
independently, based only on the source and destination
locations. The distributed nature of the algorithm
allows it to be implemented within standard wireless ad
hoc communication protocols and makes the proposed
framework a compelling candidate for harnessing
collective network resources in a truly large-scale
wireless ad hoc networking environment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "low latency; multipath routing; resource sharing;
scalability; small world; wireless ad hoc networks",
}
@Article{Shu:2010:CTO,
author = "Tao Shu and Marwan Krunz",
title = "Coverage-time optimization for clustered wireless
sensor networks: a power-balancing approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "202--215",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2022936",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the maximization of the
coverage time for a clustered wireless sensor network
by optimal balancing of power consumption among cluster
heads (CHs). Clustering significantly reduces the
energy consumption of individual sensors, but it also
increases the communication burden on CHs. To
investigate this tradeoff, our analytical model
incorporates both intra- and intercluster traffic.
Depending on whether location information is available
or not, we consider optimization formulations under
both deterministic and stochastic setups, using a
Rayleigh fading model for intercluster communications.
For the deterministic setup, sensor nodes and CHs are
arbitrarily placed, but their locations are known. Each
CH routes its traffic directly to the sink or relays it
through other CHs. We present a coverage-time-optimal
joint clustering/routing algorithm, in which the
optimal clustering and routing parameters are computed
using a linear program. For the stochastic setup, we
consider a cone-like sensing region with uniformly
distributed sensors and provide optimal power
allocation strategies that guarantee (in a
probabilistic sense) an upper bound on the end-to-end
(inter-CH) path reliability. Two mechanisms are
proposed for achieving balanced power consumption in
the stochastic case: a routing-aware optimal cluster
planning and a clustering-aware optimal random relay.
For the first mechanism, the problem is formulated as a
signomial optimization, which is efficiently solved
using generalized geometric programming. For the second
mechanism, we show that the problem is solvable in
linear time. Numerical examples and simulations are
used to validate our analysis and study the performance
of the proposed schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "clustering; coverage time; generalized geometric
programming; linear programming; sensor networks;
signomial optimization; topology control",
}
@Article{Bredin:2010:DSN,
author = "Jonathan L. Bredin and Erik D. Demaine and Mohammad
Taghi Hajiaghayi and Daniela Rus",
title = "Deploying sensor networks with guaranteed fault
tolerance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "216--228",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024941",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of deploying or repairing a
sensor network to guarantee a specified level of
multipath connectivity ($k$-connectivity) between all
nodes. Such a guarantee simultaneously provides fault
tolerance against node failures and high overall
network capacity (by the max-flow min-cut theorem). We
design and analyze the first algorithms that place an
almost-minimum number of additional sensors to augment
an existing network into a $k$-connected network, for
any desired parameter $k$. Our algorithms have provable
guarantees on the quality of the solution.
Specifically, we prove that the number of additional
sensors is within a constant factor of the absolute
minimum, for any fixed $k$. We have implemented greedy
and distributed versions of this algorithm, and
demonstrate in simulation that they produce
high-quality placements for the additional sensors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; augmentation; graph
algorithms; sensor networks",
}
@Article{Zhang:2010:MBA,
author = "Bo Zhang and Tze Sing Eugene Ng and Animesh Nandi and
Rudolf H. Riedi and Peter Druschel and Guohui Wang",
title = "Measurement-based analysis, modeling, and synthesis of
the {Internet} delay space",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "229--242",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024083",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Understanding the characteristics of the Internet
delay space (i.e., the all-pairs set of static
round-trip propagation delays among edge networks in
the Internet) is important for the design of
global-scale distributed systems. For instance,
algorithms used in overlay networks are often sensitive
to violations of the triangle inequality and to the
growth properties within the Internet delay space.
Since designers of distributed systems often rely on
simulation and emulation to study design alternatives,
they need a realistic model of the Internet delay
space. In this paper, we analyze measured delay spaces
among thousands of Internet edge networks and quantify
key properties that are important for distributed
system design. Our analysis shows that existing delay
space models do not adequately capture these important
properties of the Internet delay space. Furthermore, we
derive a simple model of the Internet delay space based
on our analytical findings. This model preserves the
relevant metrics far better than existing models,
allows for a compact representation, and can be used to
synthesize delay data for simulations and emulations at
a scale where direct measurement and storage are
impractical. We present the design of a publicly
available delay space synthesizer tool called DS$^2$
and demonstrate its effectiveness.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "analysis; distributed system; Internet delay space;
measurement; modeling; simulation; synthesis",
}
@Article{Law:2010:DCH,
author = "Lap Kong Law and Konstantinos Pelechrinis and Srikanth
V. Krishnamurthy and Michalis Faloutsos",
title = "Downlink capacity of hybrid cellular ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "243--256",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2023651",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Augmenting cellular networks with shorter multihop
wireless links that carry traffic to/from a base
station can be expected to facilitate higher rates and
improved spatial reuse, therefore potentially yielding
increased wireless capacity. The resulting network is
referred to as a hybrid network. However, while this
approach can result in shorter range higher rate links
and improved spatial reuse, which together favor a
capacity increase, it relies on multihop forwarding,
which is detrimental to the overall capacity. In this
paper, our objective is to evaluate the impact of these
conflicting factors on the overall capacity of the
hybrid network. We formally define the capacity of the
network as the maximum possible downlink throughput
under the constraint of max-min fairness. We
analytically compute the capacity of both one- and
two-dimensional hybrid networks with regular placement
of base stations and users. While almost no capacity
benefits are possible with linear networks due to poor
spatial reuse, significant capacity improvements with
two-dimensional networks are possible in certain
parametric regimes. Our simulations also demonstrate
that in both cases, if the users are placed randomly,
the behavioral results are similar to those with
regular placement of users.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "capacity; hybrid networks",
}
@Article{Wang:2010:UMI,
author = "Xiaoming Wang and Dmitri Loguinov",
title = "Understanding and modeling the {Internet} topology:
economics and evolution perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "257--270",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024145",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we seek to understand the intrinsic
reasons for the well-known phenomenon of heavy-tailed
degree in the Internet AS graph and argue that in
contrast to traditional models based on preferential
attachment and centralized optimization, the Pareto
degree of the Internet can be explained by the
evolution of wealth associated with each ISP. The
proposed topology model utilizes a simple
multiplicative stochastic process that determines each
ISP's wealth at different points in time and several
'maintenance' rules that keep the degree of each node
proportional to its wealth. Actual link formation is
determined in a decentralized fashion based on random
walks, where each ISP individually decides when and how
to increase its degree. Simulations show that the
proposed model, which we call Wealth-based Internet
Topology (WIT), produces scale-free random graphs with
tunable exponent $ \alpha $ and high clustering
coefficients (between 0.35 and 0.5) that stay invariant
as the size of the graph increases. This evolution
closely mimics that of the Internet observed since
1997.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "autonomous systems; clustering coefficient; degree
distribution; random walk; wealth evolution; {Internet}
topology",
}
@Article{Bathula:2010:QBM,
author = "Balagangadhar G. Bathula and Vinod M. Vokkarane",
title = "{QoS}-based manycasting over optical burst-switched
{(OBS)} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "271--283",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024498",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many distributed applications require a group of
destinations to be coordinated with a single source.
Multicasting is a communication paradigm to implement
these distributed applications. However in
multicasting, if at least one of the members in the
group cannot satisfy the service requirement of the
application, the multicast request is said to be
blocked. On the contrary in manycasting, destinations
can join or leave the group, depending on whether it
satisfies the service requirement or not. This dynamic
membership based destination group decreases request
blocking. We study the behavior of manycasting over
optical burst-switched networks (OBS) based on multiple
quality of service (QoS) constraints. These multiple
constraints can be in the form of physical-layer
impairments, transmission delay, and reliability of the
link. Each application requires its own QoS threshold
attributes. Destinations qualify only if they satisfy
the required QoS constraints set up by the application.
We have developed a mathematical model based on lattice
algebra for this multiconstraint problem. Due to
multiple constraints, burst blocking could be high. We
propose two algorithms to minimize request blocking for
the multiconstrained manycast (MCM) problem. Using
extensive simulation results, we have calculated the
average request blocking for the proposed algorithms.
Our simulation results show that MCM-shortest path tree
(MCM-SPT) algorithm performs better than MCM-dynamic
membership (MCM-DM) for delay constrained services and
realtime service, where as data services can be better
provisioned using MCM-DM algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "BER; constraint-based routing (CBR); manycast; optical
burst-switched networks (OBS); QoS routing; quality of
service (QoS); WDM",
}
@Article{Wu:2010:IFC,
author = "Bin Wu and Kwan L. Yeung and Pin-Han Ho",
title = "{ILP} formulations for $p$-cycle design without
candidate cycle enumeration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "284--295",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2025769",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The concept of $p$-cycle (preconfigured protection
cycle) allows fast and efficient span protection in
wavelength division multiplexing (WDM) mesh networks.
To design $p$-cycles for a given network, conventional
algorithms need to enumerate cycles in the network to
form a candidate set, and then use an integer linear
program (ILP) to find a set of $p$-cycles from the
candidate set. Because the size of the candidate set
increases exponentially with the network size,
candidate cycle enumeration introduces a huge number of
ILP variables and slows down the optimization process.
In this paper, we focus on $p$-cycle design without
candidate cycle enumeration. Three ILPs for solving the
problem of spare capacity placement (SCP) are first
formulated. They are based on recursion, flow
conservation, and cycle exclusion, respectively. We
show that the number of ILP variables/constraints in
our cycle exclusion approach only increases linearly
with the network size. Then, based on cycle exclusion,
we formulate an ILP for solving the joint capacity
placement (JCP) problem. Numerical results show that
our ILPs are very efficient in generating $p$-cycle
solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "$p$-cycle (pre-configured protection cycle); integer
linear program (ILP); protection; wavelength division
multiplexing (WDM) mesh networks",
}
@Article{Kannan:2010:AAM,
author = "Rajgopal Kannan and Shuangqing Wei and Vasu
Chakravarthy and Muralidhar Rangaswamy",
title = "Approximation algorithms for minimum energy
transmission scheduling in rate and duty-cycle
constrained wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "296--306",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026900",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a constrained energy optimization called
Minimum Energy Scheduling Problem (MESP) for a wireless
network of users transmitting over time slots, where
the constraints arise because of interference between
wireless nodes that limits their transmission rates
along with load and duty-cycle (ON-OFF) restrictions.
Since traditional optimization methods using Lagrange
multipliers do not work well and are computationally
expensive given the nonconvex constraints, we consider
approximation schemes for finding the optimal (minimum
energy) transmission schedule by discretizing power
levels over the interference channel. First, we show
the toughness of approximating MESP for an arbitrary
number of users $N$ even with a fixed $M$. For any $
r_0$, we develop an algorithm for computing the optimal
number of discrete power levels per time slot $ (o(1 /
\epsilon))$, and use this to design a $ (1, 1 +
\epsilon)$-FPAS that consumes no more energy than the
optimal while violating each rate constraint by at most
a $ 1 + \epsilon $-factor. For wireless networks with
low-cost transmitters, where nodes are restricted to
transmitting at a fixed power over active time slots,
we develop a two-factor approximation for finding the
optimal fixed transmission power value $ P_{\hbox
{opt}}$ that results in the minimum energy schedule.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; duty cycle constraints;
interference channels; minimum energy scheduling
problem (MESP); wireless networks",
}
@Article{Ray:2010:AAD,
author = "Saikat Ray and Roch Gu{\'e}rin and Kin-Wah Kwong and
Rute Sofia",
title = "Always acyclic distributed path computation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "307--319",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2025374",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed routing algorithms may give rise to
transient loops during path recomputation, which can
pose significant stability problems in high-speed
networks. We present a new algorithm, Distributed Path
Computation with Intermediate Variables (DIV), which
can be combined with any distributed routing algorithm
to guarantee that the directed graph induced by the
routing decisions remains acyclic at all times. The key
contribution of DIV, besides its ability to operate
with any routing algorithm, is an update mechanism
using simple message exchanges between neighboring
nodes that guarantees loop-freedom at all times. DIV
provably outperforms existing loop-prevention
algorithms in several key metrics such as frequency of
synchronous updates and the ability to maintain paths
during transitions. Simulation results quantifying
these gains in the context of shortest path routing are
presented. In addition, DIV's universal applicability
is illustrated by studying its use with a routing that
operates according to a nonshortest path objective.
Specifically, the routing seeks robustness against
failures by maximizing the number of next-hops
available at each node for each destination.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distance-vector routing; loop-free routing",
}
@Article{Li:2010:RPR,
author = "Mo Li and Yunhao Liu",
title = "Rendered path: range-free localization in anisotropic
sensor networks with holes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "1",
pages = "320--332",
month = feb,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2024940",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:16:03 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Sensor positioning is a crucial part of many
location-dependent applications that utilize wireless
sensor networks (WSNs). Current localization approaches
can be divided into two groups: range-based and
range-free. Due to the high costs and critical
assumptions, the range-based schemes are often
impractical for WSNs. The existing range-free schemes,
on the other hand, suffer from poor accuracy and low
scalability. Without the help of a large number of
uniformly deployed seed nodes, those schemes fail in
anisotropic WSNs with possible holes. To address this
issue, we propose the Rendered Path (REP) protocol. To
the best of our knowledge, REP is the only range-free
protocol for locating sensors with constant number of
seeds in anisotropic sensor networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "distributed algorithms; distributed computing;
multisensor systems; position measurement",
}
@Article{Shrimali:2010:CIT,
author = "Gireesh Shrimali and Aditya Akella and Almir
Mutapcic",
title = "Cooperative interdomain traffic engineering using
{Nash} bargaining and decomposition",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "341--352",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026748",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a novel approach to interdomain traffic
engineering based on the concepts of Nash bargaining
and dual decomposition. Under this scheme, ISPs use an
iterative procedure to jointly optimize a social cost
function, referred to as the Nash product. We show that
the global optimization problem can be separated into
subproblems by introducing appropriate shadow prices on
the interdomain flows. These subproblems can then be
solved independently and in a decentralized manner by
the individual ISPs. Our approach does not require the
ISPs to share any sensitive internal information, such
as network topology or link weights. More importantly,
our approach is provably Pareto-efficient and fair.
Therefore, we believe that our approach is highly
amenable to adoption by ISPs when compared to past
approaches. We also conduct simulation studies of our
approach over several real ISP topologies. Our
evaluation shows that the approach converges quickly,
offers equitable performance improvements to ISPs, is
significantly better than unilateral approaches (e.g.,
hot-potato routing) and offers the same performance as
a centralized solution with full knowledge.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cooperative game theory; dual decomposition;
hot-potato routing; interdomain traffic engineering
(TE); ISP peering; Nash bargaining; Nash equilibrium",
}
@Article{Andrei:2010:PDD,
author = "Dragos Andrei and Massimo Tornatore and Marwan
Batayneh and Charles U. Martel and Biswanath
Mukherjee",
title = "Provisioning of deadline-driven requests with flexible
transmission rates in {WDM} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "353--366",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026576",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the increasing diversity of applications
supported over optical networks, new service guarantees
must be offered to network customers. Among the
emerging data-intensive applications are those which
require their data to be transferred before a
predefined deadline. We call these deadline-driven
requests (DDRs). In such applications, data-transfer
finish time (which must be accomplished before the
deadline) is the key service guarantee that the
customer wants. In fact, the amount of bandwidth
allocated to transfer a request is not a concern for
the customer as long as its service deadline is met.
Hence, the service provider can choose the bandwidth
(transmission rate) to provision the request. In this
case, even though DDRs impose a deadline constraint,
they provide scheduling flexibility for the service
provider since it can choose the transmission rate
while achieving two objectives: (1) satisfying the
guaranteed deadline; and (2) optimizing the network's
resource utilization. We investigate the problem of
provisioning DDRs with flexible transmission rates in
wavelength-division multiplexing (WDM) mesh networks,
although this approach is generalizable to other
networks also. We investigate several (fixed and
adaptive to network state) bandwidth-allocation
policies and study the benefit of allowing dynamic
bandwidth adjustment, which is found to generally
improve network performance. We show that the
performance of the bandwidth-allocation algorithms
depends on the DDR traffic distribution and on the node
architecture and its parameters. In addition, we
develop a mathematical formulation for our problem as a
mixed integer linear program (MILP), which allows
choosing flexible transmission rates and provides a
lower bound for our provisioning algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "bandwidth-on-demand; deadline-driven request (DDR);
flexible transmission rate; large data transfers;
wavelength-division multiplexing (WDM) network",
}
@Article{Mondal:2010:UME,
author = "Amit Mondal and Aleksandar Kuzmanovic",
title = "Upgrading mice to elephants: effects and end-point
solutions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "367--378",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2025927",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Short TCP flows may suffer significant response-time
performance degradations during network congestion.
Unfortunately, this creates an incentive for
misbehavior by clients of interactive applications
(e.g., gaming, telnet, web): to send 'dummy' packets
into the network at a TCP-fair rate even when they have
no data to send, thus improving their performance in
moments when they do have data to send. Even though no
'law' is violated in this way, a large-scale deployment
of such an approach has the potential to seriously
jeopardize one of the core Internet's principles--
statistical multiplexing. We quantify, by means of
analytical modeling and simulation, gains achievable by
the above misbehavior. Our research indicates that
easy-to-implement application-level techniques are
capable of dramatically reducing incentives for
conducting the above transgressions, still without
compromising the idea of statistical multiplexing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "interactive application; retransmission timeout;
statistical multiplexing; TCP",
}
@Article{Xi:2010:DAM,
author = "Yufang Xi and Edmund M. Yeh",
title = "Distributed algorithms for minimum cost multicast with
network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "379--392",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2026275",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network coding techniques are used to find the
minimum-cost transmission scheme for multicast sessions
with or without elastic rate demand. It is shown that
in wireline networks, solving for the optimal coding
subgraphs in network coding is equivalent to finding
the optimal routing scheme in a multicommodity flow
problem. A set of node-based distributed gradient
projection algorithms are designed to jointly implement
congestion control/routing at the source node and
'virtual' routing at intermediate nodes. The analytical
framework and distributed algorithms are further
extended to interference-limited wireless networks
where link capacities are functions of the
signal-to-interference-plus-noise ratio (SINR). To
achieve minimum-cost multicast in this setting, the
transmission powers of links must be jointly optimized
with coding subgraphs and multicast input rates.
Node-based power allocation and power control
algorithms are developed for the power optimization.
The power algorithms, when iterated in conjunction with
the congestion control and routing algorithms, converge
to the jointly optimal multicast configuration. The
scaling matrices required in the gradient projection
algorithms are explicitly derived and are shown to
guarantee fast convergence to the optimum from any
initial condition.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-layer optimization; distributed algorithms;
network coding; wireless networks",
}
@Article{Gupta:2010:DAW,
author = "Gagan Raj Gupta and Ness B. Shroff",
title = "Delay analysis for wireless networks with single hop
traffic and general interference constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "393--405",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032181",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a class of wireless networks with general
interference constraints on the set of links that can
be served simultaneously at any given time. We restrict
the traffic to be single-hop, but allow for
simultaneous transmissions as long as they satisfy the
underlying interference constraints. We begin by
proving a lower bound on the delay performance of any
scheduling scheme for this system. We then analyze a
large class of throughput optimal policies which have
been studied extensively in the literature. The delay
analysis of these systems has been limited to
asymptotic behavior in the heavy traffic regime and
order results. We obtain a tighter upper bound on the
delay performance for these systems. We use the
insights gained by the upper and lower bound analysis
to develop an estimate for the expected delay of
wireless networks with mutually independent arrival
streams operating under the well-known maximum weighted
matching (MWM) scheduling policy. We show via
simulations that the delay performance of the MWM
policy is often close to the lower bound, which means
that it is not only throughput optimal, but also
provides excellent delay performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "delay analysis; interference; Lyapunov function;
scheduling; wireless networks",
}
@Article{Huang:2010:OTP,
author = "Longbo Huang and Michael J. Neely",
title = "The optimality of two prices: maximizing revenue in a
stochastic communication system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "406--419",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2028423",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper considers the problem of pricing and
transmission scheduling for an access point (AP) in a
wireless network, where the AP provides service to a
set of mobile users. The goal of the AP is to maximize
its own time-average profit. We first obtain the
optimum time-average profit of the AP and prove the
'Optimality of Two Prices' theorem. We then develop an
online scheme that jointly solves the pricing and
transmission scheduling problem in a dynamic
environment. The scheme uses an admission price and a
business decision as tools to regulate the incoming
traffic and to maximize revenue. We show the scheme can
achieve any average profit that is arbitrarily close to
the optimum, with a tradeoff in average delay. This
holds for general Markovian dynamics for channel and
user state variation, and does not require a priori
knowledge of the Markov model. The model and
methodology developed in this paper are general and
apply to other stochastic settings where a single party
tries to maximize its time-average profit.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic control; Lyapunov analysis; optimization;
pricing; queueing; wireless mesh network",
}
@Article{Radunovic:2010:TPO,
author = "Bo{\v{z}}idar Radunovi{\'c} and Christos Gkantsidis
and Peter Key and Pablo Rodriguez",
title = "Toward practical opportunistic routing with
intra-session network coding for mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "420--433",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030682",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider opportunistic routing in wireless mesh
networks. We exploit the inherent diversity of the
broadcast nature of wireless by making use of multipath
routing. We present a novel optimization framework for
opportunistic routing based on network utility
maximization (NUM) that enables us to derive optimal
flow control, routing, scheduling, and rate adaptation
schemes, where we use network coding to ease the
routing problem. All previous work on NUM assumed
unicast transmissions; however, the wireless medium is
by its nature broadcast and a transmission will be
received by multiple nodes. The structure of our design
is fundamentally different; this is due to the fact
that our link rate constraints are defined per
broadcast region instead of links in isolation. We
prove optimality and derive a primal-dual algorithm
that lays the basis for a practical protocol. Optimal
MAC scheduling is difficult to implement, and we use
802.11-like random scheduling rather than optimal in
our comparisons. Under random scheduling, our protocol
becomes fully decentralized (we assume ideal
signaling). The use of network coding introduces
additional constraints on scheduling, and we propose a
novel scheme to avoid starvation. We simulate realistic
topologies and show that we can achieve 20\%-200\%
throughput improvement compared to single path routing,
and several times compared to a recent related
opportunistic protocol (MORE).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "broadcast; fairness; flow control; multipath routing;
network coding; opportunistic routing; rate adaptation;
wireless mesh networks",
}
@Article{Misra:2010:CRN,
author = "Satyajayant Misra and Seung Don Hong and Guoliang Xue
and Jian Tang",
title = "Constrained relay node placement in wireless sensor
networks: formulation and approximations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "434--447",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033273",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "One approach to prolong the lifetime of a wireless
sensor network (WSN) is to deploy some relay nodes to
communicate with the sensor nodes, other relay nodes,
and the base stations. The relay node placement problem
for wireless sensor networks is concerned with placing
a minimum number of relay nodes into a wireless sensor
network to meet certain connectivity or survivability
requirements. Previous studies have concentrated on the
unconstrained version of the problem in the sense that
relay nodes can be placed anywhere. In practice, there
may be some physical constraints on the placement of
relay nodes. To address this issue, we study
constrained versions of the relay node placement
problem, where relay nodes can only be placed at a set
of candidate locations. In the connected relay node
placement problem, we want to place a minimum number of
relay nodes to ensure that each sensor node is
connected with a base station through a bidirectional
path. In the survivable relay node placement problem,
we want to place a minimum number of relay nodes to
ensure that each sensor node is connected with two base
stations (or the only base station in case there is
only one base station) through two node-disjoint
bidirectional paths. For each of the two problems, we
discuss its computational complexity and present a
framework of polynomial time $ O(1)$-approximation
algorithms with small approximation ratios. Extensive
numerical results show that our approximation
algorithms can produce solutions very close to optimal
solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "approximation algorithms; connectivity and
survivability; relay node placement; wireless sensor
networks (WSNs)",
}
@Article{Parvez:2010:ATM,
author = "Nadim Parvez and Anirban Mahanti and Carey
Williamson",
title = "An analytic throughput model for {TCP} {NewReno}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "448--461",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030889",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper develops a simple and accurate stochastic
model for the steady-state throughput of a TCP NewReno
bulk data transfer as a function of round-trip time and
loss behavior. Our model builds upon extensive prior
work on TCP Reno throughput models but differs from
these prior works in three key aspects. First, our
model introduces an analytical characterization of the
TCP NewReno fast recovery algorithm. Second, our model
incorporates an accurate formulation of NewReno's
timeout behavior. Third, our model is formulated using
a flexible two-parameter loss model that can better
represent the diverse packet loss scenarios encountered
by TCP on the Internet. We validated our model by
conducting a large number of simulations using the {\em
ns-2\/} simulator and by conducting emulation and
Internet experiments using a NewReno implementation in
the BSD TCP/IP protocol stack. The main findings from
the experiments are: (1) the proposed model accurately
predicts the steady-state throughput for TCP NewReno
bulk data transfers under a wide range of network
conditions; (2) TCP NewReno significantly outperforms
TCP Reno in many of the scenarios considered; and (3)
using existing TCP Reno models to estimate TCP NewReno
throughput may introduce significant errors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "analytical modeling; ns-2; simulation; transmission
control protocol (TCP)",
}
@Article{AlDaoud:2010:PSS,
author = "Ashraf {Al Daoud} and Murat Alanyali and David
Starobinski",
title = "Pricing strategies for spectrum lease in secondary
markets",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "462--475",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031176",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We develop analytical models to characterize pricing
of spectrum rights in cellular CDMA networks.
Specifically, we consider a primary license holder that
aims to lease its spectrum within a certain geographic
subregion of its network. Such a transaction has two
contrasting economic implications: On the one hand the
lessor obtains a revenue due to the exercised price of
the region. On the other hand, it incurs a cost due to:
(1) reduced spatial coverage of its network; and (2)
possible interference from the leased region into the
retained portion of its network, leading to increased
call blocking. We formulate this tradeoff as an
optimization problem, with the objective of profit
maximization. We consider a range of pricing
philosophies and derive near-optimal solutions that are
based on a reduced load approximation (RLA) for
estimating blocking probabilities. The form of these
prices suggests charging the lessee in proportion to
the fraction of admitted calls. We also exploit the
special structure of the solutions to devise an
efficient iterative procedure for computing prices. We
present numerical results that demonstrate superiority
of the proposed strategy over several alternative
strategies. The results emphasize importance of
effective pricing strategies in bringing secondary
markets to full realization.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cellular CDMA networks; network economics; reduced
load approximation (RLA); traffic modeling",
}
@Article{Shakkottai:2010:DAC,
author = "Srinivas Shakkottai and Ramesh Johari",
title = "Demand-aware content distribution on the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "476--489",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2035047",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The rapid growth of media content distribution on the
Internet in the past few years has brought with it
commensurate increases in the costs of distributing
that content. Can the content distributor defray these
costs through a more innovative approach to
distribution? In this paper, we evaluate the benefits
of a hybrid system that combines peer-to-peer and a
centralized client-server approach against each method
acting alone. A key element of our approach is to
explicitly model the temporal evolution of demand. In
particular, we employ a word-of-mouth demand evolution
model due to Bass [2] to represent the evolution of
interest in a piece of content. Our analysis is carried
out in an order scaling depending on the total
potential mass of customers in the market. Using this
approach, we study the relative performance of
peer-to-peer and centralized client-server schemes, as
well as a hybrid of the two--both from the point of
view of consumers as well as the content distributor.
We show how awareness of demand can be used to attain a
given average delay target with lowest possible
utilization of the central server by using the hybrid
scheme. We also show how such awareness can be used to
take provisioning decisions. Our insights are obtained
in a fluid model and supported by stochastic
simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Bass diffusion; content distribution; delay
guarantees; peer-to-peer (P2P)",
}
@Article{Liu:2010:TRS,
author = "Alex X. Liu and Chad R. Meiners and Eric Torng",
title = "{TCAM} Razor: a systematic approach towards minimizing
packet classifiers in {TCAMs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "490--500",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030188",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet classification is the core mechanism that
enables many networking services on the Internet such
as firewall packet filtering and traffic accounting.
Using ternary content addressable memories (TCAMs) to
perform high-speed packet classification has become the
de facto standard in industry. TCAMs classify packets
in constant time by comparing a packet with all
classification rules of ternary encoding in parallel.
Despite their high speed, TCAMs suffer from the
well-known range expansion problem. As packet
classification rules usually have fields specified as
ranges, converting such rules to TCAM-compatible rules
may result in an explosive increase in the number of
rules. This is not a problem if TCAMs have large
capacities. Unfortunately, TCAMs have very limited
capacity, and more rules mean more power consumption
and more heat generation for TCAMs. Even worse, the
number of rules in packet classifiers has been
increasing rapidly with the growing number of services
deployed on the Internet. In this paper, we consider
the following problem: given a packet classifier, how
can we generate another semantically equivalent packet
classifier that requires the least number of TCAM
entries? In this paper, we propose a systematic
approach, the TCAM Razor, that is effective, efficient,
and practical. In terms of effectiveness, TCAM Razor
achieves a total compression ratio of 29.0\%, which is
significantly better than the previously published best
result of 54\%. In terms of efficiency, our TCAM Razor
prototype runs in seconds, even for large packet
classifiers. Finally, in terms of practicality, our
TCAM Razor approach can be easily deployed as it does
not require any modification to existing packet
classification systems, unlike many previous range
encoding schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "algorithm; packet classification; router design;
ternary content addressable memory (TCAM)
optimization",
}
@Article{Lin:2010:LCD,
author = "Longbi Lin and Xiaojun Lin and Ness B. Shroff",
title = "Low-complexity and distributed energy minimization in
multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "501--514",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032419",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this work, we study the problem of minimizing the
total power consumption in a multihop wireless network
subject to a given offered load. It is well-known that
the total power consumption of multihop wireless
networks can be substantially reduced by jointly
optimizing power control, link scheduling, and routing.
However, the known optimal cross-layer solution to this
problem is centralized and with high computational
complexity. In this paper, we develop a low-complexity
and distributed algorithm that is provably
power-efficient. In particular, under the
node-exclusive interference model and with suitable
assumptions on the power-rate function, we can show
that the total power consumption of our algorithm is at
most $ (2 + \epsilon) $ times as large as the power
consumption of the optimal (but centralized and
complex) algorithm, where is an arbitrarily small
positive constant. Our algorithm is not only the first
such distributed solution with provable performance
bound, but its power-efficiency ratio is also tighter
than that of another suboptimal centralized algorithm
in the literature.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "cross-layer optimization; duality; energy-aware
routing; mathematical programming/optimization",
}
@Article{Kim:2010:MDM,
author = "Joohwan Kim and Xiaojun Lin and Ness B. Shroff and
Prasun Sinha",
title = "Minimizing delay and maximizing lifetime for wireless
sensor networks with anycast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "515--528",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032294",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we are interested in minimizing the
delay and maximizing the lifetime of event-driven
wireless sensor networks for which events occur
infrequently. In such systems, most of the energy is
consumed when the radios are on, waiting for a packet
to arrive. Sleep-wake scheduling is an effective
mechanism to prolong the lifetime of these
energy-constrained wireless sensor networks. However,
sleep-wake scheduling could result in substantial
delays because a transmitting node needs to wait for
its next-hop relay node to wake up. An interesting line
of work attempts to reduce these delays by developing
'anycast'-based packet forwarding schemes, where each
node opportunistically forwards a packet to the first
neighboring node that wakes up among multiple candidate
nodes. In this paper, we first study how to optimize
the anycast forwarding schemes for minimizing the
expected packet-delivery delays from the sensor nodes
to the sink. Based on this result, we then provide a
solution to the joint control problem of how to
optimally control the system parameters of the
sleep-wake scheduling protocol and the anycast
packet-forwarding protocol to maximize the network
lifetime, subject to a constraint on the expected
end-to-end packet-delivery delay. Our numerical results
indicate that the proposed solution can outperform
prior heuristic solutions in the literature, especially
under practical scenarios where there are obstructions,
e.g., a lake or a mountain, in the coverage area of the
wireless sensor network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "anycast; delay; energy-efficiency; sensor network;
sleep-wake scheduling",
}
@Article{Zheng:2010:PSR,
author = "Si Qing Zheng and Ashwin Gumaste and Hong Shen",
title = "A parallel self-routing rearrangeable nonblocking
multi-{$ \log_2 N $} photonic switching network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "529--539",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2036173",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A new rearrangeable nonblocking photonic multi-log 2
$N$ network $ D M(N)$ is introduced. It is shown that $
D M(N)$ network possesses many good properties
simultaneously. These good properties include all those
of existing rearrangeable nonblocking photonic
multi-log2 $N$ networks and new ones such as $ O(\log
N)$-time fast parallel self-routing, nonblocking
multiple-multicast, and cost-effective crosstalk-free
wavelength dilation, which existing rearrangeable
nonblocking multi-log2 $N$ networks do not have. The
advantages of $ D M(N)$ over existing multi-log2 $N$
networks, especially $ \log_2 (N, 0, 2^{\lfloor \log_2
N / 2 \rfloor })$, are achieved by employing a
two-level load balancing scheme--a combination of
static load balancing and dynamic load balancing. $ D
M(N)$ and $ \log_2 (N, 0, 2^{\lfloor \log_2 N / 2
\rfloor })$ are about the same in structure. The
additional cost is for the intraplane routing
preprocessing circuits. Considering the extended
capabilities of $ D M(N)$ and current mature and cheap
electronic technology, this extra cost is well
justified.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "Banyan network; crosstalk reduction; directional
coupler; multicast; parallel processing; permutation
routing; photonic switching systems; rearrangeable
nonblocking; self-routing; switch control",
}
@Article{Tinnirello:2010:RIE,
author = "Ilenia Tinnirello and Giuseppe Bianchi",
title = "Rethinking the {IEEE} 802.11e {EDCA} performance
modeling methodology",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "540--553",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2029101",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Analytical modeling of the 802.11e enhanced
distributed channel access (EDCA) mechanism is today a
fairly mature research area, considering the very large
number of papers that have appeared in the literature.
However, most work in this area models the EDCA
operation through per-slot statistics, namely
probability of transmission and collisions referred to
'slots.' In so doing, they still share a methodology
originally proposed for the 802.11 Distributed
Coordination Function (DCF), although they do extend it
by considering differentiated transmission/ collision
probabilities over different slots. We aim to show that
it is possible to devise 802.11e models that do not
rely on per-slot statistics. To this purpose, we
introduce and describe a novel modeling methodology
that does not use per-slot transmission/collision
probabilities, but relies on the fixed-point
computation of the whole (residual) backoff counter
distribution occurring after a generic transmission
attempt. The proposed approach achieves high accuracy
in describing the channel access operations, not only
in terms of throughput and delay performance, but also
in terms of low-level performance metrics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MAC model; quality of service; WLAN",
}
@Article{Banerjee:2010:DFE,
author = "Nilanjan Banerjee and Mark D. Corner and Brian Neil
Levine",
title = "Design and field experimentation of an
energy-efficient architecture for {DTN} throwboxes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "554--567",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2039491",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Disruption-tolerant networks (DTNs) rely on
intermittent contacts between mobile nodes to deliver
packets using a store-carry-and-forward paradigm. We
earlier proposed the use of throwbox nodes, which are
stationary, battery-powered nodes with storage and
processing, to enhance the capacity of DTNs. However,
the use of throwboxes without efficient power
management is minimally effective. If the nodes are too
liberal with their energy consumption, they will fail
prematurely. However, if they are too conservative,
they may miss important transfer opportunities, hence
increasing lifetime without improving performance. In
this paper, we present a hardware and software
architecture for energy-efficient throwboxes in DTNs.
We propose a hardware platform that uses a multitiered,
multiradio, scalable, solar-powered platform. The
throwbox employs an approximate heuristic for solving
the NP-hard problem of meeting an average power
constraint while maximizing the number of bytes
forwarded by the throwbox. We built and deployed
prototype throwboxes in UMass DieselNet, a bus-based
DTN testbed. Through extensive trace-driven simulations
and prototype deployment, we show that a single
throwbox with a 270-cm$^2$ solar panel can run
perpetually while improving packet delivery by 37\% and
reducing message delivery latency by at least 10\% in
the network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "disruption-tolerant networks; energy management;
mobility; solar-powered systems",
}
@Article{Cohen:2010:MRT,
author = "Reuven Cohen and Gabi Nakibly",
title = "Maximizing restorable throughput in {MPLS} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "568--581",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031064",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "MPLS recovery mechanisms are increasing in popularity
because they can guarantee fast restoration and high
QoS assurance. Their main advantage is that their
backup paths are established in advance, before a
failure event takes place. Most research on the
establishment of primary and backup paths has focused
on minimizing the added capacity required by the backup
paths in the network. However, this so-called Spare
Capacity Allocation (SCA) metric is less practical for
network operators who have a fixed capacitated network
and want to maximize their revenues. In this paper, we
present a comprehensive study on restorable throughput
maximization in MPLS networks. We present the first
polynomial-time algorithms for the splittable version
of the problem. For the unsplittable version, we
provide a lower bound for the approximation ratio and
propose an approximation algorithm with an almost
identical bound. We present an efficient heuristic
which is shown to have excellent performance. One of
our most important conclusions is that when one seeks
to maximize revenue, local recovery should be the
recovery scheme of choice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "MPLS; optimization; restoration",
}
@Article{Zhong:2010:CRR,
author = "Sheng Zhong and Fan Wu",
title = "A collusion-resistant routing scheme for
noncooperative wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "582--595",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030325",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless ad hoc networks, routing needs cooperation
of nodes. Since nodes often belong to different users,
it is highly important to provide incentives for them
to cooperate. However, most existing studies of the
incentive-compatible routing problem focus on
individual nodes' incentives, assuming that no subset
of them would collude. Clearly, this assumption is not
always valid. In this paper, we present a systematic
study of collusion-resistant routing in noncooperative
wireless ad hoc networks. In particular, we consider
two standard solution concepts for collusion resistance
in game theory, namely Group Strategyproofness and
Strong Nash Equilibrium. We show that achieving Group
Strategyproofness is impossible, while achieving Strong
Nash Equilibrium is possible. More specifically, we
design a scheme that is guaranteed to converge to a
Strong Nash Equilibrium and prove that the total
payment needed is bounded. In addition, we propose a
cryptographic method that prevents profit transfer
among colluding nodes, as long as they do not fully
trust each other unconditionally. This method makes our
scheme widely applicable in practice. Experiments show
that our solution is collusion-resistant and has good
performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "collusion; routing; wireless ad hoc networks",
}
@Article{Balasubramanian:2010:RRD,
author = "Aruna Balasubramanian and Brian Neil Levine and Arun
Venkataramani",
title = "Replication routing in {DTNs}: a resource allocation
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "596--609",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2036365",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Routing protocols for disruption-tolerant networks
(DTNs) use a variety of mechanisms, including
discovering the meeting probabilities among nodes,
packet replication, and network coding. The primary
focus of these mechanisms is to increase the likelihood
of finding a path with limited information, and so
these approaches have only an incidental effect on such
routing metrics as maximum or average delivery delay.
In this paper, we present RAPID, an intentional DTN
routing protocol that can optimize a specific routing
metric such as the worst-case delivery delay or the
fraction of packets that are delivered within a
deadline. The key insight is to treat DTN routing as a
resource allocation problem that translates the routing
metric into per-packet utilities that determine how
packets should be replicated in the system. We evaluate
RAPID rigorously through a prototype deployed over a
vehicular DTN testbed of 40 buses and simulations based
on real traces. To our knowledge, this is the first
paper to report on a routing protocol deployed on a
real outdoor DTN. Our results suggest that RAPID
significantly outperforms existing routing protocols
for several metrics. We also show empirically that for
small loads, RAPID is within 10\% of the optimal
performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "deployment; design; DTN; mobility; performance;
routing; utility",
}
@Article{Hefeeda:2010:BTS,
author = "Mohamed Hefeeda and Cheng-Hsin Hsu",
title = "On burst transmission scheduling in mobile {TV}
broadcast networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "610--623",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030326",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In mobile TV broadcast networks, the base station
broadcasts TV channels in bursts such that mobile
devices can receive a burst of traffic and then turn
off their radio frequency circuits till the next burst
in order to save energy. To achieve this energy saving
without scarifying streaming quality, the base station
must carefully construct the burst schedule for all TV
channels. This is called the burst scheduling problem.
In this paper, we prove that the burst scheduling
problem for TV channels with arbitrary bit rates is
NP-complete. We then propose a practical simplification
of the general problem, which allows TV channels to be
classified into multiple classes, and the bit rates of
the classes have power of two increments, e.g., 100,
200, and 400 kbps. Using this practical simplification,
we propose an optimal and efficient burst scheduling
algorithm. We present theoretical analysis, simulation,
and actual implementation in a mobile TV testbed to
demonstrate the optimality, practicality, and
efficiency of the proposed algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "burst scheduling; digital video broadcast-hand-held
(DVB-H); energy saving; mobile multimedia; mobile TV;
video broadcast networks; wireless video streaming",
}
@Article{Sue:2010:FRP,
author = "Chuan-Ching Sue and Hsaing-Wen Cheng",
title = "A fitting report position scheme for the gated {IPACT}
dynamic bandwidth algorithm in {EPONs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "624--637",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030189",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In EPONs using the gated Interleaved Polling with
Adaptive Cycle Time (IPACT) scheme, the position of the
report message within the granted transmission window
has a direct effect on the average packet delay within
the network. In this paper, this delay is minimized by
using a fitting report position (FRP) scheme to
adaptively adjust the position of the report message
within the transmission window in accordance with the
current network load. In the proposed approach, the
optimal position of the report message is determined
analytically for various system loads. The optical line
terminal (OLT) then uses a heuristic algorithm to
estimate the load of the optical network units (ONUs)
in accordance with their report messages and determines
the report message position that minimizes the average
packet delay within the network. Finally, the OLT
informs the ONUs of the optimal report position through
an optional field in the gate message. The performance
of the proposed FRP scheme is evaluated for three
different network models, namely Poisson traffic with a
uniform ONU load, Poisson traffic with a nonuniform ONU
load, and self-similar traffic, respectively. The
simulation results show that the FRP scheme achieves a
lower average packet delay than fixed-report-position
schemes such as fixed-report-front (FRF) or
fixed-report-end (FRE) for both Poisson and
self-similar traffic. The performance improvement is
particularly apparent in networks with a nonuniform ONU
load distribution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "dynamic bandwidth allocation (DBA); Ethernet passive
optical networks (EPONs); interleaved polling with
adaptive cycle time (IPACT); time division multiplexing
(TDM)",
}
@Article{Eryilmaz:2010:DCL,
author = "Atilla Eryilmaz and Asuman Ozdaglar and Devavrat Shah
and Eytan Modiano",
title = "Distributed cross-layer algorithms for the optimal
control of multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "638--651",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2030681",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we provide and study a general
framework that facilitates the development of
distributed mechanisms to achieve full utilization of
multihop wireless networks. In particular, we describe
a generic randomized routing, scheduling, and flow
control scheme that allows for a set of imperfections
in the operation of the randomized scheduler to account
for potential errors in its operation. These
imperfections enable the design of a large class of
low-complexity and distributed implementations for
different interference models. We study the effect of
such imperfections on the stability and fairness
characteristics of the system and explicitly
characterize the degree of fairness achieved as a
function of the level of imperfections. Our results
reveal the relative importance of different types of
errors on the overall system performance and provide
valuable insight to the design of distributed
controllers with favorable fairness characteristics. In
the second part of the paper, we focus on a specific
interference model, namely the secondary interference
model, and develop distributed algorithms with
polynomial communication and computation complexity in
the network size. This is an important result given
that earlier centralized throughput-optimal algorithms
developed for such a model relies on the solution to an
NP-hard problem at every decision. This results in a
polynomial complexity cross-layer algorithm that
achieves throughput optimality and fair allocation of
network resources among the users. We further show that
our algorithmic approach enables us to efficiently
approximate the capacity region of a multihop wireless
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "congestion control; dynamic routing; fair allocation;
multihop wireless networks; network optimization;
randomized algorithms; throughout-optimal scheduling",
}
@Article{Sommers:2010:MMS,
author = "Joel Sommers and Paul Barford and Nick Duffield and
Amos Ron",
title = "Multiobjective monitoring for {SLA} compliance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "652--665",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031974",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Service level agreements (SLAs) define performance
guarantees made by service providers, e.g., in terms of
packet loss, delay, delay variation, and network
availability. In this paper, we describe a new active
measurement methodology to accurately monitor whether
measured network path characteristics are in compliance
with performance targets specified in SLAs.
Specifically, we: (1) introduce a new methodology for
measuring mean delay along a path that improves
accuracy over existing methodologies, and a method for
obtaining confidence intervals on quantiles of the
empirical delay distribution without making any
assumption about the true distribution of delay; (2)
introduce a new methodology for measuring delay
variation that is more robust than prior techniques;
(3) describe a new methodology for estimating packet
loss rate that significantly improves accuracy over
existing approaches; and (4) extend existing work in
network performance tomography to infer lower bounds on
the quantiles of a distribution of performance measures
along an unmeasured path given measurements from a
subset of paths. Active measurements for these metrics
are unified in a discrete time-based tool called SLAM.
The unified probe stream from SLAM consumes lower
overall bandwidth than if individual streams are used
to measure path properties. We demonstrate the accuracy
and convergence properties of SLAM in a controlled
laboratory environment using a range of background
traffic scenarios and in one- and two-hop settings, and
examine its accuracy improvements over existing
standard techniques.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "active measurement; network congestion; network delay;
network jitter; packet loss; service level agreements
(SLAs); SLAM",
}
@Article{Trestian:2010:GIP,
author = "Ionut Trestian and Supranamaya Ranjan and Aleksandar
Kuzmanovic and Antonio Nucci",
title = "{Googling} the {Internet}: profiling {Internet}
endpoints via the {World Wide Web}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "2",
pages = "666--679",
month = apr,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031175",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Jun 21 18:17:02 MDT 2010",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Understanding Internet access trends at a global
scale, i.e., how people use the Internet, is a
challenging problem that is typically addressed by
analyzing network traces. However, obtaining such
traces presents its own set of challenges owing to
either privacy concerns or to other operational
difficulties. The key hypothesis of our work here is
that most of the information needed to profile the
Internet endpoints is already available around us--on
the Web. In this paper, we introduce a novel approach
for profiling and classifying endpoints. We implement
and deploy a Google-based profiling tool, that
accurately characterizes endpoint behavior by
collecting and strategically combining information
freely available on the Web. Our Web-based
'unconstrained endpoint profiling' (UEP) approach shows
advances in the following scenarios: (1) even when no
packet traces are available, it can accurately infer
application and protocol usage trends at arbitrary
networks; (2) when network traces are available, it
outperforms state-of-the-art classification tools such
as BLINC; (3) when sampled flow-level traces are
available, it retains high classification capabilities.
We explore other complementary UEP approaches, such as
p2p- and reverse-DNS-lookup-based schemes, and show
that they can further improve the results of the
Web-based UEP. Using this approach, we perform
unconstrained endpoint profiling at a global scale: for
clients in four different world regions (Asia, South
and North America, and Europe). We provide the
first-of-its-kind endpoint analysis that reveals
fascinating similarities and differences among these
regions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
keywords = "clustering; endpoint profiling; Google; traffic
classification; traffic locality",
}
@Article{Hsu:2010:BVS,
author = "Cheng-Hsin Hsu and Mohamed M. Hefeeda",
title = "Broadcasting video streams encoded with arbitrary bit
rates in energy-constrained mobile {TV} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "681--694",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033058",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Starobinski:2010:AOD,
author = "David Starobinski and Weiyao Xiao",
title = "Asymptotically optimal data dissemination in
multichannel wireless sensor networks: single radios
suffice",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "695--707",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032230",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karsten:2010:AGP,
author = "Martin Karsten",
title = "Approximation of generalized processor sharing with
interleaved stratified timer wheels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "708--721",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033059",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Broustis:2010:MDG,
author = "Ioannis Broustis and Konstantina Papagiannaki and
Srikanth V. Krishnamurthy and Michalis Faloutsos and
Vivek P. Mhatre",
title = "Measurement-driven guidelines for 802.11 {WLAN}
design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "722--735",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031971",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ozdemir:2010:IFD,
author = "Suat Ozdemir and Hasan {\c{C}}am",
title = "Integration of false data detection with data
aggregation and confidential transmission in wireless
sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "736--749",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032910",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Skorin-Kapov:2010:NAO,
author = "Nina Skorin-Kapov and Jiajia Chen and Lena Wosinska",
title = "A new approach to optical networks security:
attack-aware routing and wavelength assignment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "750--760",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2031555",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mao:2010:SSS,
author = "Yun Mao and Feng Wang and Lili Qiu and Simon Lam and
Jonathan Smith",
title = "{S4}: small state and small stretch compact routing
protocol for large static wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "761--774",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2046645",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2010:IEU,
author = "Richard T. B. Ma and Dah Ming Chiu and John C. S. Lui
and Vishal Misra and Dan Rubenstein",
title = "{Internet} economics: the use of {Shapley} value for
{ISP} settlement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "775--787",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049205",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Venkataramanan:2010:WSA,
author = "V. J. Venkataramanan and Xiaojun Lin",
title = "On wireless scheduling algorithms for minimizing the
queue-overflow probability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "788--801",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037896",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2010:LDS,
author = "Hongseok Kim and Gustavo {De Veciana}",
title = "Leveraging dynamic spare capacity in wireless systems
to conserve mobile terminals' energy",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "802--815",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032238",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khreishah:2010:RCP,
author = "Abdallah Khreishah and Chih-Chun Wang and Ness B.
Shroff",
title = "Rate control with pairwise intersession network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "816--829",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2032353",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Campos-Nanez:2010:DAA,
author = "Enrique Campos-N{\'a}{\~n}ez",
title = "Decentralized algorithms for adaptive pricing in
multiclass loss networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "830--843",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033182",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tang:2010:EHC,
author = "Ao Tang and Xiaoliang Wei and Steven H. Low and Mung
Chiang",
title = "Equilibrium of heterogeneous congestion control:
optimality and stability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "844--857",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034963",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Manna:2010:IPS,
author = "Parbati Kumar Manna and Shigang Chen and Sanjay
Ranka",
title = "Inside the permutation-scanning worms: propagation
modeling and analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "858--870",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034655",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2010:JSM,
author = "Jun Luo and Jean-Pierre Hubaux",
title = "Joint sink mobility and routing to maximize the
lifetime of wireless sensor networks: the case of
constrained mobility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "871--884",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033472",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yu:2010:SNO,
author = "Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky
and Feng Xiao",
title = "{SybilLimit}: a near-optimal social network defense
against {Sybil} attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "885--898",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034047",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chambers:2010:COG,
author = "Chris Chambers and Wu-Chang Feng and Sambit Sahu and
Debanjan Saha and David Brandt",
title = "Characterizing online games",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "899--910",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034371",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Roseti:2010:APE,
author = "Cesare Roseti and Michele Luglio and Francesco
Zampognaro",
title = "Analysis and performance evaluation of a burst-based
{TCP} for satellite {DVB RCS} links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "911--921",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2033272",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{She:2010:HRC,
author = "Qingya She and Xiaodong Huang and Jason P. Jue",
title = "How reliable can two-path protection be?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "922--933",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2036911",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yun:2010:ODP,
author = "Ziqiu Yun and Xiaole Bai and Dong Xuan and Ten H. Lai
and Weijia Jia",
title = "Optimal deployment patterns for full coverage and
$k$-connectivity ($ k <= 6$) wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "934--947",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2040191",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lu:2010:LPT,
author = "Wencheng Lu and Sartaj Sahni",
title = "Low-power {TCAMs} for very large forwarding tables",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "948--959",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034143",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2010:DCA,
author = "Libin Jiang and Jean Walrand",
title = "A distributed {CSMA} algorithm for throughput and
utility maximization in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "960--972",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2035046",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Madan:2010:FAR,
author = "Ritesh Madan and Stephen P. Boyd and Sanjay Lall",
title = "Fast algorithms for resource allocation in wireless
cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "973--984",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2034850",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gerstel:2010:GFS,
author = "Ori Gerstel and G. Sasaki",
title = "A general framework for service availability for
bandwidth-efficient connection-oriented networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "985--995",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2046746",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fan:2010:PSN,
author = "Chun-I Fan and Pei-Hsiu Ho and Ruei-Hau Hsu",
title = "Provably secure nested one-time secret mechanisms for
fast mutual authentication and key exchange in mobile
communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "3",
pages = "996--1009",
month = jun,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2036366",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:09 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vojnovic:2010:SSE,
author = "Milan Vojnovi{\'c} and Varun Gupta and Thomas
Karagiannis and Christos Gkantsidis",
title = "Sampling strategies for epidemic-style information
dissemination",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1013--1025",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051233",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mirza:2010:MLA,
author = "Mariyam Mirza and Joel Sommers and Paul Barford and
Xiaojin Zhu",
title = "A machine learning approach to {TCP} throughput
prediction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1026--1039",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037812",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liebeherr:2010:STA,
author = "J{\"o}rg Liebeherr and Markus Fidler and Shahrokh
Valaee",
title = "A system-theoretic approach to bandwidth estimation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1040--1053",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2035115",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xi:2010:TOD,
author = "Yufang Xi and Edmund M. Yeh",
title = "Throughput optimal distributed power control of
stochastic wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1054--1066",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2035919",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Guo:2010:DAM,
author = "Song Guo and Victor C. M. Leung",
title = "A distributed algorithm for min-max tree and max-min
cut problems in communication networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1067--1076",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2038998",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hu:2010:FBS,
author = "Bing Hu and Kwan L. Yeung",
title = "Feedback-based scheduling for load-balanced two-stage
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1077--1090",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037318",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yu:2010:PMS,
author = "Ming Yu and Mengchu Zhou",
title = "A performance modeling scheme for multistage switch
networks with phase-type and bursty traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1091--1104",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2036437",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lakshmanan:2010:APS,
author = "Sriram Lakshmanan and Cheng-Lin Tsao and Raghupathy
Sivakumar",
title = "{Aegis}: physical space security for wireless networks
with smart antennas",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1105--1118",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037621",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2010:SPT,
author = "Yanming Shen and Shivendra S. Panwar and H. Jonathan
Chao",
title = "{SQUID}: a practical 100\% throughput scheduler for
crosspoint buffered switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1119--1131",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2042460",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2010:PDW,
author = "Yunhao Liu and Kebin Liu and Mo Li",
title = "Passive diagnosis for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1132--1144",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037497",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2010:MCW,
author = "Xiang-Yang Li and Yunhao Liu and Shi Li and ShaoJie
Tang",
title = "Multicast capacity of wireless ad hoc networks under
{Gaussian} channel model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1145--1157",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2037431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sengupta:2010:NCA,
author = "Sudipta Sengupta and Shravan Rayanchu and Suman
Banerjee",
title = "Network coding-aware routing in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1158--1170",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2042727",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zafer:2010:TPE,
author = "Murtaza Zafer and Bong Jun Ko and Ivan Wang-Hei Ho",
title = "Transmit power estimation using spatially diverse
measurements under wireless fading",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1171--1180",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2039801",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Salameh:2010:CAS,
author = "Haythem A. Bany Salameh and Marwan Krunz and Ossama
Younis",
title = "Cooperative adaptive spectrum sharing in cognitive
radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1181--1194",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2039490",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2010:DBC,
author = "Yong Liu",
title = "Delay bounds of chunk-based peer-to-peer video
streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1195--1206",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2038155",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koksal:2010:RQS,
author = "Can Emre Koksal",
title = "Rate quantization and the speedup required to achieve
100\% throughput for multicast over crossbar switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1207--1219",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2038582",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gobjuka:2010:ETD,
author = "Hassan Gobjuka and Yuri J. Breitbart",
title = "{Ethernet} topology discovery for networks with
incomplete information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1220--1233",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2039757",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fadlullah:2010:DCA,
author = "Zubair M. Fadlullah and Tarik Taleb and Athanasios V.
Vasilakos and Mohsen Guizani and Nei Kato",
title = "{DTRAB}: combating against attacks on encrypted
protocols through traffic-feature analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1234--1247",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2039492",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2010:MAM,
author = "Di Wu and Yong Liu and Keith W. Ross",
title = "Modeling and analysis of multichannel {P2P} live video
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1248--1260",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2009.2038910",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Loiseau:2010:ISS,
author = "Patrick Loiseau and Paulo Gon{\c{c}}alves and
Guillaume Dewaele and Pierre Borgnat and Patrice Abry
and Pascale Vicat-Blanc Primet",
title = "Investigating self-similarity and heavy-tailed
distributions on a large-scale experimental facility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1261--1274",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2042726",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barbera:2010:QSA,
author = "Mario Barbera and Alfio Lombardo and Carla Panarello
and Giovanni Schembra",
title = "Queue stability analysis and performance evaluation of
a {TCP}-compliant window management mechanism",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1275--1288",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2040628",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramachandran:2010:SST,
author = "Kishore Ramachandran and Ravi Kokku and Honghai Zhang
and Marco Gruteser",
title = "{Symphony}: synchronous two-phase rate and power
control in 802.11 {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1289--1302",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2040036",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2010:RAG,
author = "Lijun Chen and Steven H. Low and John C. Doyle",
title = "Random access game and medium access control design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1303--1316",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2041066",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yin:2010:SLO,
author = "Changchuan Yin and Long Gao and Shuguang Cui",
title = "Scaling laws for overlaid wireless networks: a
cognitive radio network versus a primary network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1317--1329",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2041467",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2010:CMS,
author = "Bill Lin and Isaac Keslassy",
title = "The concurrent matching switch architecture",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "4",
pages = "1330--1343",
month = aug,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2040289",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:11 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2010:ASI,
author = "Xiaolong Li and Homayoun Yousefi'zadeh",
title = "Analysis, simulation, and implementation of {VCP}: a
wireless profiling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1345--1358",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2041249",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Afanasyev:2010:UPU,
author = "Mikhail Afanasyev and Tsuwei Chen and Geoffrey M.
Voelker and Alex C. Snoeren",
title = "Usage patterns in an urban {WiFi} network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1359--1372",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2040087",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fashandi:2010:PDP,
author = "Shervan Fashandi and Shahab Oveis Gharan and Amir K.
Khandani",
title = "Path diversity over packet switched networks:
performance analysis and rate allocation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1373--1386",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043368",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2010:EWM,
author = "Jun Luo and Catherine Rosenberg and Andr{\'e} Girard",
title = "Engineering wireless mesh networks: joint scheduling,
routing, power control, and rate adaptation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1387--1400",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2041788",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Grokop:2010:SSB,
author = "Leonard H. Grokop and David N. C. Tse",
title = "Spectrum sharing between wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1401--1412",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043114",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2010:RNO,
author = "Irene Y. Chen and Li-Da Tong and Yi-Ming Huang",
title = "Rearrangeable nonblocking optical interconnection
network fabrics with crosstalk constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1413--1421",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2044515",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tang:2010:QDW,
author = "Ao Tang and Lachlan L. H. Andrew and Krister Jacobsson
and Karl H. Johansson and H{\aa}kan Hjalmarsson and
Steven H. Low",
title = "Queue dynamics with window flow control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1422--1435",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2047951",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zheng:2010:MCM,
author = "S. Q. Zheng and Jianping Wang and Bing Yang and Mei
Yang",
title = "Minimum-cost multiple paths subject to minimum link
and node sharing in a network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1436--1449",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2044514",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Acer:2010:WSR,
author = "Utku G{\"u}nay Acer and Shivkumar Kalyanaraman and
Alhussein A. Abouzeid",
title = "Weak state routing for large-scale dynamic networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1450--1463",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043113",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Thejaswi:2010:DOS,
author = "P. S. Chandrashekhar Thejaswi and Junshan Zhang and
Man-On Pun and H. Vincent Poor and Dong Zheng",
title = "Distributed opportunistic scheduling with two-level
probing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1464--1477",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2042610",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Brosh:2010:DFT,
author = "Eli Brosh and Salman Abdul Baset and Vishal Misra and
Dan Rubenstein and Henning Schulzrinne",
title = "The delay-friendliness of {TCP} for real-time
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1478--1491",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050780",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramachandran:2010:PCA,
author = "Madanagopal Ramachandran and N. Usha Rani and Timothy
A. Gonsalves",
title = "Path computation algorithms for dynamic service
provisioning with protection and inverse multiplexing
in {SDH\slash SONET} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1492--1504",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043538",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Finamore:2010:KSP,
author = "Alessandro Finamore and Marco Mellia and Michela Meo
and Dario Rossi",
title = "{KISS}: stochastic packet inspection classifier for
{UDP} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1505--1515",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2044046",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Giustiniano:2010:MTO,
author = "Domenico Giustiniano and David Malone and Douglas J.
Leith and Konstantina Papagiannaki",
title = "Measuring transmission opportunities in 802.11 links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1516--1529",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051038",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bulut:2010:CEM,
author = "Eyuphan Bulut and Zijian Wang and Boleslaw Karol
Szymanski",
title = "Cost-effective multiperiod spraying for routing in
delay-tolerant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1530--1543",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043744",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bateni:2010:MVO,
author = "MohammadHossein Bateni and Alexandre Gerber and
MohammadTaghi Hajiaghayi and Subhabrata Sen",
title = "Multi-{VPN} optimization for scalable routing via
relaying",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1544--1556",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2043743",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Christodoulopoulos:2010:ORW,
author = "Konstantinos Christodoulopoulos and Konstantinos
Manousakis and Emmanouel Varvarigos",
title = "Offline routing and wavelength assignment in
transparent {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1557--1570",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2044585",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2010:CML,
author = "Yan Wu and Zhoujia Mao and Sonia Fahmy and Ness B.
Shroff",
title = "Constructing maximum-lifetime data gathering forests
in sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1571--1584",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2045896",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ji:2010:OSA,
author = "Tianxiong Ji and Eleftheria Athanasopoulou and R.
Srikant",
title = "On optimal scheduling algorithms for small generalized
switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1585--1598",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2045394",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Beheshti:2010:OPB,
author = "Neda Beheshti and Emily Burmeister and Yashar Ganjali
and John E. Bowers and Daniel J. Blumenthal and Nick
McKeown",
title = "Optical packet buffers for backbone {Internet}
routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1599--1609",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048924",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chu:2010:OCS,
author = "Shan Chu and Xin Wang",
title = "Opportunistic and cooperative spatial multiplexing in
{MIMO} ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1610--1623",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049027",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Alfano:2010:CSW,
author = "Giusi Alfano and Michele Garetto and Emilio Leonardi
and Valentina Martina",
title = "Capacity scaling of wireless networks with
inhomogeneous node density: lower bounds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1624--1636",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048719",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yi:2010:MSL,
author = "Yung Yi and Gustavo {De Veciana} and Sanjay
Shakkottai",
title = "{MAC} scheduling with low overheads by learning
neighborhood contention patterns",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1637--1650",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050903",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Forestiero:2010:SCB,
author = "Agostino Forestiero and Emilio Leonardi and Carlo
Mastroianni and Michela Meo",
title = "Self-chord: a bio-inspired {P2P} framework for
self-organizing distributed systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1651--1664",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2046745",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bremler-Barr:2010:PPE,
author = "Anat Bremler-Barr and David Hay and Danny Hendler and
Ron M. Roth",
title = "{PEDS}: a parallel error detection scheme for {TCAM}
devices",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "5",
pages = "1665--1675",
month = oct,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2047730",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:14 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bouabdallah:2010:DAM,
author = "Nizar Bouabdallah and Rami Langar and Raouf Boutaba",
title = "Design and analysis of mobility-aware clustering
algorithms for wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1677--1690",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049579",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shakkottai:2010:MCL,
author = "Srinivas Shakkottai and Xin Liu and R. Srikant",
title = "The multicast capacity of large multihop wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1691--1700",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050901",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Blough:2010:AAW,
author = "Douglas M. Blough and G. Resta and P. Santi",
title = "Approximation algorithms for wireless link scheduling
with {SINR}-based interference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1701--1712",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2047511",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kompella:2010:OSB,
author = "Sastry Kompella and Jeffrey E. Wieselthier and Anthony
Ephremides and Hanif D. Sherali and Gam D. Nguyen",
title = "On optimal {SINR}-based scheduling in multihop
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1713--1724",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048338",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shetty:2010:IQR,
author = "Nikhil Shetty and Galina Schwartz and Jean Walrand",
title = "{Internet} {QoS} and regulations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1725--1737",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048757",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ko:2010:EBI,
author = "Young Myoung Ko and Natarajan Gautam",
title = "Epidemic-based information dissemination in wireless
mobile sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1738--1751",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048122",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kirsch:2010:POM,
author = "Adam Kirsch and Michael Mitzenmacher",
title = "The power of one move: hashing schemes for hardware",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1752--1765",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2047868",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tajer:2010:MDG,
author = "Ali Tajer and Xiaodong Wang",
title = "Multiuser diversity gain in cognitive networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1766--1779",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048038",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gupta:2010:SPS,
author = "Ashima Gupta and Debalina Ghosh and Prasant
Mohapatra",
title = "Scheduling prioritized services in multihop {OFDMA}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1780--1792",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049657",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sen:2010:MDN,
author = "Soumya Sen and Youngmi Jin and Roch Gu{\'e}rin and
Kartik Hosanagar",
title = "Modeling the dynamics of network technology adoption
and the role of converters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1793--1805",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2048923",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2010:BTL,
author = "Zheng Yang and Yunhao Liu and Xiang-Yang Li",
title = "Beyond trilateration: on the localizability of
wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1806--1814",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049578",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The proliferation of wireless and mobile devices has
fostered the demand of context-aware applications, in
which location is often viewed as one of the most
significant contexts. Classically, trilateration is
widely employed for testing network localizability;
even in many cases, it wrongly recognizes a localizable
graph as nonlocalizable. In this study, we analyze the
limitation of trilateration-based approaches and
propose a novel approach that inherits the simplicity
and efficiency of trilateration and, at the same time,
improves the performance by identifying more
localizable nodes. We prove the correctness and
optimality of this design by showing that it is able to
locally recognize all one-hop localizable nodes. To
validate this approach, a prototype system with 60
wireless sensors is deployed. Intensive and large-scale
simulations are further conducted to evaluate the
scalability and efficiency of our design.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2010:IDI,
author = "Zheng Zhang and Ying Zhang and Y. Charlie Hu and Z.
Morley Mao and Randy Bush",
title = "{iSPY}: detecting {IP} prefix hijacking on my own",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1815--1828",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2066284",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "IP prefix hijacking remains a major threat to the
security of the Internet routing system due to a lack
of authoritative prefix ownership information. Despite
many efforts in designing IP prefix hijack detection
schemes, no existing design can satisfy all the
critical requirements of a truly effective system:
real-time, accurate, lightweight, easily and
incrementally deployable, as well as robust in victim
notification. In this paper, we present a novel
approach that fulfills all these goals by monitoring
network reachability from key external transit networks
to one's own network through lightweight
prefix-owner-based active probing. Using the
prefix-owner's view of reachability, our detection
system, iSPY, can differentiate between IP prefix
hijacking and network failures based on the observation
that hijacking is likely to result in topologically
more diverse polluted networks and unreachability.
Through detailed simulations of Internet routing,
25-day deployment in 88 autonomous systems (ASs) (108
prefixes), and experiments with hijacking events of our
own prefix from multiple locations, we demonstrate that
iSPY is accurate with false negative ratio below 0.45\%
and false positive ratio below 0.17\%. Furthermore,
iSPY is truly real-time; it can detect hijacking events
within a few minutes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liao:2010:SIR,
author = "Yong Liao and Lixin Gao and Roch Gu{\'e}rin and Zhi-Li
Zhang",
title = "Safe interdomain routing under diverse commercial
agreements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1829--1840",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2049858",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kasbekar:2010:SAF,
author = "Gaurav S. Kasbekar and Saswati Sarkar",
title = "Spectrum auction framework for access allocation in
cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1841--1854",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051453",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Berbecaru:2010:FSM,
author = "Diana Berbecaru and Luca Albertalli and Antonio Lioy",
title = "The {ForwardDiffsig} scheme for multicast
authentication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1855--1868",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2052927",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Saleh:2010:DPW,
author = "Mohammad A. Saleh and Ahmed E. Kamal",
title = "Design and provisioning of {WDM} networks with
many-to-many traffic grooming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1869--1882",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051234",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See erratum \cite{Saleh:2011:EDP}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lucerna:2010:AMB,
author = "Diego Lucerna and Massimo Tornatore and Achille
Pattavina",
title = "Algorithms and models for backup reprovisioning in
{WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1883--1894",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2081684",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2010:DRN,
author = "Hyang-Won Lee and Eytan Modiano and Kayi Lee",
title = "Diverse routing in networks with probabilistic
failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1895--1907",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050490",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2010:CLH,
author = "Reuven Cohen and Guy Grebla and Liran Katzir",
title = "Cross-layer hybrid {FEC\slash ARQ} reliable multicast
with adaptive modulation and coding in broadband
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1908--1920",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050902",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Park:2010:MAC,
author = "Jaeok Park and Mihaela {Van Der Schaar}",
title = "Medium access control protocols with memory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1921--1934",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2050699",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2010:VIM,
author = "Kaidi Huang and Ken R. Duffy and David Malone",
title = "On the validity of {IEEE 802.11 MAC} modeling
hypotheses",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1935--1948",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051335",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Camp:2010:MRA,
author = "Joseph Camp and Edward Knightly",
title = "Modulation rate adaptation in urban and vehicular
environments: cross-layer implementation and
experimental evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1949--1962",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2051454",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shpungin:2010:NOM,
author = "Hanan Shpungin and Michael Segal",
title = "Near-optimal multicriteria spanner constructions in
wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1963--1976",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2053381",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ficara:2010:ECB,
author = "Domenico Ficara and Andrea {Di Pietro} and Stefano
Giordano and Gregorio Procissi and Fabio Vitucci",
title = "Enhancing counting bloom filters through
{Huffman}-coded multilayer structures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1977--1987",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2055243",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kini:2010:FRD,
author = "Shrinivasa Kini and Srinivasan Ramasubramanian and
Amund Kvalbein and Audun Fosselie Hansen",
title = "Fast recovery from dual-link or single-node failures
in {IP} networks using tunneling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "18",
number = "6",
pages = "1988--1999",
month = dec,
year = "2010",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2055887",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 09:25:17 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altman:2011:FCF,
author = "Eitan Altman and Francesco {De Pellegrini}",
title = "Forward correction and fountain codes in
delay-tolerant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "1--13",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091968",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Delay-tolerant ad hoc networks leverage the mobility
of relay nodes to compensate for lack of permanent
connectivity and thus enable communication between
nodes that are out of range of each other. To decrease
delivery delay, the information to be delivered is
replicated in the network. Our objective in this paper
is to study a class of replication mechanisms that
include coding in order to improve the probability of
successful delivery within a given time limit. We
propose an analytical approach that allows to quantify
tradeoffs between resources and performance measures
(energy and delay). We study the effect of coding on
the performance of the network while optimizing
parameters that govern routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rolando:2011:SSF,
author = "Pierluigi Rolando and Riccardo Sisto and Fulvio
Risso",
title = "{SPAF}: stateless {FSA}-based packet filters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "14--27",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2056698",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose a stateless packet filtering technique
based on finite-state automata (FSA). FSAs provide a
comprehensive framework with well-defined composition
operations that enable the generation of stateless
filters from high-level specifications and their
compilation into efficient executable code without
resorting to various opportunistic optimization
algorithms. In contrast with most traditional
approaches, memory safety and termination can be
enforced with minimal run-time overhead even in cyclic
filters, thus enabling full parsing of complex
protocols and supporting recursive encapsulation
relationships.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhou:2011:EMC,
author = "Zhong Zhou and Zheng Peng and Jun-Hong Cui and Zhijie
Shi",
title = "Efficient multipath communication for time-critical
applications in underwater acoustic sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "28--41",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2055886",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Due to the long propagation delay and high error rate
of acoustic channels, it is very challenging to provide
reliable data transfer for time-critical applications
in an energy-efficient way. On the one hand,
traditional retransmission upon failure usually
introduces very large end-to-end delay and is thus not
proper for time-critical services. On the other hand,
common approaches without retransmission consume lots
of energy. In this paper, we propose a new multipath
power-control transmission (MPT) scheme, which can
guarantee certain end-to-end packet error rate while
achieving a good balance between the overall energy
efficiency and the end-to-end packet delay. MPT smartly
combines power control with multipath routing and
packet combining at the destination.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhou:2011:SMC,
author = "Yipeng Zhou and Dah-Ming Chiu and John C. S. Lui",
title = "A simple model for chunk-scheduling strategies in
{P2P} streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "42--54",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2065237",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer (P2P) streaming tries to achieve
scalability (like P2P file distribution) and at the
same time meet real-time playback requirements. It is a
challenging problem still not well understood. In this
paper, we describe a simple stochastic model that can
be used to compare different downloading strategies to
random peer selection. Based on this model, we study
the tradeoffs between supported peer population, buffer
size, and playback continuity. We first study two
simple strategies: Rarest First (RF) and Greedy. The
former is a well-known strategy for P2P file sharing
that gives good scalability by trying to propagate the
chunks of a file to as many peers as quickly as
possible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2011:LSR,
author = "Hyunseok Chang and Sugih Jamin and Wenjie Wang",
title = "Live streaming with receiver-based peer-division
multiplexing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "55--68",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2056382",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A number of commercial peer-to-peer (P2P) systems for
live streaming have been introduced in recent years.
The behavior of these popular systems has been
extensively studied in several measurement papers. Due
to the proprietary nature of these commercial systems,
however, these studies have to rely on a ``black-box''
approach, where packet traces are collected from a
single or a limited number of measurement points, to
infer various properties of traffic on the control and
data planes. Although such studies are useful to
compare different systems from the end-user's
perspective, it is difficult to intuitively understand
the observed properties without fully
reverse-engineering the underlying systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2011:CND,
author = "Reuven Cohen and Boris Kapchits",
title = "Continuous neighbor discovery in asynchronous sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "69--79",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2053943",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In most sensor networks, the nodes are static.
Nevertheless, node connectivity is subject to changes
because of disruptions in wireless communication,
transmission power changes, or loss of synchronization
between neighboring nodes. Hence, even after a sensor
is aware of its immediate neighbors, it must
continuously maintain its view, a process we call
continuous neighbor discovery. In this work, we
distinguish between neighbor discovery during sensor
network initialization and continuous neighbor
discovery. We focus on the latter and view it as a
joint task of all the nodes in every connected
segment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Varvello:2011:ESL,
author = "Matteo Varvello and Stefano Ferrari and Ernst Biersack
and Christophe Diot",
title = "Exploring second life",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "80--91",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2060351",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Social virtual worlds such as Second Life (SL) are
digital representations of the real world where
human-controlled avatars evolve and interact through
social activities. Understanding the characteristics of
virtual worlds can be extremely valuable in order to
optimize their design. In this paper, we perform an
extensive analysis of SL. We exploit standard avatar
capabilities to monitor the virtual world, and we
emulate avatar behaviors in order to evaluate user
experience. We make several surprising observations. We
find that 30\% of the regions are never visited during
the six-day monitoring period, whereas less than 1\% of
the regions have large peak populations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Conway:2011:FSS,
author = "Adrian E. Conway",
title = "Fast simulation of service availability in mesh
networks with dynamic path restoration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "92--101",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2053382",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A fast simulation technique based on importance
sampling is developed for the analysis of path service
availability in mesh networks with dynamic path
restoration. The method combines the simulation of the
path rerouting algorithm with a ``dynamic path failure
importance sampling'' (DPFS) scheme to estimate path
availabilities efficiently. In DPFS, the failure rates
of network elements are biased at increased rates until
path failures are observed under rerouting. The
simulated model uses ``failure equivalence groups,''
with finite/infinite sources of failure events and
finite/infinite pools of repair personnel, to
facilitate the modeling of bidirectional link failures,
multiple in-series link cuts, optical amplifier
failures along links, node failures, and more general
geographically distributed failure scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:SCE,
author = "Dan Li and Chuanxiong Guo and Haitao Wu and Kun Tan
and Yongguang Zhang and Songwu Lu and Jianping Wu",
title = "Scalable and cost-effective interconnection of
data-center servers using dual server ports",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "102--114",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2053718",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The goal of data-center networking is to interconnect
a large number of server machines with low equipment
cost while providing high network capacity and high
bisection width. It is well understood that the current
practice where servers are connected by a tree
hierarchy of network switches cannot meet these
requirements. In this paper, we explore a new
server-interconnection structure. We observe that the
commodity server machines used in today's data centers
usually come with two built-in Ethernet ports, one for
network connection and the other left for backup
purposes. We believe that if both ports are actively
used in network connections, we can build a scalable,
cost-effective interconnection structure without either
the expensive higher-level large switches or any
additional hardware on servers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yuan:2011:PTP,
author = "Lihua Yuan and Chen-Nee Chuah and Prasant Mohapatra",
title = "{ProgME}: towards programmable network measurement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "115--128",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2066987",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic measurements provide critical input for a wide
range of network management applications, including
traffic engineering, accounting, and security analysis.
Existing measurement tools collect traffic statistics
based on some predetermined, inflexible concept of
``flows.'' They do not have sufficient built-in
intelligence to understand the application requirements
or adapt to the traffic conditions. Consequently, they
have limited scalability with respect to the number of
flows and the heterogeneity of monitoring applications.
We present ProgME, a Programmable MEasurement
architecture based on a novel concept of flowset--an
arbitrary set of flows defined according to application
requirements and/or traffic conditions. Through a
simple flowset composition language, ProgME can
incorporate application requirements, adapt itself to
circumvent the scalability challenges posed by the
large number of flows, and achieve a better
application-perceived accuracy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gupta:2011:DAO,
author = "Gagan Raj Gupta and Ness B. Shroff",
title = "Delay analysis and optimality of scheduling policies
for multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "129--141",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2095506",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We analyze the delay performance of a multihop
wireless network with a fixed route between each
source-destination pair. We develop a new queue
grouping technique to handle the complex correlations
of the service process resulting from the multihop
nature of the flows. A general set-based interference
model is assumed that imposes constraints on links that
can be served simultaneously at any given time. These
interference constraints are used to obtain a
fundamental lower bound on the delay performance of any
scheduling policy for the system. We present a
systematic methodology to derive such lower bounds. For
a special wireless system, namely the clique, we design
a policy that is sample-path delay-optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bianco:2011:CPS,
author = "Andrea Bianco and David Hay and Fabio Neri",
title = "Crosstalk-preventing scheduling in single-and
two-stage {AWG}-based cell switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "142--155",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2054105",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Array waveguide grating (AWG)-based optical switching
fabrics are receiving increasing attention due to their
simplicity and good performance. However, AWGs are
affected by coherent crosstalk that can significantly
impair system operation when the same wavelength is
used simultaneously on several input ports. To permit
large port counts in a $ N \times N $ AWG, a possible
solution is to schedule data transmissions across the
AWG preventing switch configurations that generate
large crosstalk. We study the properties and the
existence conditions of switch configurations able to
control coherent crosstalk.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:BSB,
author = "Tianji Li and Douglas Leith and David Malone",
title = "Buffer sizing for 802.11-based networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "156--169",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089992",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the sizing of network buffers in IEEE
802.11-based networks. Wireless networks face a number
of fundamental issues that do not arise in wired
networks. We demonstrate that the use of fixed-size
buffers in 802.11 networks inevitably leads to either
undesirable channel underutilization or unnecessary
high delays. We present two novel dynamic buffer-sizing
algorithms that achieve high throughput while
maintaining low delay across a wide range of network
conditions. Experimental measurements demonstrate the
utility of the proposed algorithms in a production WLAN
and a lab test bed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Canberk:2011:PUA,
author = "Berk Canberk and Ian F. Akyildiz and Sema Oktug",
title = "Primary user activity modeling using first-difference
filter clustering and correlation in cognitive radio
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "170--183",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2065031",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In many recent studies on cognitive radio (CR)
networks, the primary user activity is assumed to
follow the Poisson traffic model with exponentially
distributed interarrivals. The Poisson modeling may
lead to cases where primary user activities are modeled
as smooth and burst-free traffic. As a result, this may
cause the cognitive radio users to miss some available
but unutilized spectrum, leading to lower throughput
and high false-alarm probabilities. The main
contribution of this paper is to propose a novel model
to parametrize the primary user traffic in a more
efficient and accurate way in order to overcome the
drawbacks of the Poisson modeling.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tague:2011:JAT,
author = "Patrick Tague and Sidharth Nabar and James A. Ritcey
and Radha Poovendran",
title = "Jamming-aware traffic allocation for multiple-path
routing using portfolio selection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "184--194",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2057515",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multiple-path source routing protocols allow a data
source node to distribute the total traffic among
available paths. In this paper, we consider the problem
of jamming-aware source routing in which the source
node performs traffic allocation based on empirical
jamming statistics at individual network nodes. We
formulate this traffic allocation as a lossy network
flow optimization problem using portfolio selection
theory from financial statistics. We show that in
multisource networks, this centralized optimization
problem can be solved using a distributed algorithm
based on decomposition in network utility maximization
(NUM). We demonstrate the network's ability to estimate
the impact of jamming and incorporate these estimates
into the traffic allocation problem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ho:2011:SMC,
author = "Ivan Wang-Hei Ho and Kin K. Leung and John W. Polak",
title = "Stochastic model and connectivity dynamics for
{VANETs} in signalized road systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "195--208",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2057257",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The space and time dynamics of moving vehicles
regulated by traffic signals governs the node
connectivity and communication capability of vehicular
ad hoc networks (VANETs) in urban environments.
However, none of the previous studies on node
connectivity has considered such dynamics with the
presence of traffic lights and vehicle interactions. In
fact, most of them assume that vehicles are distributed
homogeneously throughout the geographic area, which is
unrealistic. We introduce in this paper a stochastic
traffic model for VANETs in signalized urban road
systems. The proposed model is a composite of the fluid
model and stochastic model. The former characterizes
the general flow and evolution of the traffic stream so
that the average density of vehicles is readily
computable, while the latter takes into account the
random behavior of individual vehicles.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2011:LIP,
author = "Yi Xu and Wenye Wang",
title = "The limit of information propagation speed in
large-scale multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "209--222",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2057444",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates the speed limit of information
propagation in large-scale multihop wireless networks,
which provides fundamental understanding of the fastest
information transportation and delivery that a wireless
network is able to accommodate. We show that there
exists a unified speed upper bound for broadcast and
unicast communications in large-scale wireless
networks. When network connectivity is considered, this
speed bound is a function of node density. If the
network noise is constant, the bound is a constant when
node density exceeds a threshold; if the network noise
is an increasing function of node density, the bound
decreases to zero when node density approaches
infinity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:UAO,
author = "Ruogu Li and Atilla Eryilmaz and Lei Ying and Ness B.
Shroff",
title = "A unified approach to optimizing performance in
networks serving heterogeneous flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "223--236",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2059038",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the optimal control of communication networks
in the presence of heterogeneous traffic requirements.
Specifically, we distinguish the flows into two crucial
classes: inelastic for modeling high-priority,
delay-sensitive, and fixed-throughput applications; and
elastic for modeling low-priority, delay-tolerant, and
throughput-greedy applications. We note that the
coexistence of such diverse flows creates complex
interactions at multiple levels (e.g., flow and packet
levels), which prevent the use of earlier design
approaches that dominantly assume homogeneous traffic.
In this work, we develop the mathematical framework and
novel design methodologies needed to support such
heterogeneous requirements and propose provably optimal
network algorithms that account for the multilevel
interactions between the flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Meiners:2011:TTA,
author = "Chad R. Meiners and Alex X. Liu and Eric Torng",
title = "Topological transformation approaches to {TCAM}-based
packet classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "237--250",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2061864",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Several range reencoding schemes have been proposed to
mitigate the effect of range expansion and the
limitations of small capacity, large power consumption,
and high heat generation of ternary content addressable
memory (TCAM)-based packet classification systems.
However, they all disregard the semantics of
classifiers and therefore miss significant
opportunities for space compression. In this paper, we
propose new approaches to range reencoding by taking
into account classifier semantics. Fundamentally
different from prior work, we view reencoding as a
topological transformation process from one colored
hyperrectangle to another, where the color is the
decision associated with a given packet. Stated another
way, we reencode the entire classifier by considering
the classifier's decisions rather than reencode only
ranges in the classifier ignoring the classifier's
decisions as prior work does.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Younis:2011:RRO,
author = "Ossama Mohamed Younis and Marwan M. Krunz and
Srinivasan Ramasubramanian",
title = "{ROC}: resilient online coverage for surveillance
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "251--264",
month = feb,
year = "2011",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider surveillance applications in which sensors
are deployed in large numbers to improve coverage
fidelity. Previous research has studied how to select
active sensor covers (subsets of nodes that cover the
field) to efficiently exploit redundant node deployment
and tolerate unexpected node failures. Little attention
was given to studying the tradeoff between fault
tolerance and energy efficiency in sensor coverage. In
this work, our objectives are twofold. First, we aim at
rapidly restoring field coverage under unexpected
sensor failures in an energy-efficient manner. Second,
we want to flexibly support different degrees of
redundancy in the field without needing centralized
control.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xuan:2011:NCM,
author = "Yuanzhe Xuan and Chin-Tau Lea",
title = "Network-coding multicast networks with {QoS}
guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "265--274",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2062533",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is well known that without admission control,
network congestion is bound to occur. However, to
implement admission control is difficult in IP-based
networks, which are constructed out of the end-to-end
principle, and semantics of most major signaling
protocols can only be interpreted at the edge of the
network. Even if routers can perform admission control
internally, the path computation and the state updating
activities required for setting up and tearing down
each flow will overwhelm the network. A new QoS
architecture, called a nonblocking network, has been
proposed recently, and it requires no internal
admission control and can still offer hard QoS
guarantees.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tapolcai:2011:NAF,
author = "J{\'a}nos Tapolcai and Bin Wu and Pin-Han Ho and Lajos
R{\'o}nyai",
title = "A novel approach for failure localization in
all-optical mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "275--285",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2068057",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Achieving fast and precise failure localization has
long been a highly desired feature in all-optical mesh
networks. Monitoring trail (m-trail) has been proposed
as the most general monitoring structure for achieving
unambiguous failure localization (UFL) of any single
link failure while effectively reducing the amount of
alarm signals flooding the networks. However, it is
critical to come up with a fast and intelligent m-trail
design approach for minimizing the number of m-trails
and the total bandwidth consumed, which ubiquitously
determines the length of the alarm code and bandwidth
overhead for the m-trail deployment, respectively. In
this paper, the m-trail design problem is
investigated.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chiang:2011:CLJ,
author = "Jerry T. Chiang and Yih-Chun Hu",
title = "Cross-layer jamming detection and mitigation in
wireless broadcast networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "286--298",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2068576",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless communication systems are often susceptible
to the jamming attack where adversaries attempt to
overpower transmitted signals by injecting a high level
of noise. Jamming is difficult to mitigate in broadcast
networks because transmitting and receiving are
inherently symmetric operations: A user that possesses
the key to decode a transmission can also use that key
to jam the transmission. We describe a code tree system
that provides input to the physical layer and helps the
physical layer circumvent jammers. In our system, the
transmitter has more information than any proper subset
of receivers. Each receiver cooperates with the
transmitter to detect any jamming that affects that
receiver.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Saleh:2011:EDP,
author = "Mohammad A. Saleh and Ahmed E. Kamal",
title = "Erratum to {{\em Design and Provisioning of WDM
Networks With Many-to-Many Traffic Grooming}}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "1",
pages = "299--299",
month = feb,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2110910",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Mar 14 08:56:22 MDT 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Saleh:2010:DPW}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:PCO,
author = "Peng Wang and Stephan Bohacek",
title = "Practical computation of optimal schedules in multihop
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "305--318",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2111462",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2011:PSL,
author = "Chi Zhang and Yang Song and Yuguang Fang and Yanchao
Zhang",
title = "On the price of security in large-scale wireless ad
hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "319--332",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2106162",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dubois-Ferriere:2011:VDL,
author = "Henri Dubois-Ferri{\`e}re and Matthias Grossglauser
and Martin Vetterli",
title = "Valuable detours: least-cost anypath routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "333--346",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2070844",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lakshmikantha:2011:IFA,
author = "Ashvin Lakshmikantha and Carolyn Beck and R. Srikant",
title = "Impact of file arrivals and departures on buffer
sizing in core routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "347--358",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2114365",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:LTP,
author = "Ruhai Wang and Scott C. Burleigh and Paavan Parikh and
Che-Jen Lin and Bo Sun",
title = "{Licklider} transmission protocol ({LTP})-based {DTN}
for cislunar communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "359--368",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2060733",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2011:PRC,
author = "Cong Liu and Jie Wu",
title = "Practical routing in a cyclic {MobiSpace}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "369--382",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2079944",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liaskos:2011:TRL,
author = "Christos K. Liaskos and Sophia G. Petridou and
Georgios I. Papadimitriou",
title = "Towards realizable, low-cost broadcast systems for
dynamic environments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "383--392",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2062534",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2011:SRW,
author = "Kyu-Han Kim and Kang G. Shin",
title = "Self-reconfigurable wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "393--404",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2096431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sadiq:2011:DOO,
author = "Bilal Sadiq and Seung Jun Baek and Gustavo {De
Veciana}",
title = "Delay-optimal opportunistic scheduling and
approximations: the log rule",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "405--418",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2068308",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Secci:2011:PEM,
author = "Stefano Secci and Jean-Louis Rougier and Achille
Pattavina and Fioravante Patrone and Guido Maier",
title = "Peering equilibrium multipath routing: a game theory
framework for {Internet} peering settlements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "419--432",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2062535",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2011:TST,
author = "Ping Xu and Xiang-Yang Li",
title = "{TOFU}: semi-truthful online frequency allocation
mechanism for wireless network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "433--446",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2067223",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Andrews:2011:SAM,
author = "Matthew Andrews and Lisa Zhang",
title = "Scheduling algorithms for multicarrier wireless data
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "447--455",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2064175",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wei:2011:MBI,
author = "Wei Wei and Bing Wang and Don Towsley and Jim Kurose",
title = "Model-based identification of dominant congested
links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "456--469",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2068058",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kasbekar:2011:LCG,
author = "Gaurav S. Kasbekar and Yigal Bejerano and Saswati
Sarkar",
title = "Lifetime and coverage guarantees through distributed
coordinate-free sensor activation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "470--483",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2077648",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2011:OAT,
author = "Joohwan Kim and Xiaojun Lin and Ness B. Shroff",
title = "Optimal anycast technique for delay-sensitive
energy-constrained asynchronous sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "484--497",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2072515",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Flammini:2011:CRP,
author = "Michele Flammini and Alberto Marchetti-Spaccamela and
Gianpiero Monaco and Luca Moscardelli and Shmuel Zaks",
title = "On the complexity of the regenerator placement problem
in optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "498--511",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2068309",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Thatte:2011:PMA,
author = "Gautam Thatte and Urbashi Mitra and John Heidemann",
title = "Parametric methods for anomaly detection in aggregate
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "512--525",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2070845",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:SBD,
author = "Jung-Shian Li and Ching-Fang Yang and Jian-Hong Chen",
title = "Star-block design in two-level survivable optical
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "526--539",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2069571",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:CBL,
author = "Xiaoping Wang and Jun Luo and Yunhao Liu and Shanshan
Li and Dezun Dong",
title = "Component-based localization in sparse wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "540--548",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2072965",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2011:HBS,
author = "Libin Jiang and Venkat Anantharam and Jean Walrand",
title = "How bad are selfish investments in network security?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "549--560",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2071397",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Elhawary:2011:EEP,
author = "Mohamed Elhawary and Zygmunt J. Haas",
title = "Energy-efficient protocol for cooperative networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "561--574",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089803",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ni:2011:CSP,
author = "Jian Ni and R. Srikant and Xinzhou Wu",
title = "Coloring spatial point processes with applications to
peer discovery in large wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "575--588",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2090172",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Boche:2011:PBU,
author = "Holger Boche and Siddharth Naik and Martin Schubert",
title = "{Pareto} boundary of utility sets for multiuser
wireless systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "589--601",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2083683",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qiu:2011:LRM,
author = "Jian Qiu and Mohan Gurusamy and Kee Chaing Chua and
Yong Liu",
title = "Local restoration with multiple spanning trees in
metro {Ethernet} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "2",
pages = "602--614",
month = apr,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2079945",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:50 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Balakrishnan:2011:MTE,
author = "Mahesh Balakrishnan and Tudor Marian and Kenneth P.
Birman and Hakim Weatherspoon and Lakshmi Ganesh",
title = "{Maelstrom}: transparent error correction for
communication between data centers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "617--629",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2144616",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rhee:2011:LWN,
author = "Injong Rhee and Minsu Shin and Seongik Hong and
Kyunghan Lee and Seong Joon Kim and Song Chong",
title = "On the {Levy}-walk nature of human mobility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "630--643",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2120618",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{ElRouayheb:2011:RNC,
author = "Salim {El Rouayheb} and Alex Sprintson and Costas
Georghiades",
title = "Robust network codes for unicast connections: a case
study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "644--656",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091424",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2011:SMP,
author = "Sheng Huang and Charles U. Martel and Biswanath
Mukherjee",
title = "Survivable multipath provisioning with differential
delay constraint in telecom mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "657--669",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2082560",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hua:2011:BNE,
author = "Nan Hua and Jun Xu and Bill Lin and Haiquan Zhao",
title = "{BRICK}: a novel exact active statistics counter
architecture",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "670--682",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2111461",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ficara:2011:DED,
author = "Domenico Ficara and Andrea {Di Pietro} and Stefano
Giordano and Gregorio Procissi and Fabio Vitucci and
Gianni Antichi",
title = "Differential encoding of {DFAs} for fast regular
expression matching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "683--694",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089639",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sung:2011:TSD,
author = "Yu-Wei Eric Sung and Xin Sun and Sanjay G. Rao and
Geoffrey G. Xie and David A. Maltz",
title = "Towards systematic design of enterprise networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "695--708",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089640",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leconte:2011:IBT,
author = "Mathieu Leconte and Jian Ni and R. Srikant",
title = "Improved bounds on the throughput efficiency of greedy
maximal scheduling in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "709--720",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089534",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rengarajan:2011:AAE,
author = "Balaji Rengarajan and Gustavo {De Veciana}",
title = "Architecture and abstractions for environment and
traffic-aware system-level coordination of wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "721--734",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2098043",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Katrinis:2011:DWO,
author = "Kostas M. Katrinis and Anna Tzanakaki",
title = "On the dimensioning of {WDM} optical networks with
impairment-aware regeneration",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "735--746",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2090540",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2011:OCA,
author = "Xiaolan Joy Zhang and Sun-Il Kim and Steven S.
Lumetta",
title = "Opportunity cost analysis for dynamic wavelength
routed mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "747--759",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2087353",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Das:2011:SPS,
author = "Saumitra Das and Konstantina Papagiannaki and Suman
Banerjee and Y. C. Tay",
title = "{SWARM}: the power of structure in community wireless
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "760--773",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089061",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2011:TOR,
author = "Murali Kodialam and T. V. Lakshman and Sudipta
Sengupta",
title = "Traffic-oblivious routing in the hose model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "774--787",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2099666",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barlet-Ros:2011:PRM,
author = "Pere Barlet-Ros and Gianluca Iannaccone and Josep
Sanju{\`a}s-Cuxart and Josep Sol{\'e}-Pareta",
title = "Predictive resource management of multiple monitoring
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "788--801",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089469",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2011:CSB,
author = "Richard T. B. Ma and Dah Ming Chiu and John C. S. Lui
and Vishal Misra and Dan Rubenstein",
title = "On cooperative settlement between content, transit,
and eyeball {Internet} service providers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "802--815",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089533",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2011:ATO,
author = "Libin Jiang and Jean Walrand",
title = "Approaching throughput-optimality in distributed
{CSMA} scheduling algorithms with collisions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "816--829",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2089804",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Augustin:2011:MMR,
author = "Brice Augustin and Timur Friedman and Renata
Teixeira",
title = "Measuring multipath routing in the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "830--840",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2096232",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ying:2011:CSP,
author = "Lei Ying and Sanjay Shakkottai and Aneesh Reddy and
Shihuan Liu",
title = "On combining shortest-path and back-pressure routing
over multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "841--854",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2094204",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2011:ULG,
author = "Shuyi Chen and Kaustubh R. Joshi and Matti A. Hiltunen
and Richard D. Schlichting and William H. Sanders",
title = "Using link gradients to predict the impact of network
latency on multitier applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "855--868",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2098044",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sorour:2011:ANC,
author = "Sameh Sorour and Shahrokh Valaee",
title = "An adaptive network coded retransmission scheme for
single-hop wireless multicast broadcast services",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "869--878",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091652",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sharma:2011:OAR,
author = "Sushant Sharma and Yi Shi and Y. Thomas Hou and Sastry
Kompella",
title = "An optimal algorithm for relay node assignment in
cooperative ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "879--892",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091148",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chau:2011:CLS,
author = "Chi-Kin Chau and Minghua Chen and Soung Chang Liew",
title = "Capacity of large-scale {CSMA} wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "893--906",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2095880",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Babarczi:2011:ALF,
author = "P{\'e}ter Babarczi and J{\'a}nos Tapolcai and Pin-Han
Ho",
title = "Adjacent link failure localization with monitoring
trails in all-optical mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "907--920",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2096429",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xia:2011:RAP,
author = "Ming Xia and Massimo Tornatore and Charles U. Martel
and Biswanath Mukherjee",
title = "Risk-aware provisioning for optical {WDM} mesh
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "3",
pages = "921--931",
month = jun,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2095037",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:51 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vishwanath:2011:ALP,
author = "Arun Vishwanath and Vijay Sivaraman and George N.
Rouskas",
title = "Anomalous loss performance for mixed real-time and
{TCP} traffic in routers with very small buffers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "933--946",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091721",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the past few years there has been vigorous debate
regarding the size of buffers required at core Internet
routers. Recent arguments supported by theory and
experimentation show that under certain conditions,
core router buffer sizes of a few tens of packets
suffice for realizing acceptable end-to-end TCP
throughputs. This is a significant step toward the
realization of optical packet switched (OPS) networks,
which are inherently limited in their ability to buffer
optical signals. However, prior studies have largely
ignored the presence of real-time traffic, which is
increasing in importance as a source of revenue for
Internet service providers. In this paper, we study the
interaction that happens between real-time (open-loop)
and TCP (closed-loop) traffic when they multiplex at
buffers of very small size (few tens of packets) and
make a significant discovery--namely that in a specific
range of buffer size, real-time traffic losses increase
as buffer size becomes larger.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2011:PFD,
author = "Ren-Shiou Liu and Kai-Wei Fan and Zizhan Zheng and
Prasun Sinha",
title = "Perpetual and fair data collection for environmental
energy harvesting sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "947--960",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091280",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Renewable energy enables sensor networks with the
capability to recharge and provide perpetual data
services. Due to low recharging rates and the dynamics
of renewable energy such as solar and wind power,
providing services without interruptions caused by
battery runouts is nontrivial. Most environment
monitoring applications require data collection from
all nodes at a steady rate. The objective of this paper
is to design a solution for fair and high throughput
data extraction from all nodes in the presence of
renewable energy sources. Specifically, we seek to
compute the lexicographically maximum data collection
rate and routing paths for each node such that no node
will ever run out of energy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2011:FFI,
author = "Zhipeng Yang and Hongyi Wu",
title = "{FINDERS}: a featherlight information network with
delay-endurable {RFID} support",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "961--974",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091425",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the use of radio
frequency identification (RFID) gear for wireless
sensor network construction, aiming to find events of
interest and gather aggregate information. In
particular, we develop a featherlight information
network with delay-endurable RFID support (FINDERS),
composed of passive RFID tags that are ultralight,
durable, and flexible, without power supply for
long-lasting applications. FINDERS faces unprecedented
challenges in communication and networking due to its
sporadic wireless links, unique asymmetric
communication paradigm, intermittent computation
capability, and extremely small memory of tags. Several
effective techniques are proposed to address these
challenges, arriving at an efficient communication
protocol for FINDERS.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{ElRakabawy:2011:PAP,
author = "Sherif M. ElRakabawy and Christoph Lindemann",
title = "A practical adaptive pacing scheme for {TCP} in
multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "975--988",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2095038",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We introduce and evaluate a feasible end-to-end
congestion control algorithm for overcoming the severe
deficiencies of TCP in IEEE 802.11 multihop wireless
networks. Our approach, which we denote as TCP with
Adaptive Pacing (TCP-AP), implements rate-based
scheduling of transmissions within the TCP congestion
window. The TCP source adaptively sets its transmission
rate using an estimate of the current
out-of-interference delay and the coefficient of
variation of recently measured round-trip times. TCP-AP
retains the end-to-end semantics of TCP and neither
relies on modifications at the routing or the link
layer nor requires cross-layer information from
intermediate nodes along the path. As opposed to
previous proposals that build on network simulators, we
implement and evaluate our approach in a real wireless
mesh test-bed comprising 20 nodes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ahuja:2011:SFL,
author = "Satyajeet S. Ahuja and Srinivasan Ramasubramanian and
Marwan Krunz",
title = "{SRLG} failure localization in optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "989--999",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2103402",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We introduce the concepts of monitoring paths (MPs)
and monitoring cycles (MCs) for unique localization of
shared risk linked group (SRLG) failures in all-optical
networks. An SRLG failure causes multiple links to
break simultaneously due to the failure of a common
resource. MCs (MPs) start and end at the same
(distinct) monitoring location(s). They are constructed
such that any SRLG failure results in the failure of a
unique combination of paths and cycles. We derive
necessary and sufficient conditions on the set of MCs
and MPs needed for localizing any single SRLG failure
in an arbitrary graph. When a single monitoring
location is employed, we show that a network must be (k
+ 2)-edge connected for localizing all SRLG failures,
each involving up to k links.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2011:CLS,
author = "Kayi Lee and Eytan Modiano and Hyang-Won Lee",
title = "Cross-layer survivability in {WDM}-based networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1000--1013",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2091426",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In layered networks, a single failure at a lower layer
may cause multiple failures in the upper layers. As a
result, traditional schemes that protect against single
failures may not be effective in multilayer networks.
In this paper, we introduce the problem of maximizing
the connectivity of layered networks. We show that
connectivity metrics in layered networks have
significantly different meaning than their single-layer
counterparts. Results that are fundamental to
survivable single-layer network design, such as the
Max-Flow Min-Cut Theorem, are no longer applicable to
the layered setting. We propose new metrics to measure
connectivity in layered networks and analyze their
properties.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2011:SHW,
author = "Jingjing Zhang and Nirwan Ansari",
title = "Scheduling hybrid {WDM\slash TDM} passive optical
networks with nonzero laser tuning time",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1014--1027",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2093150",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Owing to the high bandwidth provisioning, hybrid
wavelength division multiplexing/time division
multiplexing (WDM/TDM) passive optical network (PON) is
becoming an attractive future-proof access network
solution. In hybrid WDM/TDM PON, tunable lasers are
potential candidate light sources attributed to their
multiwavelength provisioning capability and color-free
property. Currently, the laser tuning time ranges from
a few tens of nanoseconds to seconds, or even minutes,
depending on the adopted technology. Different laser
tuning time may introduce different network
performance. To achieve small packet delay and ensure
fairness, the schedule length for given optical network
unit (ONU) requests is desired to be as short as
possible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hwang:2011:CLO,
author = "June Hwang and Seong-Lyun Kim",
title = "Cross-layer optimization and network coding in
{CSMA\slash CA}-based wireless multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1028--1042",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2096430",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the CSMA/CA multihop
networks where the two end-nodes transmit their packets
to each other and each intermediate node adopts network
coding for delivering bidirectional flows. In addition,
the neighbor nodes are randomly uniformly deployed with
the Poisson Point Process. By varying the combination
of the physical carrier-sensing range of the
transmitter node and the target signal-to-interference
ratio (SIR) set by the receiver node, we can control
the interference level in the network and the degree of
spatial reuse of a frequency band. The larger the
carrier-sensing range is, the smaller the interference
level, while the smaller the opportunity of getting a
channel by a node.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Burchard:2011:SSN,
author = "Almut Burchard and J{\"o}rg Liebeherr and Florin
Ciucu",
title = "On superlinear scaling of network delays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1043--1056",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2095505",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate scaling properties of end-to-end delays
in packet networks for a flow that traverses a sequence
of H nodes and that experiences cross traffic at each
node. When the traffic flow and the cross traffic do
not satisfy independence assumptions, we find that
delay bounds scale faster than linearly. More
precisely, for exponentially bounded packetized
traffic, we show that delays grow with $ \Theta (H \log
H) $ in the number of nodes on the network path.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2011:TOO,
author = "Shihuan Liu and Lei Ying and R. Srikant",
title = "Throughput-optimal opportunistic scheduling in the
presence of flow-level dynamics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1057--1070",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2100826",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider multiuser scheduling in wireless networks
with channel variations and flow-level dynamics.
Recently, it has been shown that the MaxWeight
algorithm, which is throughput-optimal in networks with
a fixed number of users, fails to achieve the maximum
throughput in the presence of flow-level dynamics. In
this paper, we propose a new algorithm,
calledWorkload-based Scheduling with Learning, which is
provably throughput-optimal, requires no prior
knowledge of channels and user demands, and performs
significantly better than previously suggested
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kamal:2011:OPA,
author = "Ahmed E. Kamal and Aditya Ramamoorthy and Long Long
and Shizheng Li",
title = "Overlay protection against link failures using network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1071--1084",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2098418",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces a network coding-based
protection scheme against single- and multiple-link
failures. The proposed strategy ensures that in a
connection, each node receives two copies of the same
data unit: one copy on the working circuit and a second
copy that can be extracted from linear combinations of
data units transmitted on a shared protection path.
This guarantees instantaneous recovery of data units
upon the failure of a working circuit. The strategy can
be implemented at an overlay layer, which makes its
deployment simple and scalable. While the proposed
strategy is similar in spirit to the work of Kamal in
2007 2010, there are significant differences.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cittadini:2011:WRR,
author = "Luca Cittadini and Giuseppe {Di Battista} and Massimo
Rimondini and Stefano Vissicchio",
title = "Wheel $+$ ring $=$ reel: the impact of route filtering
on the stability of policy routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1085--1096",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2106798",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Border Gateway Protocol (BGP) allows providers to
express complex routing policies preserving high
degrees of autonomy. However, unrestricted routing
policies can adversely impact routing stability. A key
concept to understand the interplay between autonomy
and expressiveness on one side, and stability on the
other side, is safety under filtering, i.e., guaranteed
stability under autonomous usage of route filters. BGP
route filters are used to selectively advertise
specific routes to specific neighbors. In this paper,
we provide a characterization of safety under
filtering, filling the large gap between previously
known necessary and sufficient conditions. Our
characterization is based on the absence of a
particular kind of dispute wheel, a structure involving
circular dependencies among routing preferences.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Raza:2011:GNS,
author = "Saqib Raza and Yuanbo Zhu and Chen-Nee Chuah",
title = "Graceful network state migrations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1097--1110",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2097604",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A significant fraction of network events (such as
topology or route changes) and the resulting
performance degradation stem from premeditated network
management and operational tasks. This paper introduces
a general class of Graceful Network State Migration
(GNSM) problems, where the goal is to discover the
optimal sequence of operations that progressively
transition the network from its initial to a desired
final state while minimizing the overall performance
disruption. We investigate two specific GNSM problems:
(1) Link Weight Reassignment Scheduling (LWRS) studies
the optimal ordering of link weight updates to migrate
from an existing to a new link weight assignment; and
(2) Link Maintenance Scheduling (LMS) looks at how to
schedule link deactivations and subsequent
reactivations for maintenance purposes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chau:2011:ALS,
author = "Chi-Kin Chau and Prithwish Basu",
title = "Analysis of latency of stateless opportunistic
forwarding in intermittently connected networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1111--1124",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2103321",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Stateless opportunistic forwarding is a simple
fault-tolerant distributed scheme for packet delivery,
data gathering, and information querying in
intermittently connected networks by which packets are
forwarded to the next available neighbors in a ``random
walk'' fashion until they reach their intended
destinations or expire. It has been employed in diverse
situations, for instance, when: (1) the global network
topology is not known or is highly dynamic; (2) the
availability of the next-hop neighbors is not easily
controllable; or (3) the relaying nodes are
computationally constrained. Data delivery in sensor
networks, ad hoc networks, and delay-tolerant networks
are well-known applications besides searching in
peer-to-peer networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jaramillo:2011:OSF,
author = "Juan Jos{\'e} Jaramillo and R. Srikant",
title = "Optimal scheduling for fair resource allocation in ad
hoc networks with elastic and inelastic traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1125--1136",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2100083",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the problem of congestion control
and scheduling in ad hoc wireless networks that have to
support a mixture of best-effort and real-time traffic.
Optimization and stochastic network theory have been
successful in designing architectures for fair resource
allocation to meet long-term throughput demands.
However, to the best of our knowledge, strict packet
delay deadlines were not considered in this framework
previously. In this paper, we propose a model for
incorporating the quality-of-service (QoS) requirements
of packets with deadlines in the optimization
framework.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Urgaonkar:2011:NCR,
author = "Rahul Urgaonkar and Michael J. Neely",
title = "Network capacity region and minimum energy function
for a delay-tolerant mobile ad hoc network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1137--1150",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2103367",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate two quantities of interest in a
delay-tolerant mobile ad hoc network: the network
capacity region and the minimum energy function. The
network capacity region is defined as the set of all
input rates that the network can stably support
considering all possible scheduling and routing
algorithms. Given any input rate vector in this region,
the minimum energy function establishes the minimum
time-average power required to support it. In this
paper, we consider a cell-partitioned model of a
delay-tolerant mobile ad hoc network with general
Markovian mobility. This simple model incorporates the
essential features of locality of wireless
transmissions as well as node mobility and enables us
to exactly compute the corresponding network capacity
and minimum energy function.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Giacomelli:2011:OPG,
author = "Riccardo Giacomelli and Radha Krishna Ganti and Martin
Haenggi",
title = "Outage probability of general ad hoc networks in the
high-reliability regime",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1151--1163",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2100099",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Outage probabilities in wireless networks depend on
various factors: the node distribution, the MAC scheme,
and the models for path loss, fading, and transmission
success. In prior work on outage characterization for
networks with randomly placed nodes, most of the
emphasis was put on networks whose nodes are
Poisson-distributed and where ALOHA is used as the MAC
protocol. In this paper, we provide a general framework
for the analysis of outage probabilities in the
high-reliability regime. The outage probability
characterization is based on two parameters: the
intrinsic spatial contention of the network, introduced
by Haenggi in a previous work, and the coordination
level achieved by the MAC as measured by the
interference scaling exponent introduced in this
paper.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:BBT,
author = "Shao-Cheng Wang and Ahmed Helmy",
title = "{BEWARE}: background traffic-aware rate adaptation for
{IEEE} 802.11",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1164--1177",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2106140",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "IEEE 802.11-based devices employ rate adaptation
algorithms to dynamically switch data rates to
accommodate the fluctuating wireless channel
conditions. Many studies observed that when there are
other stations transmitting in the network, existing
rate adaptation performance degrades significantly due
to its inability to differentiate losses between
wireless noise and contention collisions. In this
paper, we first conduct a systematic evaluation on the
effectiveness of various rate adaptation protocols,
which try to address this issue by exploiting optional
RTS frames to isolate the wireless losses from
collision losses. We observe that these existing
schemes do not perform well in many background traffic
scenarios and can mislead the rate adaptation
algorithms to persist on using similar data rate
combinations regardless of background traffic level,
thus resulting in performance penalty in certain
scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aziz:2011:UTR,
author = "Adel Aziz and David Starobinski and Patrick Thiran",
title = "Understanding and tackling the root causes of
instability in wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1178--1193",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2102771",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate, both theoretically and experimentally,
the stability of CSMA-based wireless mesh networks,
where a network is said to be stable if and only if the
queue of each relay node remains (almost surely)
finite. We identify two key factors that impact
stability: the network size and the so-called
``stealing effect,'' a consequence of the hidden-node
problem and nonzero transmission delays. We consider
the case of a greedy source and prove, by using
Foster's theorem, that three-hop networks are stable,
but only if the stealing effect is accounted for. We
also prove that four-hop networks are, on the contrary,
always unstable (even with the stealing effect) and
show by simulations that instability extends to more
complex linear and nonlinear topologies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lan:2011:SBS,
author = "Tian Lan and Xiaojun Lin and Mung Chiang and Ruby B.
Lee",
title = "Stability and benefits of suboptimal utility
maximization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1194--1207",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2144617",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network utility maximization has been widely used to
model resource allocation and network architectures.
However, in practice, often it cannot be solved
optimally due to complexity reasons. Thus motivated, we
address the following two questions in this paper: (1)
Can suboptimal utility maximization maintain queue
stability? (2) Can underoptimization of utility
objective function in fact benefit other network design
objectives? We quantify the following intuition: A
resource allocation that is suboptimal with respect to
a utility maximization formulation maintains maximum
flow-level stability when the utility gap is
sufficiently small and information delay is bounded,
and it can still provide a guaranteed size of stability
region otherwise.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pelechrinis:2011:MDA,
author = "Konstantinos Pelechrinis and Ioannis Broustis and
Srikanth V. Krishnamurthy and Christos Gkantsidis",
title = "A measurement-driven anti-jamming system for 802.11
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1208--1222",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2106139",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Dense, unmanaged IEEE 802.11 deployments tempt
saboteurs into launching jamming attacks by injecting
malicious interference. Nowadays, jammers can be
portable devices that transmit intermittently at low
power in order to conserve energy. In this paper, we
first conduct extensive experiments on an indoor 802.11
network to assess the ability of two physical-layer
functions, rate adaptation and power control, in
mitigating jamming. In the presence of a jammer, we
find that: (1) the use of popular rate adaptation
algorithms can significantly degrade network
performance; and (2) appropriate tuning of the carrier
sensing threshold allows a transmitter to send packets
even when being jammed and enables a receiver to
capture the desired signal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2011:EER,
author = "M. Kodialam and T. V. Lakshman and James B. Orlin and
Sudipta Sengupta",
title = "End-to-end restorable oblivious routing of hose model
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1223--1236",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2121918",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Two-phase routing, where traffic is first distributed
to intermediate nodes before being routed to the final
destination, has been recently proposed for handling
widely fluctuating traffic without the need to adapt
network routing to changing traffic. Preconfiguring the
network in a traffic-independent manner using two-phase
routing simplifies network operation considerably. In
this paper, we extend this routing scheme by providing
resiliency against link failures through end-to-end
shared backup path restoration. We view this as
important progress toward adding carrier-class
reliability to the robustness of the scheme so as to
facilitate its future deployment in Internet service
provider (ISP) networks. In shared backup path
restoration, each connection consists of a
link-disjoint primary and backup path pair; two backup
paths can share bandwidth on their common links if
their primary paths are link-disjoint.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2011:PCM,
author = "Minsik Lee and Youngjip Kim and Chong-Ho Choi",
title = "Period-controlled {MAC} for high performance in
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "4",
pages = "1237--1250",
month = aug,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2107332",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sun Nov 6 07:43:52 MST 2011",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose Period-Controlled Medium
Access Control (PC-MAC), which can operate in
pseudo-TDMA manner and achieves high throughput and
fairness in simple networks. PC-MAC works like CSMA/CA
initially and becomes a pseudo-TDMA scheme in a few
seconds due to the periodic backoff mechanism along
with the contention control that tries to maintain the
number of idle slots to an optimal level. Simulation
results show 10\%-50\% higher throughput than
distributed coordination function (DCF), depending on
the number of nodes, while maintaining nearly perfect
fairness. Furthermore, we also show how PC-MAC can
successfully be applied to complex networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yoon:2011:FCS,
author = "MyungKeun Yoon and Tao Li and Shigang Chen and
Jih-Kwon Peir",
title = "Fit a compact spread estimator in small high-speed
memory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1253--1264",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2010.2080285",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The spread of a source host is the number of distinct
destinations that it has sent packets to during a
measurement period. A spread estimator is a
software/hardware module on a router that inspects the
arrival packets and estimates the spread of each
source. It has important applications in detecting port
scans and distributed denial-of-service (DDoS) attacks,
measuring the infection rate of a worm, assisting
resource allocation in a server farm, determining
popular Web contents for caching, to name a few. The
main technical challenge is to fit a spread estimator
in a fast but small memory (such as SRAM) in order to
operate it at the line speed in a high-speed network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2011:TCA,
author = "Reuven Cohen and Niloofar Fazlollahi and David
Starobinski",
title = "Throughput-competitive advance reservation with
bounded path dispersion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1265--1275",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2104367",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In response to the high throughput needs of grid and
cloud computing applications, several production
networks have recently started to support advance
reservation of dedicated circuits. An important open
problem within this context is to devise advance
reservation algorithms that can provide provable
throughput performance guarantees independently of the
specific network topology and arrival pattern of
reservation requests. In this paper, we first show that
the throughput performance of greedy approaches, which
return the earliest possible completion time for each
incoming request, can be arbitrarily worse than
optimal. Next, we introduce two new online,
polynomial-time algorithms for advance reservation,
called BatchAll and BatchLim.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rajawat:2011:CLD,
author = "Ketan Rajawat and Nikolaos Gatsis and Georgios B.
Giannakis",
title = "Cross-layer designs in coded wireless fading networks
with multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1276--1289",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2109010",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A cross-layer design along with an optimal resource
allocation framework is formulated for wireless fading
networks, where the nodes are allowed to perform
network coding. The aim is to jointly optimize
end-to-end transport-layer rates, network code design
variables, broadcast link flows, link capacities,
average power consumption, and short-term power
allocation policies. As in the routing paradigm where
nodes simply forward packets, the cross-layer
optimization problem with network coding is nonconvex
in general. It is proved, however, that with network
coding, dual decomposition for multicast is optimal so
long as the fading at each wireless link is a
continuous random variable. This lends itself to
provably convergent subgradient algorithms, which not
only admit a layered-architecture interpretation, but
also optimally integrate network coding in the protocol
stack.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aperjis:2011:BME,
author = "Christina Aperjis and Ramesh Johari and Michael J.
Freedman",
title = "Bilateral and multilateral exchanges for peer-assisted
content distribution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1290--1303",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2114898",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Users of the BitTorrent file-sharing protocol and its
variants are incentivized to contribute their upload
capacity in a bilateral manner: Downloading is possible
in return for uploading to the same user. An
alternative is to use multilateral exchange to match
user demand for content to available supply at other
users in the system. We provide a formal comparison of
peer-to-peer system designs based on bilateral exchange
with those that enable multilateral exchange via a
price-based market mechanism to match supply and
demand. First, we compare the two types of exchange in
terms of the equilibria that arise. A multilateral
equilibrium allocation is Pareto-efficient, while we
demonstrate that bilateral equilibrium allocations are
not Pareto-efficient in general.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Batayneh:2011:RTR,
author = "Marwan Batayneh and Dominic A. Schupke and Marco
Hoffmann and Andreas Kirstaedter and Biswanath
Mukherjee",
title = "On routing and transmission-range determination of
multi-bit-rate signals over mixed-line-rate {WDM}
optical networks for carrier {Ethernet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1304--1316",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2107748",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Ethernet's success in local area networks (LANs) is
fueling the efforts to extend its reach to cover metro
and long-haul networks. This new Ethernet is refereed
to as Carrier Ethernet. Among the various transport
infrastructures for realizing Carrier Ethernet,
wavelength-division multiplexing (WDM) optical network
is a strong candidate for this purpose. Optical
transmission rates per channel are increasing from 10
to 40 Gb/s and even 100 Gb/s, and they can also coexist
in the same fiber. Along with the flexibility
associated with such a network with mixed-line rates
(MLR), signal-related constraints at high rates become
a challenge for cost-efficient routing. Among these
issues is the maximum nonregenerated optical distance
that a signal can travel before its quality degrades or
maximum transmission range (TR).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2011:DSP,
author = "Chuan Wu and Baochun Li and Shuqiao Zhao",
title = "On dynamic server provisioning in multichannel {P2P}
live streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1317--1330",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2107563",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To guarantee the streaming quality in live
peer-to-peer (P2P) streaming channels, it is preferable
to provision adequate levels of upload capacities at
dedicated streaming servers, compensating for peer
instability and time-varying peer upload bandwidth
availability. Most commercial P2P streaming systems
have resorted to the practice of overprovisioning a
fixed amount of upload capacity on streaming servers.
In this paper, we have performed a detailed analysis on
10 months of run-time traces from UUSee, a commercial
P2P streaming system, and observed that available
server capacities are not able to keep up with the
increasing demand by hundreds of channels. We propose a
novel online server capacity provisioning algorithm
that proactively adjusts server capacities available to
each of the concurrent channels, such that the supply
of server bandwidth in each channel dynamically adapts
to the forecasted demand, taking into account the
number of peers, the streaming quality, and the channel
priority.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Onus:2011:MMD,
author = "Melih Onus and Andr{\'e}a W. Richa",
title = "Minimum maximum-degree publish-subscribe overlay
network design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1331--1343",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2144999",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Designing an overlay network for publish/subscribe
communication in a system where nodes may subscribe to
many different topics of interest is of fundamental
importance. For scalability and efficiency, it is
important to keep the degree of the nodes in the
publish/subscribe system low. It is only natural then
to formalize the following problem: Given a collection
of nodes and their topic subscriptions, connect the
nodes into a graph that has least possible maximum
degree in such a way that for each topic t, the graph
induced by the nodes interested in t is connected. We
present the first polynomial-time logarithmic
approximation algorithm for this problem and prove an
almost tight lower bound on the approximation ratio.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2011:MDL,
author = "Donghyun Kim and Wei Wang and Nassim Sohaee and
Changcun Ma and Weili Wu and Wonjun Lee and Ding-Zhu
Du",
title = "Minimum data-latency-bound $k$-sink placement problem
in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1344--1353",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2109394",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a new multiple-sink
positioning problem in wireless sensor networks to best
support real-time applications. We formally define this
problem as the k-Sink Placement Problem (k-SPP) and
prove that it is APX-complete. We show that an existing
approximation algorithm for the well-known-center
problem is a constant factor approximation of k-SPP.
Furthermore, we introduce a new greedy algorithm for
k-SPP and prove its approximation ratio is very near to
the best achievable, 2. Via simulations, we show our
algorithm outperforms its competitor on average.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:DCT,
author = "Xinbing Wang and Wentao Huang and Shangxing Wang and
Jinbei Zhang and Chenhui Hu",
title = "Delay and capacity tradeoff analysis for motioncast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1354--1367",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2109042",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we define multicast for an ad hoc
network through nodes' mobility as MotionCast and study
the delay and capacity tradeoffs for it. Assuming nodes
move according to an independently and identically
distributed (i.i.d.) pattern and each desires to send
packets to k distinctive destinations, we compare the
delay and capacity in two transmission protocols: one
uses 2-hop relay algorithm without redundancy; the
other adopts the scheme of redundant packets
transmissions to improve delay while at the expense of
the capacity. In addition, we obtain the maximum
capacity and the minimum delay under certain
constraints. We find that the per-node delay and
capacity for the 2-hop algorithm without redundancy are
$ \Theta (1 / k) $ and $ \Theta (n \log k) $,
respectively; for the 2-hop algorithm with redundancy,
they are $ \Omega (1 / k \root n \log k) $ and $ \Theta
(\root n \log k) $, respectively.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koutsonikolas:2011:ENC,
author = "Dimitrios Koutsonikolas and Chih-Chun Wang and Y.
Charlie Hu",
title = "Efficient network-coding-based opportunistic routing
through cumulative coded acknowledgments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1368--1381",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2111382",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The use of random linear network coding (NC) has
significantly simplified the design of opportunistic
routing (OR) protocols by removing the need of
coordination among forwarding nodes for avoiding
duplicate transmissions. However, NC-based OR protocols
face a new challenge: How many coded packets should
each forwarder transmit? To avoid the overhead of
feedback exchange, most practical existing NC-based OR
protocols compute offline the expected number of
transmissions for each forwarder using heuristics based
on periodic measurements of the average link loss rates
and the ETX metric. Although attractive due to their
minimal coordination overhead, these approaches may
suffer significant performance degradation in dynamic
wireless environments with continuously changing levels
of channel gains, interference, and background
traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:RPC,
author = "Bo Li and Cem Boyaci and Ye Xia",
title = "A refined performance characterization of
longest-queue-first policy in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1382--1395",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2108314",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "One of the major challenges in wireless networking is
how to optimize the link scheduling decisions under
interference constraints. Recently, a few algorithms
have been introduced to address the problem. However,
solving the problem to optimality for general wireless
interference models is known to be NP-hard. The
research community is currently focusing on finding
simpler suboptimal scheduling algorithms and on
characterizing the algorithm performance. In this
paper, we address the performance of a specific
scheduling policy called Longest Queue First (LQF),
which has gained significant recognition lately due to
its simplicity and high efficiency in empirical
studies. There has been a sequence of studies
characterizing the guaranteed performance of the LQF
schedule, culminating at the construction of the $
\sigma $-local pooling concept by Joo et al.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Treurniet:2011:NAC,
author = "Joanne Treurniet",
title = "A network activity classification schema and its
application to scan detection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1396--1404",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2109009",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet traffic is neither well-behaved nor
well-understood, which makes it difficult to detect
malicious activities such as scanning. A large portion
of scanning activity is of a slow scan type and is not
currently detectable by security appliances. In this
proof-of-concept study, a new scan detection technique
is demonstrated that also improves our understanding of
Internet traffic. Sessions are created using models of
the behavior of packet-level data between host pairs,
and activities are identified by grouping sessions
based on patterns in the type of session, the IP
addresses, and the ports. In a 24-h data set of nearly
10 million incoming sessions, a prodigious 78\% were
identified as scan probes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2011:DIF,
author = "Zhenyu Wu and Mengjun Xie and Haining Wang",
title = "Design and implementation of a fast dynamic packet
filter",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1405--1419",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2111381",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents Swift, a packet filter for
high-performance packet capture on commercial
off-the-shelf hardware. The key features of the Swift
include: (1) extremely lowfilter update latency for
dynamic packet filtering, and (2) gigabits-per-second
high-speed packet processing. Based on complex
instruction set computer (CISC) instruction set
architecture (ISA), Swift achieves the former with an
instruction set design that avoids the need for
compilation and security checking, and the latter by
mainly utilizing single instruction, multiple data
(SIMD). We implement Swift in the Linux 2.6 kernel for
both i386 and x86-64 architectures and extensively
evaluate its dynamic and static filtering performance
on multiple machines with different hardware setups.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dhamdhere:2011:TYE,
author = "Amogh Dhamdhere and Constantine Dovrolis",
title = "Twelve years in the evolution of the {Internet}
ecosystem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1420--1433",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2119327",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Our goal is to understand the evolution of the
autonomous system (AS) ecosystem over the last 12
years. Instead of focusing on abstract topological
properties, we classify ASs into a number of types
depending on their function and business type.
Furthermore, we consider the semantics of inter-AS
links: customer-provider versus peering relations. We
find that the available historic datasets from
RouteViews and RIPE are not sufficient to infer the
evolution of peering links, and so we restrict our
focus to customer-provider links. Our findings
highlight some important trends in the evolution of the
Internet over the last 12 years and hint at what the
Internet is heading toward.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Drugan:2011:DCS,
author = "Ovidiu Valentin Drugan and Thomas Plagemann and Ellen
Munthe-Kaas",
title = "Detecting communities in sparse {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1434--1447",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2112376",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In sparse mobile ad hoc networks, placement of
services and data is crucial to assure their
availability to all nodes because sparse population of
nodes can lead to (frequent) network partitions. If
these dynamic networks display a fairly stable cluster
structure, it is possible to utilize this structure to
improve service and data availability. However,
clustering in a dynamic network is a very challenging
task due to the ever-changing topology and irregular
density of such a network. In this paper, we
investigate clustering of dynamic networks with the
help of community detection mechanisms, using only
topology information from the local routing table.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2011:DAD,
author = "Dan Li and Jianping Wu and Jiangchuan Liu and Yong Cui
and Ke Xu",
title = "Defending against distance cheating in link-weighted
application-layer multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1448--1457",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2118230",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Application-layer multicast (ALM) has recently emerged
as a promising solution for diverse group-oriented
applications. Unlike dedicated routers in IP multicast,
the autonomous end-hosts are generally unreliable and
even selfish. A strategic host might cheat about its
private information to affect protocol execution and,
in turn, to improve its individual benefit.
Specifically, in a link-weighted ALM protocol where the
hosts measure the distances from their neighbors and
accordingly construct the ALM topology, a selfish
end-host can easily intercept the measurement message
and exaggerate the distances to other nodes, so as to
reduce the probability of being a relay. Such distance
cheating, rarely happening in IP multicast, can
significantly impact the efficiency and stability of
the ALM topology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baccelli:2011:DDP,
author = "Fran{\c{c}}ois Baccelli and Nicholas Bambos and
Nicolas Gast",
title = "Distributed delay-power control algorithms for
bandwidth sharing in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1458--1471",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2163079",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we formulate a delay-power control
(DPC) scheme for wireless networking, which efficiently
balances delay against transmitter power on each
wireless link. The DPC scheme is scalable, as each link
autonomously updates its power based on the
interference observed at its receiver; no cross-link
communication is required. It is shown that DPC
converges to a unique equilibrium power and several key
properties are established, concerning the nature of
channel bandwidth sharing achieved by the links. The
DPC scheme is contrasted to the well-known
Foschini-Miljanic (FM) formulation for transmitter
power control in wireless networks, and some key
advantages are established.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jian:2011:AML,
author = "Ying Jian and Ming Zhang and Shigang Chen",
title = "Achieving {MAC}-layer fairness in {CSMA\slash CA}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1472--1484",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2116124",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We demonstrate that CSMA/CA networks, including IEEE
802.11 networks, exhibit severe fairness problem in
many scenarios, where some hosts obtain most of the
channel's bandwidth while others starve. Most existing
solutions require nodes to overhear transmissions made
by contending nodes and, based on the overheard
information, adjust local rates to achieve fairness
among all contending links. Their underlying assumption
is that transmissions made by contending nodes can be
overheard. However, this assumption holds only when the
transmission range is equal to the interference range,
which is not true in reality. As our study reveals, the
overhearing-based solutions, as well as several
nonoverhearing AIMD solutions, cannot achieve MAC-layer
fairness in various settings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2011:SCL,
author = "Qinglin Zhao and Danny H. K. Tsang and Taka Sakurai",
title = "A simple critical-load-based {CAC} scheme for {IEEE
802.11 DCF} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1485--1498",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2116801",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes a simple and practical call
admission control (CAC) scheme for one-hop IEEE 802.11
distributed coordination function (DCF) networks in
heterogeneous environments. The proposed scheme is the
first CAC scheme derived from an asymptotic analysis of
the critical traffic load, where the critical traffic
load represents the threshold for queue stability. The
salient feature of our CAC scheme is that it can be
performed quickly and easily without the need for
network performance measurements and complex
calculations. Using the proposed scheme, we
specifically investigate the voice capacity of 802.11
DCF networks with unbalanced traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lestas:2011:NES,
author = "Marios Lestas and Andreas Pitsillides and Petros
Ioannou and George Hadjipollas",
title = "A new estimation scheme for the effective number of
users in {Internet} congestion control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1499--1512",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2149540",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many congestion control protocols have been recently
proposed in order to alleviate the problems encountered
by TCP in high-speed networks and wireless links.
Protocols utilizing an architecture that is in the same
spirit as the ABR service in ATM networks require
estimates of the effective number of users utilizing
each link in the network to maintain stability in the
presence of delays. In this paper, we propose a novel
estimation algorithm that is based on online parameter
identification techniques and is shown through analysis
and simulations to converge to the effective number of
users utilizing each link. The algorithm does not
require maintenance of per-flow states within the
network or additional fields in the packet header, and
it is shown to outperform previous proposals that were
based on pointwise division in time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Singh:2011:IAH,
author = "Sumit Singh and Raghuraman Mudumbai and Upamanyu
Madhow",
title = "Interference analysis for highly directional {60-GHz}
mesh networks: the case for rethinking medium access
control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1513--1527",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2122343",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate spatial interference statistics for
multigigabit outdoor mesh networks operating in the
unlicensed 60-GHz ``millimeter (mm) wave'' band. The
links in such networks are highly directional: Because
of the small carrier wavelength (an order of magnitude
smaller than those for existing cellular and wireless
local area networks), narrow beams are essential for
overcoming higher path loss and can be implemented
using compact electronically steerable antenna arrays.
Directionality drastically reduces interference, but it
also leads to ``deafness,'' making implicit
coordination using carrier sense infeasible. In this
paper, we make a quantitative case for rethinking
medium access control (MAC) design in such settings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Singh:2011:PCC,
author = "Chandramani Singh and Saswati Sarkar and Alireza
Aram",
title = "Provider-customer coalitional games",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1528--1542",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2135863",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Efficacy of commercial wireless networks can be
substantially enhanced through large-scale cooperation
among involved entities such as providers and
customers. The success of such cooperation is
contingent upon the design of judicious resource
allocation strategies that ensure that the individuals'
pay-offs are commensurate to the resources they offer
to the coalition. The resource allocation strategies
depend on which entities are decision-makers and
whether and how they share their aggregate payoffs.
Initially, we consider the scenario where the providers
are the only decision-makers and they do not share
their payoffs. We formulate the resource allocation
problem as a nontransferable payoff coalitional game
and show that there exists a cooperation strategy that
leaves no incentive for any subset of providers to
split from the grand coalition, i.e., the core of the
game is nonempty.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kwong:2011:FEP,
author = "Kin-Wah Kwong and Lixin Gao and Roch Gu{\'e}rin and
Zhi-Li Zhang",
title = "On the feasibility and efficacy of protection routing
in {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1543--1556",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2123916",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With network components increasingly reliable, routing
is playing an ever greater role in determining network
reliability. This has spurred much activity in
improving routing stability and reaction to failures
and rekindled interest in centralized routing
solutions, at least within a single routing domain.
Centralizing decisions eliminates uncertainty and many
inconsistencies and offers added flexibility in
computing routes that meet different criteria. However,
it also introduces new challenges, especially in
reacting to failures where centralization can increase
latency. This paper leverages the flexibility afforded
by centralized routing to address these challenges.
Specifically, we explore when and how standby backup
forwarding options can be activated while waiting for
an update from the centralized server after the failure
of an individual component (link or node).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gianvecchio:2011:HBI,
author = "Steven Gianvecchio and Mengjun Xie and Zhenyu Wu and
Haining Wang",
title = "Humans and bots in {Internet} chat: measurement,
analysis, and automated classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "5",
pages = "1557--1571",
month = oct,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2126591",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 24 16:24:19 MST 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The abuse of chat services by automated programs,
known as chat bots, poses a serious threat to Internet
users. Chat bots target popular chat networks to
distribute spam and malware. In this paper, we first
conduct a series of measurements on a large commercial
chat network. Our measurements capture a total of 16
different types of chat bots ranging from simple to
advanced. Moreover, we observe that human behavior is
more complex than bot behavior. Based on the
measurement study, we propose a classification system
to accurately distinguish chat bots from human users.
The proposed classification system consists of two
components: (1) an entropy-based classifier; and (2) a
Bayesian-based classifier.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Garcia-Luna-Aceves:2011:PID,
author = "J. J. Garcia-Luna-Aceves and Rolando Menchaca-Mendez",
title = "{PRIME}: an interest-driven approach to integrated
unicast and multicast routing in {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1573--1586",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2119402",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A framework for integrated multicast and unicast
routing in mobile ad hoc networks (MANETs) is
introduced. It is based on interest-defined mesh
enclaves that are connected components of a MANET
spanning the sources and receivers of unicast or
multicast flows. The Protocol for Routing in
Interest-defined Mesh Enclaves (PRIME) is presented to
implement the proposed framework for integrated routing
in MANETs. PRIME establishes meshes that are activated
and deactivated by the presence or absence of interest
in individual destination nodes and groups and confines
most of the signaling overhead within regions of
interest (enclaves) in such meshes. The routes
established in PRIME are shown to be free of permanent
loops. Experimental results based on extensive
simulations show that PRIME attains similar or better
data delivery and end-to-end delays than traditional
unicast and multicast routing schemes for MANETs (AODV,
OLSR, ODMRP). The experiments also show that signaling
in PRIME is far more scalable than the one used by
traditional multicast and unicast routing protocols
such as AODV, OLSR, or ODMRP.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Oggier:2011:ACA,
author = "Fr{\'e}d{\'e}rique Oggier and Hanane Fathi",
title = "An authentication code against pollution attacks in
network coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1587--1596",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2126592",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/cryptography2010.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Systems exploiting network coding to increase their
throughput suffer greatly from pollution attacks, which
consist of injecting malicious packets in the network.
The pollution attacks are amplified by the network
coding process, resulting in a greater damage than
under traditional routing. In this paper, we address
this issue by designing an unconditionally secure
authentication code (that is, which does not rely on
computational assumptions) suitable for multicast
network coding, where the keying material is initially
computed and distributed by a trusted authority to the
destinations and intermediate nodes. The proposed
scheme allows not only destinations, but also
intermediate nodes, to verify the integrity and origin
of the packets received without having to decode, and
thus detect and discard the malicious messages in
transit that fail the verification. This way, the
pollution is canceled out before reaching the
destinations. The proposed scheme is robust against
pollution attacks from outsiders, as well as coalitions
of malicious insider nodes, which have the ability to
perform the integrity check, but instead get corrupted
and use their knowledge to themselves attack the
network. We analyze the performance of the scheme in
terms of both throughput and goodput and show that the
price to pay for tolerating inside attackers is a high
decrease in throughput (it is inversely proportional to
the number of insider attackers that can collude). We
finally discuss applications to file distribution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bui:2011:NAR,
author = "Loc X. Bui and R. Srikant and Alexander Stolyar",
title = "A novel architecture for reduction of delay and
queueing structure complexity in the back-pressure
algorithm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1597--1609",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2126593",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The back-pressure algorithm is a well-known
throughput-optimal algorithm. However, its
implementation requires that each node has to maintain
a separate queue for each commodity in the network, and
only one queue is served at a time. This fact may lead
to a poor delay performance even when the traffic load
is not close to network capacity. Also, since the
number of commodities in the network is usually very
large, the queueing data structure that has to be
maintained at each node is respectively complex. In
this paper, we present a solution to address both of
these issues in the case of a fixed-routing network
scenario where the route of each flow is chosen upon
arrival. Our proposed architecture allows each node to
maintain only per-neighbor queues and, moreover,
improves the delay performance of the back-pressure
algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Neumayer:2011:AVF,
author = "Sebastian Neumayer and Gil Zussman and Reuven Cohen
and Eytan Modiano",
title = "Assessing the vulnerability of the fiber
infrastructure to disasters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1610--1623",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2128879",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Communication networks are vulnerable to natural
disasters, such as earthquakes or floods, as well as to
physical attacks, such as an electromagnetic pulse
(EMP) attack. Such real-world events happen in specific
geographical locations and disrupt specific parts of
the network. Therefore, the geographical layout of the
network determines the impact of such events on the
network's connectivity. In this paper, we focus on
assessing the vulnerability of (geographical) networks
to such disasters. In particular, we aim to identify
the most vulnerable parts of the network. That is, the
locations of disasters that would have the maximum
disruptive effect on the network in terms of capacity
and connectivity. We consider graph models in which
nodes and links are geographically located on a plane.
First, we consider a simplistic bipartite graph model
and present a polynomial-time algorithm for finding a
worst-case vertical line segment cut. We then
generalize the network model to graphs with nodes at
arbitrary locations.We model the disaster event as a
line segment or a disk and develop polynomial-time
algorithms that find a worst-case line segment cut and
a worst-case circular cut. Finally, we obtain numerical
results for a specific backbone network, thereby
demonstrating the applicability of our algorithms to
real-world networks. Our novel approach provides a
promising new direction for network design to avert
geographical disasters or attacks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Smaragdakis:2011:SON,
author = "Georgios Smaragdakis and Nikolaos Laoutaris and
Vassilis Lekakis and Azer Bestavros and John W. Byers
and Mema Roussopoulos",
title = "Selfish overlay network creation and maintenance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1624--1637",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2129528",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A foundational issue underlying many overlay network
applications ranging from routing to peer-to-peer file
sharing is that of the network formation, i.e., folding
new arrivals into an existing overlay, and rewiring to
cope with changing network conditions. Previous work
has considered the problem from two perspectives:
devising practical heuristics for the case of
cooperative peers and performing game-theoretic
analysis for the case of selfish peers. In this paper,
we unify the aforementioned thrusts by defining and
studying the selfish neighbor selection (SNS) game and
its application to overlay routing. At the heart of SNS
stands the restriction that peers are allowed up to a
certain number of neighbors. This makes SNS
substantially different from existing network formation
games that impose no bounds on peer degrees. Having
bounded degrees has important practical consequences as
it permits the creation of overlay structures that
require O ( n ) instead of O ( n$^2$ ) link monitoring
overhead. We show that a node's ``best response''
wiring strategy amounts to solving a k -median problem
on asymmetric distance. Best-response wirings have
substantial practical utility as they permit selfish
nodes to reap substantial performance benefits when
connecting to overlays of nonselfish nodes. A more
intricate consequence is that even nonselfish nodes can
benefit from the existence of some selfish nodes since
the latter, via their local optimizations, create a
highly optimized backbone, upon which even simple
heuristic wirings yield good performance. To capitalize
on the above properties, we design, build, and deploy
EGOIST, an SNS-inspired prototype overlay routing
system for PlanetLab. We demonstrate that EGOIST
outperforms existing heuristic overlays on a variety of
performance metrics, including delay, available
bandwidth, and node utilization, while it remains
competitive with an optimal but unscalable full-mesh
overlay.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Giorgetti:2011:ULR,
author = "Gianni Giorgetti and Sandeep Kumar S. Gupta and
Gianfranco Manes",
title = "Understanding the limits of {RF}-based collaborative
localization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1638--1651",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2141681",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "RF-based localization has gained popularity as a
low-cost solution to support position awareness in ad
hoc networks. The received signal strength (RSS)
measured by pairs of nodes can be used to obtain either
range estimates or connectivity information. It is not
clear, however: (1) when a range-based scheme should be
used in favor of a connectivity-based one, and (2) how
to optimally convert the RSS into connectivity data.
This paper uses analysis of the Fisher information and
the Cram{\'e}r-Rao bound (CRB) to answer these
questions. Solutions are found by comparing the network
connectivity against two values: the critical
connectivity (CC) and the optimal connectivity (OC).
After discussing the properties of both values, we show
how their approximation can be used to improve the
performance of RF-based localization systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barghi:2011:MAM,
author = "Sanaz Barghi and Hamid Jafarkhani and Homayoun
Yousefi'zadeh",
title = "{MIMO}-assisted {MPR}-aware {MAC} design for
asynchronous {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1652--1665",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2130538",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The use of multiple-packet reception (MPR) in wireless
networks is known to improve throughput especially in
high-traffic conditions. The lack of synchronization
among the nodes in random access systems introduces
significant challenges toward the adoption of MPR in
the PHY and the MAC design for systems using MPR. In
this paper, we propose an asynchronous MPR method for
the PHY and also design a compatible random access MAC
for wireless local area networks (WLANs). Relying on
space-time coding techniques, our MPR method detects
multiple asynchronous packets while providing diversity
and low bit error rates at the PHY layer. Extending the
design of IEEE 802.11, our MPR MAC design encourages
simultaneous packet transmissions and handles multiple
packet receptions. Simulation results show that the
throughput of a WLAN significantly improves in many
scenarios of operation using our proposed PHY/MAC MPR
framework.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kalafut:2011:TDO,
author = "Andrew J. Kalafut and Craig A. Shue and Minaxi Gupta",
title = "Touring {DNS} open houses for trends and
configurations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1666--1675",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2130537",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Domain Name System (DNS) is a critical component
of the Internet. It maps domain names to IP addresses
and serves as a distributed database for various other
applications, including mail, Web, and spam filtering.
This paper examines DNS zones in the Internet for
diversity, adoption rates of new technologies, and
prevalence of configuration issues. To gather data, we
sweep 60\% of the Internet's domains in June-August
2007 for zone transfers. Of them, 6.6\% allow us to
transfer their complete information. Surprisingly, this
includes a large fraction of the domains deploying DNS
security extensions (DNSSEC). We find that DNS zones
vary significantly in size and some span many
autonomous systems. Also, while anti-spam technologies
appear to be getting deployed, the adoption rates of
DNSSEC and IPv6 continue to be low. Finally, we also
find that carelessness in handing DNS records can lead
to reduced availability of name servers, e-mail, and
Web servers. This also undermines anti-spam efforts and
the efforts to shut down phishing sites or to contain
malware infections.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Damjanovic:2011:ETS,
author = "Dragana Damjanovic and Michael Welzl",
title = "An extension of the {TCP} steady-state throughput
equation for parallel flows and its application in
{MulTFRC}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1676--1689",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2142008",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the first part of this paper, we present a simple
extension of the well-known TCP steady-state throughput
equation that can be used to calculate the throughput
of several flows that share an end-to-end path. The
value of this extension, which we show to work well
with simulations as well as real-life measurements, is
its practical applicability. Thus, in the second part
of this paper, we present its application in MulTFRC, a
TCP-friendly rate control (TFRC)-based congestion
control mechanism that is fair to a number of parallel
TCP flows while maintaining a smoother sending rate
than multiple real TFRC flows do. MulTFRC enables its
users to prioritize transfers by controlling the
fairness among them in an almost arbitrary fashion.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rengarajan:2011:PAU,
author = "Balaji Rengarajan and Gustavo {De Veciana}",
title = "Practical adaptive user association policies for
wireless systems with dynamic interference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1690--1703",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2158655",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the impact of user association policies on
flow-level performance in interference-limited wireless
networks. Most research in this area has used static
interference models (neighboring base stations are
always active) and resorted to intuitive objectives
such as load balancing. In this paper, we show that
this can be counterproductive in the presence of
dynamic interference that couples the transmission
rates to users at various base stations. We propose a
methodology to optimize the performance of a class of
coupled systems and apply it to study the user
association problem. We show that by properly inducing
load asymmetries, substantial performance gains can be
achieved relative to a load-balancing policy (e.g., 15
times reduction in mean delay). We present a practical,
measurement based, interference-aware association
policy that infers the degree of interference-induced
coupling and adapts to it. Systematic simulations
establish that both our optimized static and adaptive
association policies substantially outperform various
dynamic policies that can, in extreme cases, even be
susceptible to Braess's paradox-like phenomena, i.e.,
an increase in the number of base stations can lead to
worse performance under greedy association policies.
Furthermore, these results are robust to changes in
file-size distributions, large-scale propagation
parameters, and spatial load distributions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liang:2011:OBS,
author = "Chao Liang and Miao Zhao and Yong Liu",
title = "Optimal bandwidth sharing in multiswarm multiparty
{P2P} video-conferencing systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1704--1716",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2141680",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a multiparty video conference, multiple users
simultaneously distribute video streams to their
receivers. As the traditional server-based solutions
incur high infrastructure and bandwidth cost,
conventional peer-to-peer (P2P) solutions only
leveraging end-users' upload bandwidth are normally not
self-sustainable: The video streaming workload
increases quadratically with the number of users as
each user could generate and distribute video streams,
while the user upload bandwidth only increases
linearly. Recently, hybrid solutions have been proposed
that employ helpers to address the bandwidth deficiency
in P2P video-conferencing swarms. It is also noticed
that a system hosting multiple parallel conferencing
swarms can benefit from cross-swarm bandwidth sharing.
However, how to optimally share bandwidth in such
systems has not been explored so far. In this paper, we
study the optimal bandwidth sharing in multiswarm
multiparty P2P video-conferencing systems with helpers
and investigate two cross-swarm bandwidth-sharing
scenarios: (1) swarms are independent and peers from
different swarms share a common pool of helpers; (2)
swarms are cooperative and peers in a bandwidth-rich
swarm can further share their bandwidth with peers in a
bandwidth-poor swarm. For each scenario, we develop
distributed algorithms for intraswarm and interswarm
bandwidth allocation under a utility-maximization
framework. Through analysis and simulation, we show
that the proposed algorithms are robust to peer
dynamics and can adaptively allocate peer and helper
bandwidth across swarms so as to achieve the
system-wide optimum.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2011:LSR,
author = "Dahai Xu and Mung Chiang and Jennifer Rexford",
title = "Link-state routing with hop-by-hop forwarding can
achieve optimal traffic engineering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1717--1730",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2134866",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See corrections \cite{Xu:2015:CLS}.",
abstract = "This paper settles an open question with a positive
answer: Optimal traffic engineering (or optimal
multicommodity flow) can be realized using just
link-state routing protocols with hop-by-hop
forwarding. Today's typical versions of these
protocols, Open Shortest Path First (OSPF) and
Intermediate System-Intermediate System (IS-IS), split
traffic evenly over shortest paths based on link
weights. However, optimizing the link weights for
OSPF/IS-IS to the offered traffic is a well-known
NP-hard problem, and even the best setting of the
weights can deviate significantly from an optimal
distribution of the traffic. In this paper, we propose
a new link-state routing protocol, PEFT, that splits
traffic over multiple paths with an exponential penalty
on longer paths. Unlike its predecessor, DEFT, our new
protocol provably achieves optimal traffic engineering
while retaining the simplicity of hop-by-hop
forwarding. The new protocol also leads to a
significant reduction in the time needed to compute the
best link weights. Both the protocol and the
computational methods are developed in a conceptual
framework, called Network Entropy Maximization, that is
used to identify the traffic distributions that are not
only optimal, but also realizable by link-state
routing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ghosh:2011:MSS,
author = "Amitabha Ghosh and {\"O}zlem Durmaz Incel and V. S.
Anil Kumar and Bhaskar Krishnamachari",
title = "Multichannel scheduling and spanning trees:
throughput-delay tradeoff for fast data collection in
sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1731--1744",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2146273",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the tradeoff between two mutually
conflicting performance objectives--throughput and
delay--for fast, periodic data collection in tree-based
sensor networks arbitrarily deployed in 2-D. Two
primary factors that affect the data collection rate
(throughput) and timeliness (delay) are: (1) efficiency
of the link scheduling protocol, and (2) structure of
the routing tree in terms of its node degrees and
radius. In this paper, we utilize multiple frequency
channels and design an efficient link scheduling
protocol that gives a constant factor approximation on
the optimal throughput in delivering aggregated data
from all the nodes to the sink. To minimize the maximum
delay subject to a given throughput bound, we also
design an $ (\alpha, \beta)$-bicriteria approximation
algorithm to construct a Bounded-Degree Minimum-Radius
Spanning Tree, with the radius of the tree at most $
\beta $ times the minimum possible radius for a given
degree bound $ \Delta^*$, and the degree of any node at
most $ \Delta^* + \alpha $, where $ \alpha $ and $
\beta $ are positive constants. Lastly, we evaluate the
efficiency of our algorithms on different types of
spanning trees and show that multichannel scheduling,
combined with optimal routing topologies, can achieve
the best of both worlds in terms of maximizing the
aggregated data collection rate and minimizing the
maximum packet delay.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ciullo:2011:ICM,
author = "Delia Ciullo and Valentina Martina and Michele Garetto
and Emilio Leonardi",
title = "Impact of correlated mobility on delay-throughput
performance in mobile ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1745--1758",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2140128",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We extend the analysis of the scaling laws of wireless
ad hoc networks to the case of correlated nodes
movements, which are commonly found in real mobility
processes. We consider a simple version of the
Reference Point Group Mobility model, in which nodes
belonging to the same group are constrained to lie in a
disc area, whose center moves uniformly across the
network according to the i.i.d. model. We assume fast
mobility conditions and take as a primary goal the
maximization of per-node throughput. We discover that
correlated node movements have a huge impact on
asymptotic throughput and delay and can sometimes lead
to better performance than the one achievable under
independent nodes movements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Christodoulopoulos:2011:IDM,
author = "Konstantinos Christodoulopoulos and Panagiotis
Kokkinos and Emmanouel Manos Varvarigos",
title = "Indirect and direct multicost algorithms for online
impairment-aware {RWA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1759--1772",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2138717",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the online impairment-aware routing and
wavelength assignment (IA-RWA) problem in transparent
WDM networks. To serve a new connection, the online
algorithm, in addition to finding a route and a free
wavelength (a lightpath), has to guarantee its
transmission quality, which is affected by
physical-layer impairments. Due to interference
effects, the establishment of the new lightpath affects
and is affected by the other lightpaths. We present two
multicost algorithms that account for the actual
current interference among lightpaths, as well as for
other physical effects, performing a cross-layer
optimization between the network and physical layers.
In multicost routing, a vector of cost parameters is
assigned to each link, from which the cost vectors of
the paths are calculated. The first algorithm utilizes
cost vectors consisting of impairment-generating source
parameters, so as to be generic and applicable to
different physical settings. These parameters are
combined into a scalar cost that indirectly evaluates
the quality of candidate lightpaths. The second
algorithm uses specific physical-layer models to define
noise variance-related cost parameters, so as to
directly calculate the Q -factor of candidate
lightpaths. The algorithms find a set of so-called
nondominated paths to serve the connection in the sense
that no path is better in the set with respect to all
cost parameters. To select the lightpath, we propose
various optimization functions that correspond to
different IA-RWA algorithms. The proposed algorithms
combine the strength of multicost optimization with low
execution times, making them appropriate for serving
online connections.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ying:2011:CBB,
author = "Lei Ying and R. Srikant and Don Towsley and Shihuan
Liu",
title = "Cluster-based back-pressure routing algorithm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1773--1786",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2141682",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The back-pressure algorithm introduced in 1992 by
Tassiulas and Ephremides is a well-known distributed
and adaptive routing/scheduling algorithm where nodes
only need the queue-length information of neighboring
nodes to make routing decisions. Packets are adaptively
routed in the network according to congestion
information, which makes the algorithm resilient to
traffic and topology changes. However, the backpressure
algorithm requires routers to maintain a separate queue
for each destination, which precludes its
implementation in large-scale networks. In this paper,
we propose a distributed cluster-based back-pressure
routing algorithm that retains the adaptability of
back-pressure routing while significantly reducing the
number of queues that have to be maintained at each
node.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dong:2011:TDW,
author = "Dezun Dong and Mo Li and Yunhao Liu and Xiang-Yang Li
and Xiangke Liao",
title = "Topological detection on wormholes in wireless ad hoc
and sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1787--1796",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2163730",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wormhole attack is a severe threat to wireless ad hoc
and sensor networks. Most existing countermeasures
either require specialized hardware devices or make
strong assumptions on the network in order to capture
the specific (partial) symptom induced by wormholes.
Those requirements and assumptions limit the
applicability of previous approaches. In this paper, we
present our attempt to understand the impact and
inevitable symptom of wormholes and develop distributed
detection methods by making as few restrictions and
assumptions as possible. We fundamentally analyze the
wormhole problem using a topology methodology and
propose an effective distributed approach, which relies
solely on network connectivity information, without any
requirements on special hardware devices or any
rigorous assumptions on network properties. We formally
prove the correctness of this design in continuous
geometric domains and extend it into discrete domains.
We evaluate its performance through extensive
simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rangwala:2011:NCC,
author = "Sumit Rangwala and Apoorva Jindal and Ki-Young Jang
and Konstantinos Psounis and Ramesh Govindan",
title = "Neighborhood-centric congestion control for multihop
wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1797--1810",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2146272",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Complex interference in static multihop wireless mesh
networks can adversely affect transport protocol
performance. Since TCP does not explicitly account for
this, starvation and unfairness can result from the use
of TCP over such networks. In this paper, we explore
mechanisms for achieving fair and efficient congestion
control for multihop wireless mesh networks. First, we
design an AIMD-based rate-control protocol called
Wireless Control Protocol (WCP), which recognizes that
wireless congestion is a neighborhood phenomenon, not a
node-local one, and appropriately reacts to such
congestion. Second, we design a distributed rate
controller that estimates the available capacity within
each neighborhood and divides this capacity to
contending flows, a scheme we call Wireless Control
Protocol with Capacity estimation (WCPCap). Using
analysis, simulations, and real deployments, we find
that our designs yield rates that are both fair and
efficient. WCP assigns rates inversely proportional to
the number of bottlenecks a flow passes through while
remaining extremely easy to implement. An idealized
version of WCPCap is max-min fair, whereas a practical
implementation of the scheme achieves rates within 15\%
of the max-min optimal rates while still being
distributed and amenable to real implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Budzisz:2011:FCL,
author = "Lukasz Budzisz and Rade Stanojevi{\'c} and Arieh
Schlote and Fred Baker and Robert Shorten",
title = "On the fair coexistence of loss- and delay-based
{TCP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1811--1824",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159736",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents and develops a novel delay-based
additive increase, multiplicative decrease (AIMD)
congestion control algorithm. The main features of the
proposed solution include: (1) low standing queues and
delay in homogeneous environments (with delay-based
flows only); (2) fair coexistence of delay- and
loss-based flows in heterogeneous environments; (3)
delay-based flows behave as loss-based flows when
loss-based flows are present in the network; otherwise
they revert to delay-based operation. It is also shown
that these properties can be achieved without any
appreciable increase in network loss rate over that
which would be present in a comparable network of
standard TCP flows (loss-based AIMD). To demonstrate
the potential of the presented algorithm, both
analytical and simulation results are provided in a
range of different network scenarios. These include
stability and convergence results in general
multiple-bottleneck networks and a number of simulation
scenarios to demonstrate the utility of the proposed
scheme. In particular, we show that networks employing
our algorithm have the features of networks in which
RED AQM's are deployed. Furthermore, in a wide range of
situations (including high-speed scenarios), we show
that low delay is achieved irrespective of the queueing
algorithm employed in the network, with only
sender-side modification to the basic AIMD algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kodialam:2011:OST,
author = "Murali Kodialam and T. V. Lakshman and Sarit Mukherjee
and Limin Wang",
title = "Online scheduling of targeted advertisements for
{IPTV}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1825--1834",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2143725",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Behavioral targeting of content to users is a huge and
lucrative business, valued as a \$20 billion industry
that is growing rapidly. So far, the dominant players
in this field like Google and Yahoo! examine the user
requests coming to their servers and place appropriate
ads based on the user's search keywords. Triple-play
service providers have access to all the traffic
generated by the users and can generate more
comprehensive profiles of users based on their TV,
broadband, and mobile usage. Using such multisource
profile information, they can generate new revenue
streams by smart targeting of ads to their users over
multiple screens (computer, TV, and mobile handset).
This paper proposes methods to place targeted ads to a
TV based on user's interests. It proposes an ad auction
model that can leverage multisource profile and can
handle dynamic profile-based targeting like Google's
AdWords vis-{\`a}-vis static demography-based targeting
of legacy TV. We then present a 0.502-competitive
revenue maximizing scheduling algorithm that chooses a
set of ads in each time slot and assigns users to one
of these selected ads.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2011:RLN,
author = "Kayi Lee and Hyang-Won Lee and Eytan Modiano",
title = "Reliability in layered networks with random link
failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1835--1848",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2143425",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider network reliability in layered networks
where the lower layer experiences random link failures.
In layered networks, each failure at the lower layer
may lead to multiple failures at the upper layer. We
generalize the classical polynomial expression for
network reliability to the multilayer setting. Using
random sampling techniques, we develop polynomial-time
approximation algorithms for the failure polynomial.
Our approach gives an approximate expression for
reliability as a function of the link failure
probability, eliminating the need to resample for
different values of the failure probability.
Furthermore, it gives insight on how the routings of
the logical topology on the physical topology impact
network reliability. We show that maximizing the min
cut of the (layered) network maximizes reliability in
the low-failure-probability regime. Based on this
observation, we develop algorithms for routing the
logical topology to maximize reliability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:CSR,
author = "Meng Wang and Chee Wei Tan and Weiyu Xu and Ao Tang",
title = "Cost of not splitting in routing: characterization and
estimation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1849--1859",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2150761",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the performance difference of joint
routing and congestion control when either single-path
routes or multipath routes are used. Our performance
metric is the total utility achieved by jointly
optimizing transmission rates using congestion control
and paths using source routing. In general, this
performance difference is strictly positive and hard to
determine--in fact an NP-hard problem. To better
estimate this performance gap, we develop analytical
bounds to this ``cost of not splitting'' in routing. We
prove that the number of paths needed for optimal
multipath routing differs from that of optimal
single-path routing by no more than the number of links
in the network. We provide a general bound on the
performance loss, which is independent of the number of
source-destination pairs when the latter is larger than
the number of links in a network. We also propose a
vertex projection method and combine it with a greedy
branch-and-bound algorithm to provide progressively
tighter bounds on the performance loss. Numerical
examples are used to show the effectiveness of our
approximation technique and estimation algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2011:SCM,
author = "Pu Wang and Ian F. Akyildiz",
title = "Spatial correlation and mobility-aware traffic
modeling for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "19",
number = "6",
pages = "1860--1873",
month = dec,
year = "2011",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2162340",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jan 5 18:42:19 MST 2016",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, there has been a great deal of research on
using mobility in wireless sensor networks (WSNs) to
facilitate surveillance and reconnaissance in a wide
deployment area. Besides providing an extended sensing
coverage, node mobility along with spatial correlation
introduces new network dynamics, which could lead to
the traffic patterns fundamentally different from the
traditional (Markovian) models. In this paper, a novel
traffic modeling scheme for capturing these dynamics is
proposed that takes into account the statistical
patterns of node mobility and spatial correlation. The
contributions made in this paper are twofold. First, it
is shown that the joint effects of mobility and spatial
correlation can lead to bursty traffic. More
specifically, a high mobility variance and small
spatial correlation can give rise to
pseudo-long-range-dependent (LRD) traffic (high bursty
traffic), whose autocorrelation function decays slowly
and hyperbolically up to a certain cutoff time lag.
Second, due to the ad hoc nature of WSNs, certain relay
nodes may have several routes passing through them,
necessitating local traffic aggregations. At these
relay nodes, our model predicts that the aggregated
traffic also exhibits the bursty behavior characterized
by a scaled power-law decayed autocovariance function.
According to these findings, a novel traffic shaping
protocol using movement coordination is proposed to
facilitate effective and efficient resource
provisioning strategy. Finally, simulation results
reveal a close agreement between the traffic pattern
predicted by our theoretical model and the simulated
transmissions from multiple independent sources, under
specific bounds of the observation intervals.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Charbonneau:2012:SRW,
author = "Neal Charbonneau and Vinod M. Vokkarane",
title = "Static routing and wavelength assignment for multicast
advance reservation in all-optical wavelength-routed
{WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "1--14",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175007",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the static multicast
advance reservation (MCAR) problem for all-optical
wavelength-routed WDM networks. Under the advanced
reservation traffic model, connection requests specify
their start time to be some time in the future and also
specify their holding times. We investigate the static
MCAR problem where the set of advance reservation
requests is known ahead of time. We prove the MCAR
problem is NP-complete, formulate the problem
mathematically as an integer linear program (ILP), and
develop three efficient heuristics, seqRWA, ISH, and
SA, to solve the problem for practical size networks.
We also introduce a theoretical lower bound on the
number of wavelengths required. To evaluate our
heuristics, we first compare their performances to the
ILP for small networks, and then simulate them over
real-world, large-scale networks. We find the SA
heuristic provides close to optimal results compared to
the ILP for our smaller networks, and up to a 33\%
improvement over seqRWA and up to a 22\% improvement
over ISH on realistic networks. SA provides, on
average, solutions 1.5--1.8 times the cost given by our
conservative lower bound on large networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shpungin:2012:TEE,
author = "Hanan Shpungin and Zongpeng Li",
title = "Throughput and energy efficiency in wireless ad hoc
networks with {Gaussian} channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "15--28",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2158237",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the bottleneck link capacity under
the Gaussian channel model in strongly connected random
wireless ad hoc networks, with n nodes independently
and uniformly distributed in a unit square. We assume
that each node is equipped with two transceivers (one
for transmission and one for reception) and allow all
nodes to transmit simultaneously. We draw lower and
upper bounds, in terms of bottleneck link capacity, for
homogeneous networks (all nodes have the same
transmission power level) and propose an
energy-efficient power assignment algorithm (CBPA) for
heterogeneous networks (nodes may have different power
levels), with a provable bottleneck link capacity
guarantee of, $ \Omega (B \log (1 + 1 / \sqrt {n \log^2
n})) $, where $B$ is the channel bandwidth. In
addition, we develop a distributed implementation of
CBPA with $ O(n^2)$ message complexity and provide
extensive simulation results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2012:EEE,
author = "Binbin Chen and Ziling Zhou and Yuda Zhao and Haifeng
Yu",
title = "Efficient error estimating coding: feasibility and
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "29--44",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157357",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Motivated by recent emerging systems that can leverage
partially correct packets in wireless networks, this
paper proposes the novel concept of error estimating
coding (EEC). Without correcting the errors in the
packet, EEC enables the receiver of the packet to
estimate the packet's bit error rate, which is perhaps
the most important meta-information of a partially
correct packet. Our EEC design provides provable
estimation quality with rather low redundancy and
computational overhead. To demonstrate the utility of
EEC, we exploit and implement EEC in two wireless
network applications, Wi-Fi rate adaptation and
real-time video streaming. Our real-world experiments
show that these applications can significantly benefit
from EEC.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Raza:2012:MFR,
author = "Saqib Raza and Guanyao Huang and Chen-Nee Chuah and
Srini Seetharaman and Jatinder Pal Singh",
title = "{MeasuRouting}: a framework for routing assisted
traffic monitoring",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "45--56",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159991",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Monitoring transit traffic at one or more points in a
network is of interest to network operators for reasons
of traffic accounting, debugging or troubleshooting,
forensics, and traffic engineering. Previous research
in the area has focused on deriving a placement of
monitors across the network toward the end of
maximizing the monitoring utility of the network
operator for a given traffic routing. However, both
traffic characteristics and measurement objectives can
dynamically change over time, rendering a previously
optimal placement of monitors suboptimal. It is not
feasible to dynamically redeploy/reconfigure
measurement infrastructure to cater to such evolving
measurement requirements. We address this problem by
strategically routing traffic subpopulations over fixed
monitors. We refer to this approach as MeasuRouting.
The main challenge for MeasuRouting is to work within
the constraints of existing intradomain traffic
engineering operations that are geared for efficiently
utilizing bandwidth resources, or meeting
quality-of-service (QoS) constraints, or both. A
fundamental feature of intradomain routing, which makes
MeasuRouting feasible, is that intradomain routing is
often specified for aggregate flows. MeasuRouting can
therefore differentially route components of an
aggregate flow while ensuring that the aggregate
placement is compliant to original traffic engineering
objectives. In this paper, we present a theoretical
framework for MeasuRouting. Furthermore, as proofs of
concept, we present synthetic and practical monitoring
applications to showcase the utility enhancement
achieved with MeasuRouting.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:SVM,
author = "Peilong Li and Honghai Zhang and Baohua Zhao and
Sampath Rangarajan",
title = "Scalable video multicast with adaptive modulation and
coding in broadband wireless data systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "57--68",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157700",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Future mobile broadband networks are characterized
with high data rate and improved coverage, which will
enable real-time video multicast and broadcast
services. Scalable video coding (SVC), combined with
adaptive modulation and coding schemes (MCS) and
wireless multicast, provides an excellent solution for
streaming video to heterogeneous wireless devices. By
choosing different MCSs for different video layers, SVC
can provide good video quality to users in good channel
conditions while maintaining basic video quality for
users in bad channel conditions. A key issue to apply
SVC to wireless multicast streaming is to choose
appropriate MCS for each video layer and to determine
the optimal resource allocation among multiple video
sessions. We formulate this problem as total utility
maximization, subject to the constraint of available
radio resources. We prove that the formulated problem
is NP-hard and propose an optimal, two-step dynamic
programming solution with pseudo-polynomial time
complexity. Simulation results show that our algorithm
offers significant improvement on the video quality
over a naive algorithm and an adapted greedy algorithm,
especially in the scenarios with multiple real video
sequences and limited radio resources.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Singh:2012:CPS,
author = "Chandramani Singh and Saswati Sarkar and Alireza Aram
and Anurag Kumar",
title = "Cooperative profit sharing in coalition-based resource
allocation in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "69--83",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159735",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a network in which several service
providers offer wireless access to their respective
subscribed customers through potentially multihop
routes. If providers cooperate by jointly deploying and
pooling their resources, such as spectrum and
infrastructure (e.g., base stations) and agree to serve
each others' customers, their aggregate payoffs, and
individual shares, may substantially increase through
opportunistic utilization of resources. The potential
of such cooperation can, however, be realized only if
each provider intelligently determines with whom it
would cooperate, when it would cooperate, and how it
would deploy and share its resources during such
cooperation. Also, developing a rational basis for
sharing the aggregate payoffs is imperative for the
stability of the coalitions. We model such cooperation
using the theory of transferable payoff coalitional
games. We show that the optimum cooperation strategy,
which involves the acquisition, deployment, and
allocation of the channels and base stations (to
customers), can be computed as the solution of a
concave or an integer optimization. We next show that
the grand coalition is stable in many different
settings, i.e., if all providers cooperate, there is
always an operating point that maximizes the providers'
aggregate payoff, while offering each a share that
removes any incentive to split from the coalition. The
optimal cooperation strategy and the stabilizing payoff
shares can be obtained in polynomial time by
respectively solving the primals and the duals of the
above optimizations, using distributed computations and
limited exchange of confidential information among the
providers. Numerical evaluations reveal that
cooperation substantially enhances individual
providers' payoffs under the optimal cooperation
strategy and several different payoff sharing rules.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2012:DGA,
author = "Kai Chen and Chuanxiong Guo and Haitao Wu and Jing
Yuan and Zhenqian Feng and Yan Chen and Songwu Lu and
Wenfei Wu",
title = "{DAC}: generic and automatic address configuration for
data center networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "84--99",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157520",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Data center networks encode locality and topology
information into their server and switch addresses for
performance and routing purposes. For this reason, the
traditional address configuration protocols such as
DHCP require a huge amount of manual input, leaving
them error-prone. In this paper, we present DAC, a
generic and automatic Data center Address Configuration
system. With an automatically generated blueprint that
defines the connections of servers and switches labeled
by logical IDs, e.g., IP addresses, DAC first learns
the physical topology labeled by device IDs, e.g., MAC
addresses. Then, at the core of DAC is its
device-to-logical ID mapping and malfunction detection.
DAC makes an innovation in abstracting the
device-to-logical ID mapping to the graph isomorphism
problem and solves it with low time complexity by
leveraging the attributes of data center network
topologies. Its malfunction detection scheme detects
errors such as device and link failures and miswirings,
including the most difficult case where miswirings do
not cause any node degree change.We have evaluated DAC
via simulation, implementation, and experiments. Our
simulation results show that DAC can accurately find
all the hardest-to-detect malfunctions and can
autoconfigure a large data center with 3.8 million
devices in 46 s. In our implementation, we successfully
autoconfigure a small 64-server BCube network within
300 ms and show that DAC is a viable solution for data
center autoconfiguration.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sridharan:2012:GLS,
author = "Arun Sridharan and C. Emre Koksal and Elif
Uysal-Biyikoglu",
title = "A greedy link scheduler for wireless networks with
{Gaussian} multiple-access and broadcast channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "100--113",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157356",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Information-theoretic broadcast channels (BCs) and
multiple-access channels (MACs) enable a single node to
transmit data simultaneously to multiple nodes, and
multiple nodes to transmit data simultaneously to a
single node, respectively. In this paper, we address
the problem of link scheduling in multihop wireless
networks containing nodes with BC and MAC capabilities.
We first propose an interference model that extends
protocol interference models, originally designed for
point-to-point channels, to include the possibility of
BCs and MACs. Due to the high complexity of optimal
link schedulers, we introduce the Multiuser Greedy
Maximum Weight algorithm for link scheduling in
multihop wireless networks containing BCs and MACs.
Given a network graph, we develop new local pooling
conditions and show that the performance of our
algorithm can be fully characterized using the
associated parameter, the multiuser local pooling
factor. We provide examples of some network graphs, on
which we apply local pooling conditions and derive the
multiuser local pooling factor. We prove optimality of
our algorithm in tree networks and show that the
exploitation of BCs and MACs improve the throughput
performance considerably in multihop wireless
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dikbiyik:2012:EEC,
author = "Ferhat Dikbiyik and Laxman Sahasrabuddhe and Massimo
Tornatore and Biswanath Mukherjee",
title = "Exploiting excess capacity to improve robustness of
{WDM} mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "114--124",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159123",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Excess capacity (EC) is the unused capacity in a
network. We propose EC management techniques to improve
network performance. Our techniques exploit the EC in
two ways. First, a connection preprovisioning algorithm
is used to reduce the connection setup time. Second,
whenever possible, we use protection schemes that have
higher availability and shorter protection switching
time. Specifically, depending on the amount of EC
available in the network, our proposed EC management
techniques dynamically migrate connections between
high-availability, high-backup-capacity protection
schemes and low-availability, low-backup-capacity
protection schemes. Thus, multiple protection schemes
can coexist in the network. The four EC management
techniques studied in this paper differ in two
respects: when the connections are migrated from one
protection scheme to another, and which connections are
migrated. Specifically, Lazy techniques migrate
connections only when necessary, whereas Proactive
techniques migrate connections to free up capacity in
advance. Partial Backup Reprovisioning (PBR) techniques
try to migrate a minimal set of connections, whereas
Global Backup Reprovisioning (GBR) techniques migrate
all connections. We develop integer linear program
(ILP) formulations and heuristic algorithms for the EC
management techniques. We then present numerical
examples to illustrate how the EC management techniques
improve network performance by exploiting the EC in
wavelength-division-multiplexing (WDM) mesh networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yu:2012:LEN,
author = "Minlan Yu and Marina Thottan and Li Li",
title = "Latency equalization as a new network service
primitive",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "125--138",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2155669",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multiparty interactive network applications such as
teleconferencing, network gaming, and online trading
are gaining popularity. In addition to end-to-end
latency bounds, these applications require that the
delay difference among multiple clients of the service
is minimized for a good interactive experience. We
propose a Latency EQualization (LEQ) service, which
equalizes the perceived latency for all clients
participating in an interactive network application. To
effectively implement the proposed LEQ service, network
support is essential. The LEQ architecture uses a few
routers in the network as hubs to redirect packets of
interactive applications along paths with similar
end-to-end delay. We first formulate the hub selection
problem, prove its NP-hardness, and provide a greedy
algorithm to solve it. Through extensive simulations,
we show that our LEQ architecture significantly reduces
delay difference under different optimization criteria
that allow or do not allow compromising the per-user
end-to-end delay. Our LEQ service is incrementally
deployable in today's networks, requiring just software
modifications to edge routers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2012:OFL,
author = "Myungjin Lee and Nick Duffield and Ramana Rao
Kompella",
title = "Opportunistic flow-level latency estimation using
consistent netflow",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "139--152",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157975",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The inherent measurement support in routers (SNMP
counters or NetFlow) is not sufficient to diagnose
performance problems in IP networks, especially for
flow-specific problems where the aggregate behavior
within a router appears normal. Tomographic approaches
to detect the location of such problems are not
feasible in such cases as active probes can only catch
aggregate characteristics. To address this problem, in
this paper, we propose a Consistent NetFlow (CNF)
architecture for measuring per-flow delay measurements
within routers. CNF utilizes the existing NetFlow
architecture that already reports the first and last
timestamps per flow, and it proposes hash-based
sampling to ensure that two adjacent routers record the
same flows. We devise a novel Multiflow estimator that
approximates the intermediate delay samples from other
background flows to significantly improve the per-flow
latency estimates compared to the naive estimator that
only uses actual flow samples. In our experiments using
real backbone traces and realistic delay models, we
show that the Multiflow estimator is accurate with a
median relative error of less than 20\% for flows of
size greater than 100 packets. We also show that
Multiflow estimator performs two to three times better
than a prior approach based on trajectory sampling at
an equivalent packet sampling rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cho:2012:IDA,
author = "Sangman Cho and Theodore Elhourani and Srinivasan
Ramasubramanian",
title = "Independent directed acyclic graphs for resilient
multipath routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "153--162",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2161329",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In order to achieve resilient multipath routing, we
introduce the concept of independent directed acyclic
graphs (IDAGs) in this paper. Link-independent
(node-independent) DAGs satisfy the property that any
path from a source to the root on one DAG is
link-disjoint (node-disjoint) with any path from the
source to the root on the other DAG. Given a network,
we develop polynomial-time algorithms to compute
link-independent and node-independent DAGs. The
algorithm developed in this paper: (1) provides
multipath routing; (2) utilizes all possible edges; (3)
guarantees recovery from single link failure; and (4)
achieves all these with at most one bit per packet as
overhead when routing is based on destination address
and incoming edge. We show the effectiveness of the
proposed IDAGs approach by comparing key performance
indices to that of the independent trees and multiple
pairs of independent trees techniques through extensive
simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Birand:2012:APG,
author = "Berk Birand and Maria Chudnovsky and Bernard Ries and
Paul Seymour and Gil Zussman and Yori Zwols",
title = "Analyzing the performance of greedy maximal scheduling
via local pooling and graph theory",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "163--176",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157831",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Efficient operation of wireless networks and switches
requires using simple (and in some cases distributed)
scheduling algorithms. In general, simple greedy
algorithms (known as Greedy Maximal Scheduling, or GMS)
are guaranteed to achieve only a fraction of the
maximum possible throughput (e.g., 50\% throughput in
switches). However, it was recently shown that in
networks in which the Local Pooling conditions are
satisfied, GMS achieves 100\% throughput. Moreover, in
networks in which the $ \sigma $-Local Pooling
conditions hold, GMS achieves $ \sigma \% $ throughput.
In this paper, we focus on identifying the specific
network topologies that satisfy these conditions. In
particular, we provide the first characterization of
all the network graphs in which Local Pooling holds
under primary interference constraints (in these
networks, GMS achieves 100\% throughput). This leads to
a linear-time algorithm for identifying
Local-Pooling-satisfying graphs. Moreover, by using
similar graph-theoretical methods, we show that in all
bipartite graphs (i.e., input-queued switches) of size
up to $ 7 \times n$, GMS is guaranteed to achieve 66\%
throughput, thereby improving upon the previously known
50\% lower bound. Finally, we study the performance of
GMS in interference graphs and show that in certain
specific topologies, its performance could be very bad.
Overall, the paper demonstrates that using
graph-theoretical techniques can significantly
contribute to our understanding of greedy scheduling
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2012:DOU,
author = "Hongseok Kim and Gustavo {De Veciana} and Xiangying
Yang and Muthaiah Venkatachalam",
title = "Distributed $ \alpha $-optimal user association and
cell load balancing in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "177--190",
month = feb,
year = "2012",
CODEN = "IEANEP",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we develop a framework for user
association in infrastructure-based wireless networks,
specifically focused on flow-level cell load balancing
under spatially inhomogeneous traffic distributions.
Our work encompasses several different user association
policies: rate-optimal, throughput-optimal,
delay-optimal, and load-equalizing, which we
collectively denote $ \alpha $-optimal user
association. We prove that the optimal load vector $
\rho *$ that minimizes a generalized system performance
function is the fixed point of a certain mapping. Based
on this mapping, we propose and analyze an iterative
distributed user association policy that adapts to
spatial traffic loads and converges to a globally
optimal allocation.We then address admission control
policies for the case where the system is overloaded.
For an appropriate systemlevel cost function, the
optimal admission control policy blocks all flows at
cells edges. However, providing a minimum level of
connectivity to all spatial locations might be
desirable. To this end, a location-dependent random
blocking and user association policy are proposed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Campobello:2012:IES,
author = "Giuseppe Campobello and Alessandro Leonardi and Sergio
Palazzo",
title = "Improving energy saving and reliability in wireless
sensor networks using a simple {CRT}-based
packet-forwarding solution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "191--205",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2158442",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper deals with a novel forwarding scheme for
wireless sensor networks aimed at combining low
computational complexity and high performance in terms
of energy efficiency and reliability. The proposed
approach relies on a packet-splitting algorithm based
on the Chinese Remainder Theorem (CRT) and is
characterized by a simple modular division between
integers. An analytical model for estimating the energy
efficiency of the scheme is presented, and several
practical issues such as the effect of unreliable
channels, topology changes, and MAC overhead are
discussed. The results obtained show that the proposed
algorithm outperforms traditional approaches in terms
of power saving, simplicity, and fair distribution of
energy consumption among all nodes in the network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chowdhury:2012:VVN,
author = "Mosharaf Chowdhury and Muntasir Raihan Rahman and
Raouf Boutaba",
title = "{ViNEYard}: virtual network embedding algorithms with
coordinated node and link mapping",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "206--219",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159308",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network virtualization allows multiple heterogeneous
virtual networks (VNs) to coexist on a shared
infrastructure. Efficient mapping of virtual nodes and
virtual links of a VN request onto substrate network
resources, also known as the VN embedding problem, is
the first step toward enabling such multiplicity. Since
this problem is known to be hard, previous research
focused on designing heuristic-based algorithms that
had clear separation between the node mapping and the
link mapping phases. In this paper, we present
ViNEYard--a collection of VN embedding algorithms that
leverage better coordination between the two phases. We
formulate the VN embedding problem as a mixed integer
program through substrate network augmentation.We then
relax the integer constraints to obtain a linear
program and devise two online VN embedding algorithms
D-ViNE and R-ViNE using deterministic and randomized
rounding techniques, respectively. We also present a
generalized window-based VN embedding algorithm (WiNE)
to evaluate the effect of lookahead on VN embedding.
Our simulation experiments on a large mix of VN
requests show that the proposed algorithms increase the
acceptance ratio and the revenue while decreasing the
cost incurred by the substrate network in the long
run.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shue:2012:AMA,
author = "Craig A. Shue and Andrew J. Kalafut and Minaxi Gupta",
title = "Abnormally malicious autonomous systems and their
{Internet} connectivity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "220--230",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2157699",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "While many attacks are distributed across botnets,
investigators and network operators have recently
identified malicious networks through high profile
autonomous system (AS) depeerings and network
shutdowns. In this paper, we explore whether some ASs
indeed are safe havens for malicious activity. We look
for ISPs and ASs that exhibit disproportionately high
malicious behavior using 10 popular blacklists, plus
local spam data, and extensive DNS resolutions based on
the contents of the blacklists. We find that some ASs
have over 80\% of their routable IP address space
blacklisted. Yet others account for large fractions of
blacklisted IP addresses. Several ASs regularly peer
with ASs associated with significant malicious
activity. We also find that malicious ASs as a whole
differ from benign ones in other properties not
obviously related to their malicious activities, such
as more frequent connectivity changes with their BGP
peers. Overall, we conclude that examining malicious
activity at AS granularity can unearth networks with
lax security or those that harbor cybercrime.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ridoux:2012:CFF,
author = "Julien Ridoux and Darryl Veitch and Timothy
Broomhead",
title = "The case for feed-forward clock synchronization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "231--242",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2158443",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Variable latencies due to communication delays or
system noise is the central challenge faced by
timekeeping algorithms when synchronizing over the
network. Using extensive experiments, we explore the
robustness of synchronization in the face of both
normal and extreme latency variability and compare the
feedback approaches of ntpd and ptpd (a software
implementation of IEEE-1588) to the feed-forward
approach of the RADclock and advocate for the benefits
of a feed-forward approach. Noting the current lack of
kernel support, we present extensions to existing
mechanisms in the Linux and FreeBSD kernels giving full
access to all available raw counters, and then evaluate
the TSC, HPET, and ACPI counters' suitability as
hardware timing sources. We demonstrate how the
RADclock achieves the same microsecond accuracy with
each counter.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bhorkar:2012:AOR,
author = "Abhijeet A. Bhorkar and Mohammad Naghshvar and Tara
Javidi and Bhaskar D. Rao",
title = "Adaptive opportunistic routing for wireless ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "243--256",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159844",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A distributed adaptive opportunistic routing scheme
for multihop wireless ad hoc networks is proposed. The
proposed scheme utilizes a reinforcement learning
framework to opportunistically route the packets even
in the absence of reliable knowledge about channel
statistics and network model. This scheme is shown to
be optimal with respect to an expected average
per-packet reward criterion. The proposed routing
scheme jointly addresses the issues of learning and
routing in an opportunistic context, where the network
structure is characterized by the transmission success
probabilities. In particular, this learning framework
leads to a stochastic routing scheme that optimally
``explores'' and ``exploits'' the opportunities in the
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2012:TLP,
author = "Hayang Kim and Xiaoli Ma and Benjamin Russell
Hamilton",
title = "Tracking low-precision clocks with time-varying drifts
using {Kalman} filtering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "257--270",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2158656",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Clock synchronization is essential for a large number
of applications ranging from performance measurements
in wired networks to data fusion in sensor networks.
Existing techniques are either limited to undesirable
accuracy or rely on specific hardware characteristics
that may not be available in certain applications. In
this paper, we examine the clock synchronization
problem in networks where nodes lack the high-accuracy
oscillators or programmable network interfaces some
previous protocols depend on. This paper derives a
general model for clock offset and skew and
demonstrates its application to real clock oscillators.
We design an efficient algorithm based on this model to
achieve high synchronization accuracy. This algorithm
applies the Kalman filter to track the clock offset and
skew. We demonstrate the performance advantages of our
schemes through extensive simulations and real clock
oscillator measurements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{He:2012:OPL,
author = "Yihua He and Michalis Faloutsos and Srikanth V.
Krishnamurthy and Marek Chrobak",
title = "Obtaining provably legitimate {Internet} topologies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "271--284",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159272",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Apr 9 17:46:48 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "What topologies should be used to evaluate protocols
for interdomain routing? Using the most current
Internet topology is not practical since its size is
prohibitive for detailed, packet-level interdomain
simulations. Besides being of moderate size, the
topology should be policy-aware, that is, it needs to
represent business relationships between adjacent nodes
(that represent autonomous systems). In this paper, we
address this issue by providing a framework to generate
small, realistic, and policy-aware topologies. We
propose HBR, a novel sampling method, which exploits
the inherent hierarchy of the policy-aware Internet
topology. We formally prove that our approach generates
connected and legitimate topologies, which are
compatible with the policy-based routing conventions
and rules. Using simulations, we show that HBR
generates topologies that: (1) maintain the graph
properties of the real topology; (2) provide reasonably
realistic interdomain simulation results while reducing
the computational complexity by several orders of
magnitude as compared to the initial topology. Our
approach provides a permanent solution to the problem
of interdomain routing evaluations: Given a more
accurate and complete topology, HBR can generate better
small topologies in the future.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Andrews:2012:RPM,
author = "Matthew Andrews and Antonio Fern{\'a}ndez Anta and
Lisa Zhang and Wenbo Zhao",
title = "Routing for power minimization in the speed scaling
model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "285--294",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159864",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:07:13 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study network optimization that considers power
minimization as an objective. Studies have shown that
mechanisms such as speed scaling can significantly
reduce the power consumption of telecommunication
networks by matching the consumption of each network
element to the amount of processing required for its
carried traffic. Most existing research on speed
scaling focuses on a single network element in
isolation. We aim for a network-wide optimization.
Specifically, we study a routing problem with the
objective of provisioning guaranteed speed/bandwidth
for a given demand matrix while minimizing power
consumption. Optimizing the routes critically relies on
the characteristic of the speed-power curve $ f(s) $,
which is how power is consumed as a function of the
processing speed $s$. If $f$ is superadditive, we show
that there is no bounded approximation in general for
integral routing, i.e., each traffic demand follows a
single path. This contrasts with the well-known
logarithmic approximation for subadditive functions.
However, for common speed-power curves such as
polynomials $ f(s) = \micro s^\alpha $, we are able to
show a constant approximation via a simple scheme of
randomized rounding. We also generalize this rounding
approach to handle the case in which a nonzero startup
cost $ \sigma $ appears in the speed-power curve, i.e.,
$ f(s) = 0 $, if $ s = 0 \sigma + \micro s^\alpha $, if
$ s > 0 $. We present an $ O((\sigma / \micro)^{1 /
\alpha }) $-approximation, and we discuss why coming up
with an approximation ratio independent of the startup
cost may be hard. Finally, we provide simulation
results to validate our algorithmic approaches.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hao:2012:FDM,
author = "Fang Hao and Murali Kodialam and T. V. Lakshman and
Haoyu Song",
title = "Fast dynamic multiple-set membership testing using
combinatorial {Bloom} filters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "295--304",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2173351",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:07:13 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the problem of designing a
data structure that can perform fast multiple-set
membership testing in deterministic time. Our primary
goal is to develop a hardware implementation of the
data structure that uses only embedded memory blocks.
Prior efforts to solve this problem involve hashing
into multiple Bloom filters. Such approach needs a
priori knowledge of the number of elements in each set
in order to size the Bloom filter. We use a
single-Bloom-filter-based approach and use multiple
sets of hash functions to code for the set (group) id.
Since a single Bloom filter is used, it does not need a
priori knowledge of the distribution of the elements
across the different sets. We show how to improve the
performance of the data structure by using
constant-weight error-correcting codes for coding the
group id. Using error-correcting codes improves the
performance of these data structures especially when
there are a large number of sets. We also outline an
efficient hardware-based approach to generate the large
number of hash functions that we need for this data
structure. The resulting data structure, COMB, is
amenable to a variety of time-critical network
applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2012:CLA,
author = "Yunbo Wang and Mehmet C. Vuran and Steve Goddard",
title = "Cross-layer analysis of the end-to-end delay
distribution in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "1",
pages = "305--318",
month = feb,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159845",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Feb 8 09:07:13 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Emerging applications of wireless sensor networks
(WSNs) require real-time quality-of-service (QoS)
guarantees to be provided by the network. Due to the
nondeterministic impacts of the wireless channel and
queuing mechanisms, probabilistic analysis of QoS is
essential. One important metric of QoS in WSNs is the
probability distribution of the end-to-end delay.
Compared to other widely used delay performance metrics
such as the mean delay, delay variance, and worst-case
delay, the delay distribution can be used to obtain the
probability to meet a specific deadline for QoS-based
communication in WSNs. To investigate the end-to-end
delay distribution, in this paper, a comprehensive
cross-layer analysis framework, which employs a
stochastic queueing model in realistic channel
environments, is developed. This framework is generic
and can be parameterized for a wide variety of MAC
protocols and routing protocols. Case studies with the
CSMA/CAMAC protocol and an anycast protocol are
conducted to illustrate how the developed framework can
analytically predict the distribution of the end-to-end
delay. Extensive test-bed experiments and simulations
are performed to validate the accuracy of the framework
for both deterministic and random deployments.
Moreover, the effects of various network parameters on
the distribution of end-to-end delay are investigated
through the developed framework. To the best of our
knowledge, this is the first work that provides a
generic, probabilistic cross-layer analysis of
end-to-end delay in WSNs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wei:2012:ITP,
author = "Wei Wei and Sharad Jaiswal and Jim Kurose and Don
Towsley and Kyoungwon Suh and Bing Wang",
title = "Identifying 802.11 traffic from passive measurements
using iterative {Bayesian} inference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "325--338",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2159990",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a classification scheme that
differentiates Ethernet and WLAN TCP flows based on
measurements collected passively at the edge of a
network. This scheme computes two quantities, the
fraction of wireless TCP flows and the degree of belief
that a TCP flow traverses a WLAN inside the network,
using an iterative Bayesian inference algorithm that we
developed. We prove that this iterative Bayesian
inference algorithm converges to the unique maximum
likelihood estimate (MLE) of these two quantities.
Furthermore, it has the advantage that it can handle
any general-classification problem given the marginal
distributions of these classes. Numerical and
experimental evaluations demonstrate that our
classification scheme obtains accurate results. We
apply this scheme to two sets of traces collected from
two campus networks: one set collected from UMass in
mid 2005 and the other collected from UConn in late
2010. Our technique infers that 4\%--7\% and 52\%--55\%
of incoming TCP flows traverse an IEEE 802.11 wireless
link in these two networks, respectively.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yun:2012:SLO,
author = "Sungho Yun and Constantine Caramanis",
title = "System-level optimization in wireless networks:
managing interference and uncertainty via robust
optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "339--352",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2185508",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a robust-optimization-driven systemlevel
approach to interference management in a cellular
broadband system operating in an interference-limited
and highly dynamic regime. Here, base stations in
neighboring cells (partially) coordinate their
transmission schedules in an attempt to avoid
simultaneous max-power transmission to their mutual
cell edge. Limits on communication overhead and use of
the backhaul require base station coordination to occur
at a slower timescale than the customer arrival
process. The central challenge is to properly structure
coordination decisions at the slow timescale, as these
subsequently restrict the actions of each base station
until the next coordination period. Moreover, because
coordination occurs at the slower timescale, the
statistics of the arriving customers, e.g., the load,
are typically only approximately known--thus, this
coordination must be done with only approximate
knowledge of statistics. We show that performance of
existing approaches that assume exact knowledge of
these statistics can degrade rapidly as the uncertainty
in the arrival process increases. We show that a
two-stage robust optimization framework is a natural
way to model two-timescale decision problems. We
provide tractable formulations for the base-station
coordination problem and show that our formulation is
robust to fluctuations (uncertainties) in the arriving
load. This tolerance to load fluctuation also serves to
reduce the need for frequent reoptimization across base
stations, thus helping minimize the communication
overhead required for system-level interference
reduction. Our robust optimization formulations are
flexible, allowing us to control the conservatism of
the solution. Our simulations show that we can build in
robustness without significant degradation of nominal
performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Manweiler:2012:OMT,
author = "Justin Manweiler and Naveen Santhapuri and Souvik Sen
and Romit Roy Choudhury and Srihari Nelakuditi and
Kamesh Munagala",
title = "Order matters: transmission reordering in wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "353--366",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2164264",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Modern wireless interfaces support a physical-layer
capability called Message in Message (MIM). Briefly,
MIM allows a receiver to disengage from an ongoing
reception and engage onto a stronger incoming signal.
Links that otherwise conflict with each other can be
made concurrent with MIM. However, the concurrency is
not immediate and can be achieved only if conflicting
links begin transmission in a specific order. The
importance of link order is new in wireless research,
motivating MIM-aware revisions to link-scheduling
protocols. This paper identifies the opportunity in
MIM-aware reordering, characterizes the optimal
improvement in throughput, and designs a link-layer
protocol for enterprise wireless LANs to achieve it.
Testbed and simulation results confirm the performance
gains of the proposed system.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2012:MFA,
author = "Bridge Qiao Zhao and John C. S. Lui and Dah-Ming
Chiu",
title = "A mathematical framework for analyzing adaptive
incentive protocols in {P2P} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "367--380",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2161770",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In peer-to-peer (P2P) networks, incentive protocol is
used to encourage cooperation among end-nodes so as to
deliver a scalable and robust service. However, the
design and analysis of incentive protocols have been ad
hoc and heuristic at best. The objective of this paper
is to provide a simple yet general framework to analyze
and design incentive protocols. We consider a class of
incentive protocols that can learn and adapt to other
end-nodes' strategies. Based on our analytical
framework, one can evaluate the expected performance
gain and, more importantly, the system robustness of a
given incentive protocol. To illustrate the framework,
we present two adaptive learning models and three
incentive policies and show the conditions in which the
P2P networks may collapse and the conditions in which
the P2P networks can guarantee a high degree of
cooperation. We also show the connection between
evaluating incentive protocol and evolutionary game
theory so one can easily identify robustness
characteristics of a given policy. Using our framework,
one can gain the understanding on the price of altruism
and system stability, as well as the correctness of the
adaptive incentive policy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Soldo:2012:OSB,
author = "Fabio Soldo and Katerina Argyraki and Athina
Markopoulou",
title = "Optimal source-based filtering of malicious traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "381--395",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2161615",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the problem of blocking
malicious traffic on the Internet via source-based
filtering. In particular, we consider filtering via
access control lists (ACLs): These are already
available at the routers today, but are a scarce
resource because they are stored in the expensive
ternary content addressable memory (TCAM). Aggregation
(by filtering source prefixes instead of individual IP
addresses) helps reduce the number of filters, but
comes also at the cost of blocking legitimate traffic
originating from the filtered prefixes. We show how to
optimally choose which source prefixes to filter for a
variety of realistic attack scenarios and operators'
policies. In each scenario, we design optimal, yet
computationally efficient, algorithms. Using logs from
Dshield.org, we evaluate the algorithms and demonstrate
that they bring significant benefit in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Venkataraman:2012:QVQ,
author = "Mukundan Venkataraman and Mainak Chatterjee",
title = "Quantifying video-{QoE} degradations of {Internet}
links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "396--407",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2167684",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the proliferation of multimedia content on the
Internet, there is an increasing demand for video
streams with high perceptual quality. The capability of
present-day Internet links in delivering
high-perceptual-quality streaming services, however, is
not completely understood. Link-level degradations
caused by intradomain routing policies and inter-ISP
peering policies are hard to obtain, as Internet
service providers often consider such information
proprietary. Understanding link-level degradations will
enable us in designing future protocols, policies, and
architectures to meet the rising multimedia demands.
This paper presents a trace-driven study to understand
quality-of-experience (QoE) capabilities of present-day
Internet links using 51 diverse ISPs with a major
presence in the US, Europe, and Asia-Pacific. We study
their links from 38 vantage points in the Internet
using both passive tracing and active probing for six
days. We provide the first measurements of link-level
degradations and case studies of intra-ISP and
inter-ISP peering links from a multimedia standpoint.
Our study offers surprising insights into intradomain
traffic engineering, peering link loading, BGP, and the
inefficiencies of using autonomous system (AS)-path
lengths as a routing metric. Though our results
indicate that Internet routing policies are not
optimized for delivering high-perceptual-quality
streaming services, we argue that alternative
strategies such as overlay networks can help meet QoE
demands over the Internet. Streaming services apart,
our Internet measurement results can be used as an
input to a variety of research problems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mao:2012:TBU,
author = "Guoqiang Mao and Brian D. O. Anderson",
title = "Towards a better understanding of large-scale network
models",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "408--421",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2160650",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Connectivity and capacity are two fundamental
properties of wireless multihop networks. The
scalability of these properties has been a primary
concern for which asymptotic analysis is a useful tool.
Three related but logically distinct network models are
often considered in asymptotic analyses, viz. the dense
network model, the extended network model, and the
infinite network model, which consider respectively a
network deployed in a fixed finite area with a
sufficiently large node density, a network deployed in
a sufficiently large area with a fixed node density,
and a network deployed in R$^2$ with a sufficiently
large node density. The infinite network model
originated from continuum percolation theory and
asymptotic results obtained from the infinite network
model have often been applied to the dense and extended
networks. In this paper, through two case studies
related to network connectivity on the expected number
of isolated nodes and on the vanishing of components of
finite order k > 1 respectively, we demonstrate some
subtle but important differences between the infinite
network model and the dense and extended network
models. Therefore, extra scrutiny has to be used in
order for the results obtained from the infinite
network model to be applicable to the dense and
extended network models. Asymptotic results are also
obtained on the expected number of isolated nodes, the
vanishingly small impact of the boundary effect on the
number of isolated nodes, and the vanishing of
components of finite order k > 1 in the dense and
extended network models using a generic random
connection model.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Menth:2012:PPB,
author = "Michael Menth and Frank Lehrieder",
title = "Performance of {PCN}-based admission control under
challenging conditions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "422--435",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2189415",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Precongestion notification (PCN) is a packet-marking
technique for IP networks to notify egress nodes of a
so-called PCN domain whether the traffic rate on some
links exceeds certain configurable bounds. This
feedback is used by decision points for admission
control (AC) to block new flows when the traffic load
is already high. PCN-based AC is simpler than other AC
methods because interior routers do not need to keep
per-flow states. Therefore, it is currently being
standardized by the IETF. We discuss various
realization options and analyze their performance in
the presence of flash crowds or with multipath routing
by means of simulation and mathematical modeling. Such
situations can be aggravated by insufficient flow
aggregation, long round-trip times, on/off traffic,
delayed media, inappropriate marker configuration, and
smoothed feedback.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Reiter:2012:CDP,
author = "Mikl{\'o}s Reiter and Richard Steinberg",
title = "Congestion-dependent pricing and forward contracts for
complementary segments of a communication network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "436--449",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2160997",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Congestion-dependent pricing is a form of traffic
management that ensures the efficient allocation of
bandwidth between users and applications. As the
unpredictability of congestion prices creates revenue
uncertainty for network providers and cost uncertainty
for users, it has been suggested that forward contracts
could be used to manage these risks. We develop a novel
game-theoretic model of a multiprovider communication
network with two complementary segments and investigate
whether forward contracts would be adopted by service
providers. Service on the upstream segment is provided
by a single Internet service provider (ISP) and priced
dynamically to maximize profit, while several smaller
ISPs sell connectivity on the downstream network
segment, with the advance possibility of entering into
forward contracts with their users for some of their
capacity. We show that the equilibrium forward
contracting volumes are necessarily asymmetric, with
one downstream provider entering into fewer forward
contracts than the other competitors, thus ensuring a
high subsequent downstream price level. In practice,
network providers will choose the extent of forward
contracting strategically based not only on their risk
tolerance, but also on the market structure in the
interprovider network and their peers' actions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tan:2012:EDF,
author = "Rui Tan and Guoliang Xing and Benyuan Liu and Jianping
Wang and Xiaohua Jia",
title = "Exploiting data fusion to improve the coverage of
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "450--462",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2164620",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless sensor networks (WSNs) have been increasingly
available for critical applications such as security
surveillance and environmental monitoring. An important
performance measure of such applications is sensing
coverage that characterizes how well a sensing field is
monitored by a network. Although advanced collaborative
signal processing algorithms have been adopted by many
existing WSNs, most previous analytical studies on
sensing coverage are conducted based on overly
simplistic sensing models (e.g., the disc model) that
do not capture the stochastic nature of sensing. In
this paper, we attempt to bridge this gap by exploring
the fundamental limits of coverage based on stochastic
data fusion models that fuse noisy measurements of
multiple sensors. We derive the scaling laws between
coverage, network density, and signal-to-noise ratio
(SNR). We show that data fusion can significantly
improve sensing coverage by exploiting the
collaboration among sensors when several physical
properties of the target signal are known. In
particular, for signal path loss exponent of k
(typically between 2.0 and 5.0), $ \rho f = O(\rho d^{1
1 / k}) $ where $ \rho f $ and $ \rho d $ are the
densities of uniformly deployed sensors that achieve
full coverage under the fusion and disc models,
respectively. Moreover, data fusion can also reduce
network density for regularly deployed networks and
mobile networks where mobile sensors can relocate to
fill coverage holes. Our results help understand the
limitations of the previous analytical results based on
the disc model and provide key insights into the design
of WSNs that adopt data fusion algorithms. Our analyses
are verified through extensive simulations based on
both synthetic data sets and data traces collected in a
real deployment for vehicle detection.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chiaraviglio:2012:MIN,
author = "Luca Chiaraviglio and Marco Mellia and Fabio Neri",
title = "Minimizing {ISP} network energy cost: formulation and
solutions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "463--476",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2161487",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "According to several studies, the power consumption of
the Internet accounts for up to 10\% of the worldwide
energy consumption and is constantly increasing. The
global consciousness on this problem has also grown,
and several initiatives are being put into place to
reduce the power consumption of the ICT sector in
general. In this paper, we face the problem of
minimizing power consumption for Internet service
provider (ISP) networks. In particular, we propose and
assess strategies to concentrate network traffic on a
minimal subset of network resources. Given a
telecommunication infrastructure, our aim is to turn
off network nodes and links while still guaranteeing
full connectivity and maximum link utilization
constraints. We first derive a simple and complete
formulation, which results into an NP-hard problem that
can be solved only for trivial cases. We then derive
more complex formulations that can scale up to
middle-sized networks. Finally, we provide efficient
heuristics that can be used for large networks. We test
the effectiveness of our algorithms on both real and
synthetic topologies, considering the daily
fluctuations of Internet traffic and different classes
of users. Results show that the power savings can be
significant, e.g., larger than 35\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Buchbinder:2012:DPA,
author = "Niv Buchbinder and Liane Lewin-Eytan and Ishai Menache
and Joseph Naor and Ariel Orda",
title = "Dynamic power allocation under arbitrary varying
channels: an online approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "477--487",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2170092",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A major problem in wireless networks is coping with
limited resources, such as bandwidth and energy. These
issues become a major algorithmic challenge in view of
the dynamic nature of the wireless domain. We consider
in this paper the single-transmitter power assignment
problem under time-varying channels, with the objective
of maximizing the data throughput. It is assumed that
the transmitter has a limited power budget, to be
sequentially divided during the lifetime of the
battery. We deviate from the classic work in this area,
which leads to explicit ``water-filling'' solutions, by
considering a realistic scenario where the channel
state quality changes arbitrarily from one transmission
to the other. The problem is accordingly tackled within
the framework of competitive analysis, which allows for
worst-case performance guarantees in setups with
arbitrarily varying channel conditions. We address both
a ``discrete'' case, where the transmitter can transmit
only at a fixed power level, and a ``continuous'' case,
where the transmitter can choose any power level out of
a bounded interval. For both cases, we propose online
power-allocation algorithms with proven worst-case
performance bounds. In addition, we establish lower
bounds on the worst-case performance of any online
algorithm and show that our proposed algorithms are
optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Meiners:2012:BWN,
author = "Chad R. Meiners and Alex X. Liu and Eric Torng",
title = "Bit weaving: a non-prefix approach to compressing
packet classifiers in {TCAMs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "488--500",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165323",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Ternary content addressable memories (TCAMs) have
become the de facto standard in industry for fast
packet classification. Unfortunately, TCAMs have
limitations of small capacity, high power consumption,
high heat generation, and high cost. The well-known
range expansion problem exacerbates these limitations
as each classifier rule typically has to be converted
to multiple TCAM rules. One method for coping with
these limitations is to use compression schemes to
reduce the number of TCAM rules required to represent a
classifier. Unfortunately, all existing compression
schemes only produce prefix classifiers. Thus, they all
miss the compression opportunities created by nonprefix
ternary classifiers. In this paper, we propose bit
weaving, the first non-prefix compression scheme. Bit
weaving is based on the observation that TCAM entries
that have the same decision and whose predicates differ
by only one bit can be merged into one entry by
replacing the bit in question with. Bit weaving
consists of two new techniques, bit swapping and bit
merging, to first identify and then merge such rules
together. The key advantages of bit weaving are that it
runs fast, it is effective, and it is composable with
other TCAM optimization methods as a
pre/post-processing routine. We implemented bit weaving
and conducted experiments on both real-world and
synthetic packet classifiers. Our experimental results
show the following: (1) bit weaving is an effective
standalone compression technique (it achieves an
average compression ratio of 23.6\%); (2) bit weaving
finds compression opportunities that other methods
miss. Specifically, bit weaving improves the prior TCAM
optimization techniques of TCAM Razor and Topological
Transformation by an average of 12.8\% and 36.5\%,
respectively.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jung:2012:OSA,
author = "Eric Jung and Xin Liu",
title = "Opportunistic spectrum access in multiple-primary-user
environments under the packet collision constraint",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "501--514",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2164933",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio (CR) technology has great potential to
alleviate spectrum scarcity in wireless communications.
It allows secondary users (SUs) to opportunistically
access spectrum licensed by primary users (PUs) while
protecting PU activity. The protection of the PUs is
central to the adoption of this technology since no PU
would accommodate SU access to its own detriment. In
this paper, we consider an SUthat must protect multiple
PUs simultaneously. We focus on the PU packet collision
probability as the protection metric. The PUs are
unslotted and may have different idle/busy time
distributions and protection requirements. Under
general idle time distributions, we determine the form
of the SU optimal access policy and identify two
special cases for which the computation of the optimal
policy is significantly reduced. We also present a
simple algorithm to determine these policies using
principles of convex optimization theory. We then
derive the optimal policy for the same system when an
SU has extra ``side information'' on PU activity. We
evaluate the performance of these policies through
simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2012:SSS,
author = "Kyunghan Lee and Seongik Hong and Seong Joon Kim and
Injong Rhee and Song Chong",
title = "{SLAW}: self-similar least-action human walk",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "515--529",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2172984",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many empirical studies of human walks have reported
that there exist fundamental statistical features
commonly appearing in mobility traces taken in various
mobility settings. These include: (1) heavy-tail flight
and pause-time distributions; (2) heterogeneously
bounded mobility areas of individuals; and (3)
truncated power-law intercontact times. This paper
reports two additional such features: (a) The
destinations of people (or we say waypoints) are
dispersed in a self-similar manner; and (b) people are
more likely to choose a destination closer to its
current waypoint. These features are known to be
influential to the performance of human-assisted
mobility networks. The main contribution of this paper
is to present a mobility model called Self-similar
Least-Action Walk (SLAW) that can produce synthetic
mobility traces containing all the five statistical
features in various mobility settings including
user-created virtual ones for which no empirical
information is available. Creating synthetic traces for
virtual environments is important for the performance
evaluation of mobile networks as network designers test
their networks in many diverse network settings. A
performance study of mobile routing protocols on top of
synthetic traces created by SLAW shows that SLAW brings
out the unique performance features of various routing
protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shu:2012:FCR,
author = "Tao Shu and Marwan Krunz",
title = "Finding cheap routes in profit-driven opportunistic
spectrum access networks: a truthful mechanism design
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "530--543",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2166274",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we explore the economic aspects of
routing/relaying in a profit-driven opportunistic
spectrum access (OSA) network. In this network, primary
users lease their licensed spectrum to secondary radio
(SR) providers, who in turn provide opportunistic
routing/relaying service to end-users if this service
is profitable, i.e., if the payment offered by the
end-user (a.k.a. the price) exceeds the SR's relaying
spectrum cost. This cost is considered private
information known only to SRs. Therefore, the end-user
has to rely on costs reported by SRs to determine his
routing and payment strategy. The challenge comes from
the selfish nature of SRs; an SR may exaggerate his
cost to achieve greater profit. To give incentive to an
SR to report the true cost, the payment must typically
be higher than the actual cost. However, from the
end-user's perspective, ``overpayment'' should be
avoided as much as possible. Therefore, we are
interested in the ``optimal'' route selection and
payment determination mechanism that minimizes the
price of the selected route while simultaneously
guaranteeing truthful cost reporting by SRs. We
formulate this problem as finding the least-priced path
(LPP), and we investigate it without and with link
capacity constraints. In the former case,
polynomial-time algorithm is developed to find LPP and
calculate its truthful price. In the latter case, we
show that calculating the truthful price of the LPP is
in general computationally infeasible. Consequently, we
consider a suboptimal but computationally feasible
approximate solution, which we refer to as truthful
low-priced path (LOPP) routing. A polynomial-time
algorithm is proposed to find the LOPP and efficiently
calculate its truthful price. A payment materialization
algorithm is also developed to guarantee truthful
capacity reporting by SRs. The effectiveness of our
algorithms in terms of price saving is verified through
extensive simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sen:2012:CCC,
author = "Souvik Sen and Romit Roy Choudhury and Srihari
Nelakuditi",
title = "{CSMA\slash CN}: carrier sense multiple access with
collision notification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "544--556",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2174461",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A wireless transmitter learns of a packet loss and
infers collision only after completing the entire
transmission. If the transmitter could detect the
collision early [such as with carrier sense multiple
access with collision detection (CSMA/CD) in wired
networks], it could immediately abort its transmission,
freeing the channel for useful communication. There are
two main hurdles to realize CSMA/CD in wireless
networks. First, a wireless transmitter cannot
simultaneously transmit and listen for a collision.
Second, any channel activity around the transmitter may
not be an indicator of collision at the receiver. This
paper attempts to approximate CSMA/CD in wireless
networks with a novel scheme called CSMA/CN (collision
notification). Under CSMA/CN, the receiver uses
PHY-layer information to detect a collision and
immediately notifies the transmitter. The collision
notification consists of a unique signature, sent on
the same channel as the data. The transmitter employs a
listener antenna and performs signature correlation to
discern this notification. Once discerned, the
transmitter immediately aborts the transmission. We
show that the notification signature can be reliably
detected at the listener antenna, even in the presence
of a strong self-interference from the transmit
antenna. A prototype testbed of 10 USRP/GNU Radios
demonstrates the feasibility and effectiveness of
CSMA/CN.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jang:2012:IST,
author = "Beakcheol Jang and Mihail L. Sichitiu",
title = "{IEEE 802.11} saturation throughput analysis in the
presence of hidden terminals",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "557--570",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165322",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Due to its usefulness and wide deployment, IEEE 802.11
has been the subject of numerous studies, but still
lacks a complete analytical model. Hidden terminals are
common in IEEE 802.11 and cause the degradation of
throughput. Despite the importance of the hidden
terminal problem, there have been a relatively small
number of studies that consider the effect of hidden
terminals on IEEE 802.11 throughput, and many are not
accurate for a wide range of conditions. In this paper,
we present an accurate new analytical saturation
throughput model for the infrastructure case of IEEE
802.11 in the presence of hidden terminals. Simulation
results show that our model is accurate in a wide
variety of cases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Elmokashfi:2012:BCE,
author = "Ahmed Elmokashfi and Amund Kvalbein and Constantine
Dovrolis",
title = "{BGP} churn evolution: a perspective from the core",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "571--584",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2168610",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The scalability limitations of BGP have been a major
concern lately. An important aspect of this issue is
the rate of routing updates (churn) that BGP routers
must process. This paper presents an analysis of the
evolution of churn in four networks at the backbone of
the Internet over a period of seven years and eight
months, using BGP update traces from the RouteViews
project. The churn rate varies widely over time and
between networks. Instead of descriptive ``black-box''
statistical analysis, we take an exploratory data
analysis approach attempting to understand the reasons
behind major observed characteristics of the churn time
series. We find that duplicate announcements are a
major churn contributor, responsible for most large
spikes. Remaining spikes are mostly caused by routing
incidents that affect a large number of prefixes
simultaneously. More long-term intense periods of
churn, on the other hand, are caused by
misconfigurations or other special events at or close
to the monitored autonomous system (AS). After
filtering pathologies and effects that are not related
to the long-term evolution of churn, we analyze the
remaining ``baseline'' churn and find that it is
increasing at a rate that is similar to the growth of
the number of ASs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kozica:2012:QTP,
author = "Ermin Kozica and W. Bastiaan Kleijn",
title = "A quantization theoretic perspective on simulcast and
layered multicast optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "585--593",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2169085",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider rate optimization in multicast systems
that use several multicast trees on a communication
network. The network is shared between different
applications. For that reason, we model the available
bandwidth for multicast as stochastic. For specific
network topologies, we show that the multicast rate
optimization problem is equivalent to the optimization
of scalar quantization. We use results from
rate-distortion theory to provide a bound on the
achievable performance for the multicast rate
optimization problem. A large number of receivers makes
the possibility of adaptation to changing network
conditions desirable in a practical system. To this
end, we derive an analytical solution to the problem
that is asymptotically optimal in the number of
multicast trees. We derive local optimality conditions,
which we use to describe a general class of iterative
algorithms that give locally optimal solutions to the
problem. Simulation results are provided for the
multicast of an i.i.d. Gaussian process, an i.i.d.
Laplacian process, and a video source.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Courcoubetis:2012:EIS,
author = "Costas Courcoubetis and Richard Weber",
title = "Economic issues in shared infrastructures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "594--608",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2163824",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In designing and managing a shared infrastructure, one
must take account of the fact that its participants
will make self-interested and strategic decisions about
the resources that they are willing to contribute to it
and/or the share of its cost that they are willing to
bear. Taking proper account of the incentive issues
that thereby arise, we design mechanisms that, by
eliciting appropriate information from the
participants, can obtain for them maximal social
welfare, subject to charging payments that are
sufficient to cover costs. We show that there are
incentivizing roles to be played both by the payments
that we ask from the participants and the specification
of how resources are to be shared. New in this paper is
our formulation of models for designing optimal
management policies, our analysis that demonstrates the
inadequacy of simple sharing policies, and our
proposals for some better ones. We learn that simple
policies may be far from optimal and that efficient
policy design is not trivial. However, we find that
optimal policies have simple forms in the limit as the
number of participants becomes large.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dinh:2012:NAA,
author = "Thang N. Dinh and Ying Xuan and My T. Thai and Panos
M. Pardalos and Taieb Znati",
title = "On new approaches of assessing network vulnerability:
hardness and approximation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "609--619",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2170849",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Society relies heavily on its networked physical
infrastructure and information systems. Accurately
assessing the vulnerability of these systems against
disruptive events is vital for planning and risk
management. Existing approaches to vulnerability
assessments of large-scale systems mainly focus on
investigating inhomogeneous properties of the
underlying graph elements. These measures and the
associated heuristic solutions are limited in
evaluating the vulnerability of large-scale network
topologies. Furthermore, these approaches often fail to
provide performance guarantees of the proposed
solutions. In this paper, we propose a vulnerability
measure, pairwise connectivity, and use it to formulate
network vulnerability assessment as a graph-theoretical
optimization problem, referred to as $ \beta
$-disruptor. The objective is to identify the minimum
set of critical network elements, namely nodes and
edges, whose removal results in a specific degradation
of the network global pairwise connectivity. We prove
the NP-completeness and inapproximability of this
problem and propose an $ O (\log n \log \log n)$
pseudo-approximation algorithm to computing the set of
critical nodes and an $ O(\log^{1.5}n)$
pseudo-approximation algorithm for computing the set of
critical edges. The results of an extensive
simulation-based experiment show the feasibility of our
proposed vulnerability assessment framework and the
efficiency of the proposed approximation algorithms in
comparison to other approaches.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Carofiglio:2012:ITP,
author = "Giovanna Carofiglio and Luca Muscariello",
title = "On the impact of {TCP} and per-flow scheduling on
{Internet} performance",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "2",
pages = "620--633",
month = apr,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2164553",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Jun 26 17:47:12 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet performance is tightly related to the
properties of TCP and UDP protocols, jointly
responsible for the delivery of the great majority of
Internet traffic. It is well understood how these
protocols behave under first-in-first-out (FIFO)
queuing and what are the network congestion effects.
However, no comprehensive analysis is available when
flow-aware mechanisms such as per-flow scheduling and
dropping policies are deployed. Previous simulation and
experimental results leave a number of unanswered
questions. In this paper, we tackle this issue by
modeling via a set of fluid nonlinear ordinary
differential equations (ODEs) the instantaneous
throughput and the buffer occupancy of N long-lived TCP
sources under three per-flow scheduling disciplines
(Fair Queuing, Longest Queue First, Shortest Queue
First) and with longest queue drop buffer management.
We study the system evolution and analytically
characterize the stationary regime: Closed-form
expressions are derived for the stationary
throughput/sending rate and buffer occupancy, which
give a thorough understanding of short/ long-term
fairness for TCP traffic. Similarly, we provide the
characterization of the loss rate experienced by UDP
flows in the presence of TCP traffic. As a result, the
analysis allows to quantify benefits and drawbacks
related to the deployment of flow-aware scheduling
mechanisms in different networking contexts. The model
accuracy is confirmed by a set of ns 2 simulations and
by the evaluation of the three scheduling disciplines
in a real implementation in the Linux kernel.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Parvez:2012:IMS,
author = "Khandoker Nadim Parvez and Carey Williamson and
Anirban Mahanti and Niklas Carlsson",
title = "Insights on media streaming progress using
{BitTorrent}-like protocols for on-demand streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "637--650",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2166087",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper develops analytical models that
characterize the behavior of on-demand stored media
content delivery using BitTorrent-like protocols. The
models capture the effects of different piece selection
policies, including Rarest-First, two variants of
In-Order, and two probabilistic policies (Portion and
Zipf). Our models provide insight into system behavior
and help explain the sluggishness of the system with
In-Order streaming. We use the models to compare
different retrieval policies across a wide range of
system parameters, including peer arrival rate, upload/
download bandwidth, and seed residence time. We also
provide quantitative results on the startup delays and
retrieval times for streaming media delivery. Our
results provide insights into the design tradeoffs for
on-demand media streaming in peer-to-peer networks.
Finally, the models are validated using simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cao:2012:BRU,
author = "Lili Cao and Haitao Zheng",
title = "Balancing reliability and utilization in dynamic
spectrum access",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "651--661",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165966",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Future wireless networks will dynamically access
spectrum to maximize its utilization. Conventional
design of dynamic spectrum access focuses on maximizing
spectrum utilization, but faces the problem of degraded
reliability due to unregulated demands and access
behaviors. Without providing proper reliability
guarantee, dynamic spectrum access is unacceptable to
many infrastructure networks and services. In this
paper, we propose SPARTA, a new architecture for
dynamic spectrum access that balances access
reliability and spectrum utilization. SPARTA includes
two complementary techniques: proactive admission
control performed by a central entity to determine the
set of wireless nodes to be supported with only
statistical information of their spectrum demands, and
online adaptation performed by admitted wireless nodes
to adjust their instantaneous spectrum usage to
time-varying demand. Using both theoretical analysis
and simulation, we show that SPARTA fulfills the
reliability requirements while dynamically multiplexing
spectrum demands to improve utilization. Compared to
conventional solutions, SPARTA improves spectrum
utilization by 80\%-200\%. Finally, SPARTA also allows
service providers to explore the tradeoff between
utilization and reliability to make the best use of the
spectrum. To our best knowledge, our work is the first
to identify and address such a tradeoff.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Roughan:2012:STC,
author = "Matthew Roughan and Yin Zhang and Walter Willinger and
Lili Qiu",
title = "Spatio-temporal compressive sensing and {Internet}
traffic matrices",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "662--676",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2169424",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Despite advances in measurement technology, it is
still challenging to reliably compile large-scale
network datasets. For example, because of flaws in the
measurement systems or difficulties posed by the
measurement problem itself, missing, ambiguous, or
indirect data are common. In the case where such data
have spatio-temporal structure, it is natural to try to
leverage this structure to deal with the challenges
posed by the problematic nature of the data. Our work
involving network datasets draws on ideas from the area
of compressive sensing and matrix completion, where
sparsity is exploited in estimating quantities of
interest. However, the standard results on compressive
sensing are: (1) reliant on conditions that generally
do not hold for network datasets; and (2) do not allow
us to exploit all we know about their spatio-temporal
structure. In this paper, we overcome these limitations
with an algorithm that has at its heart the same ideas
espoused in compressive sensing, but adapted to the
problem of network datasets. We show how this algorithm
can be used in a variety of ways, in particular on
traffic data, to solve problems such as simple
interpolation of missing values, traffic matrix
inference from link data, prediction, and anomaly
detection. The elegance of the approach lies in the
fact that it unifies all of these tasks and allows them
to be performed even when as much as 98\% of the data
is missing.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sobrinho:2012:TCD,
author = "Jo{\~a}o Lu{\'\i}s Sobrinho and Tiago Quelhas",
title = "A theory for the connectivity discovered by routing
protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "677--689",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165080",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Route-vector protocols, such as the Border Gateway
Protocol (BGP), have nodes elect and exchange routes in
order to discover paths over which to send traffic. We
ask the following: What is the minimum number of links
whose failure prevents a route-vector protocol from
finding such paths? The answer is not obvious because
routing policies prohibit some paths from carrying
traffic and because, on top of that, a route-vector
protocol may hide paths the routing policies would
allow. We develop an algebraic theory to address the
above and related questions. In particular, we
characterize a broad class of routing policies for
which we can compute in polynomial time the minimum
number of links whose failure leaves a route-vector
protocol without a communication path from one given
node to another. The theory is applied to a publicly
available description of the Internet topology to
quantify how much of its intrinsic connectivity is lost
due to the traditional customer-provider, peer-peer
routing policies and how much can be regained with
simple alternative policies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2012:ESP,
author = "XiaoHua Xu and Xiang-Yang Li and Peng-Jun Wan and
ShaoJie Tang",
title = "Efficient scheduling for periodic aggregation queries
in multihop sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "690--698",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2166165",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study periodic query scheduling for
data aggregation with minimum delay under various
wireless interference models. Given a set $Q$ of
periodic aggregation queries, each query $ Q_i \epsilon
Q$ has its own period $ p_i$ and the subset of source
nodes Si containing the data. We first propose a family
of efficient and effective real-time scheduling
protocols that can answer every job of each query task
$ Q_i \epsilon Q$ within a relative delay $ O(p_i)$
under resource constraints by addressing the following
tightly coupled tasks: routing, transmission plan
constructions, node activity scheduling, and packet
scheduling. Based on our protocol design, we further
propose schedulability test schemes to efficiently and
effectively test whether, for a set of queries, each
query job can be finished within a finite delay. Our
theoretical analysis shows that our methods achieve at
least a constant fraction of the maximum possible total
utilization for query tasks, where the constant depends
on wireless interference models. We also conduct
extensive simulations to validate the proposed protocol
and evaluate its practical performance. The simulations
corroborate our theoretical analysis.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bando:2012:SLR,
author = "Masanori Bando and N. Sertac Artan and H. Jonathan
Chao",
title = "Scalable lookahead regular expression detection system
for deep packet inspection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "699--714",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2181411",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Regular expressions (RegExes) are widely used, yet
their inherent complexity often limits the total number
of RegExes that can be detected using a single chip for
a reasonable throughput. This limit on the number of
RegExes impairs the scalability of today's RegEx
detection systems. The scalability of existing schemes
is generally limited by the traditional detection
paradigm based on per-character-state processing and
state transition detection. The main focus of existing
schemes is on optimizing the number of states and the
required transitions, but not on optimizing the
suboptimal character-based detection method.
Furthermore, the potential benefits of allowing
out-of-sequence detection, instead of detecting
components of a RegEx in the order of appearance, have
not been explored. Lastly, the existing schemes do not
provide ways to adapt to the evolving RegExes. In this
paper, we propose Lookahead Finite Automata (LaFA) to
perform scalable RegEx detection. LaFA requires less
memory due to these three contributions: (1) providing
specialized and optimized detection modules to increase
resource utilization; (2) systematically reordering the
RegEx detection sequence to reduce the number of
concurrent operations; (3) sharing states among
automata for different RegExes to reduce resource
requirements. Here, we demonstrate that LaFA requires
an order of magnitude less memory compared to today's
state-of-the-art RegEx detection systems. Using LaFA, a
single-commodity field programmable gate array (FPGA)
chip can accommodate up to 25 000 (25 k) RegExes. Based
on the throughput of our LaFA prototype on FPGA, we
estimate that a 34-Gb/s throughput can be achieved.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khanna:2012:ASV,
author = "Sanjeev Khanna and Santosh S. Venkatesh and Omid
Fatemieh and Fariba Khan and Carl A. Gunter",
title = "Adaptive selective verification: an efficient adaptive
countermeasure to thwart {DoS} attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "715--728",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2171057",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Denial-of-service (DoS) attacks are considered within
the province of a shared channel model in which attack
rates may be large but are bounded and client request
rates vary within fixed bounds. In this setting, it is
shown that clients can adapt effectively to an attack
by increasing their request rate based on timeout
windows to estimate attack rates. The server will be
able to process client requests with high probability
while pruning out most of the attack by selective
random sampling. The protocol introduced here, called
Adaptive Selective Verification (ASV), is shown to use
bandwidth efficiently and does not require any server
state or assumptions about network congestion. The main
results of the paper are a formulation of optimal
performance and a proof that ASV is optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pong:2012:CLT,
author = "Fong Pong and Nian-Feng Tzeng",
title = "Concise lookup tables for {IPv4} and {IPv6} longest
prefix matching in scalable routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "729--741",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2167158",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a distinct longest prefix matching (LPM)
lookup scheme able to achieve exceedingly concise
lookup tables (CoLT), suitable for scalable routers.
Based on unified hash tables for handling both IPv4 and
IPv6 simultaneously, CoLT excels over previous
mechanisms in: (1) lower on-chip storage for lookup
tables; (2) simpler table formats to enjoy richer
prefix aggregation and easier implementation; and (3)
most importantly, deemed the only design able to
accommodate both IPv4 and IPv6 addresses uniformly and
effectively. As its hash tables permit multiple
possible buckets to hold each prefix (following a
migration rule to avoid false positives altogether),
CoLT exhibits the best memory efficiency and can launch
parallel search over tables during every LPM lookup,
involving fewer cycles per lookup when on-chip memory
is used to implement hash tables. With 16 (or 32)
on-chip SRAM blocks clocked at 500 MHz (achievable in
today's 65-nm technology), it takes 2 (or 1.6) cycles
on average to complete a lookup, yielding 250 (or 310
+) millions of packets per second (MPPS) mean
throughput. Being hash-oriented, CoLT well supports
incremental table updates, besides its high table
utilization and lookup throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Laufer:2012:PTA,
author = "Rafael Laufer and Henri Dubois-Ferri{\`e}re and
Leonard Kleinrock",
title = "Polynomial-time algorithms for multirate anypath
routing in wireless multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "742--755",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165852",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a new routing paradigm that
generalizes opportunistic routing for wireless multihop
networks. In multirate anypath routing, each node uses
both a set of next-hops and a selected transmission
rate to reach a destination. Using this rate, a packet
is broadcast to the nodes in the set, and one of them
forwards the packet on to the destination. To date,
there is no theory capable of jointly optimizing both
the set of next-hops and the transmission rate used by
each node. We solve this by introducing two
polynomial-time routing algorithms and provide the
proof of their optimality. The proposed algorithms have
roughly the same running time as regular shortest-path
algorithms and are therefore suitable for deployment in
routing protocols. We conducted measurements in an
802.11b testbed network, and our trace-driven analysis
shows that multirate anypath routing is on average 80\%
better than 11-Mbps anypath routing, with a factor of
6.4 improvement in the best case. If the rate is fixed
at 1 Mbps instead, performance improves by a factor of
5.4 on average.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leith:2012:MMF,
author = "Douglas J. Leith and Qizhi Cao and Vijay G.
Subramanian",
title = "Max-min fairness in 802.11 mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "756--769",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165850",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we establish that the rate region of a
large class of IEEE 802.11 mesh networks is log-convex,
immediately allowing standard utility fairness methods
to be generalized to this class of networks. This
creates a solid theoretical underpinning for fairness
analysis and resource allocation in this practically
important class of networks. For the special case of
max-min fairness, we use this new insight to obtain an
almost complete characterization of the fair rate
allocation and a remarkably simple, practically
implementable method for achieving max-min fairness in
802.11 mesh networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2012:DPB,
author = "Changbin Liu and Ricardo Correa and Xiaozhou Li and
Prithwish Basu and Boon Thau Loo and Yun Mao",
title = "Declarative policy-based adaptive mobile ad hoc
networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "770--783",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2165851",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents DAWN, a declarative platform that
creates highly adaptive policy-based mobile ad hoc
network (MANET) protocols. DAWN leverages declarative
networking techniques to achieve extensible routing and
forwarding using declarative languages. We make the
following contributions. First, we demonstrate that
traditional MANET protocols can be expressed in a
concise fashion as declarative networks and
policy-driven adaptation can be specified in the same
language to dictate the dynamic selection of different
protocols based on various network and traffic
conditions. Second, we propose interprotocol forwarding
techniques that ensure packets are able to seamlessly
traverse across clusters of nodes running different
protocols selected based on their respective policies.
Third, we have developed a full-fledged implementation
of DAWN using the RapidNet declarative networking
system. We experimentally validate a variety of
policy-based adaptive MANETs in various dynamic
settings using a combination of ns-3 simulations and
deployment on the ORBIT testbed. Our experimental
results demonstrate that hybrid protocols developed
using DAWN outperform traditional MANET routing
protocols and are able to flexibly and dynamically
adapt their routing mechanisms to achieve a good
tradeoff between bandwidth utilization and route
quality. We further demonstrate DAWN's capabilities to
achieve interprotocol forwarding across different
protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Amaldi:2012:DWS,
author = "Edoardo Amaldi and Antonio Capone and Matteo Cesana
and Ilario Filippini",
title = "Design of wireless sensor networks for mobile target
detection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "784--797",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175746",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider surveillance applications through wireless
sensor networks (WSNs) where the areas to be monitored
are fully accessible and the WSN topology can be
planned a priori to maximize application efficiency. We
propose an optimization framework for selecting the
positions of wireless sensors to detect mobile targets
traversing a given area. By leveraging the concept of
path exposure as a measure of detection quality, we
propose two problem versions: the minimization of the
sensors installation cost while guaranteeing a minimum
exposure, and the maximization of the exposure of the
least-exposed path subject to a budget on the sensors
installation cost. We present compact mixed-integer
linear programming formulations for these problems that
can be solved to optimality for reasonable-sized
network instances. Moreover, we develop Tabu Search
heuristics that are able to provide near-optimal
solutions of the same instances in short computing time
and also tackle large size instances. The basic
versions are extended to account for constraints on the
wireless connectivity as well as heterogeneous devices
and nonuniform sensing. Finally, we analyze an enhanced
exposure definition based on mobile target detection
probability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sebbah:2012:DQR,
author = "Samir Sebbah and Brigitte Jaumard",
title = "Differentiated quality-of-recovery in survivable
optical mesh networks using $p$-structures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "798--810",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2166560",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates design methods of protection
schemes in survivable WDM networks that use
preconfigured protection structures (p-structures) in
order to provide different quality-of-recovery (QoR)
classes within 100\% resilient single-link protection
schemes. QoR differentiation is a practical and
effective approach in order to strike different
balances among protection cost, recovery delay, and
management complexity. Based on the degree of pre-cross
connectivity of the protection structures, we develop
three design approaches of shared protection capacity
schemes based on the following: (1) fully
pre-cross-connected p-structures (fp-structures); (2)
partially pre-cross-connected p-structures
(pp-structures); and (3) dynamically reconfigured
p-structures (dp-structures). In order to identify the
optimal combinations of protection structures to meet
the requirements of the three QoR classes, we use a
column generation (CG) model that we solve using
large-scale optimization techniques. Our CG
decomposition approach is based on the separation
processes of the design and selection of the protection
structures. In the design process of the protection
structures, the shape and protection capability of each
p-structure is decided dynamically during the selection
process depending on the network topology and the
targeted QoR parameters. Extensive experiments are
carried out on several data instances with different
design constraints in order to measure the protection
capacity cost and the recovery delay for the three QoR
classes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kompella:2012:RSF,
author = "Ramana Rao Kompella and Kirill Levchenko and Alex C.
Snoeren and George Varghese",
title = "Router support for fine-grained latency measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "811--824",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188905",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An increasing number of datacenter network
applications, including automated trading and
high-performance computing, have stringent end-to-end
latency requirements where even microsecond variations
may be intolerable. The resulting fine-grained
measurement demands cannot be met effectively by
existing technologies, such as SNMP, NetFlow, or active
probing. We propose instrumenting routers with a
hash-based primitive that we call a Lossy Difference
Aggregator (LDA) to measure latencies down to tens of
microseconds even in the presence of packet loss.
Because LDA does not modify or encapsulate the packet,
it can be deployed incrementally without changes along
the forwarding path. When compared to Poisson-spaced
active probing with similar overheads, our LDA
mechanism delivers orders of magnitude smaller relative
error; active probing requires 50-60 times as much
bandwidth to deliver similar levels of accuracy.
Although ubiquitous deployment is ultimately desired,
it may be hard to achieve in the shorter term; we
discuss a partial deployment architecture called mPlane
using LDAs for intrarouter measurements and localized
segment measurements for interrouter measurements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ni:2012:QCQ,
author = "Jian Ni and Bo Tan and R. Srikant",
title = "{Q-CSMA}: queue-length-based {CSMA\slash CA}
algorithms for achieving maximum throughput and low
delay in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "825--836",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2177101",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, it has been shown that carrier-sense
multiple access (CSMA)-type random access algorithms
can achieve the maximum possible throughput in ad hoc
wireless networks. However, these algorithms assume an
idealized continuous-time CSMA protocol where
collisions can never occur. In addition, simulation
results indicate that the delay performance of these
algorithms can be quite bad. On the other hand,
although some simple heuristics (such as greedy maximal
scheduling) can yield much better delay performance for
a large set of arrival rates, in general they may only
achieve a fraction of the capacity region. In this
paper, we propose a discrete-time version of the CSMA
algorithm. Central to our results is a discrete-time
distributed randomized algorithm that is based on a
generalization of the so-called Glauber dynamics from
statistical physics, where multiple links are allowed
to update their states in a single timeslot. The
algorithm generates collision-free transmission
schedules while explicitly taking collisions into
account during the control phase of the protocol, thus
relaxing the perfect CSMA assumption. More importantly,
the algorithm allows us to incorporate heuristics that
lead to very good delay performance while retaining the
throughput-optimality property.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2012:DRA,
author = "Wei Wang and Kang G. Shin and Wenbo Wang",
title = "Distributed resource allocation based on queue
balancing in multihop cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "837--850",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2167983",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio (CR) allows unlicensed users to access
the licensed spectrum opportunistically (i.e., when the
spectrum is left unused by the licensed users) to
enhance the spectrum utilization efficiency. In this
paper, the problem of allocating resources (channels
and transmission power) in multihop CR networks is
modeled as a multicommodity flow problem with the
dynamic link capacity resulting from dynamic resource
allocation, which is in sharp contrast with existing
flow-control approaches that assume fixed link
capacity. Based on queue-balancing network flow control
that is ideally suited for handling dynamically
changing spectrum availability in CR networks, we
propose a distributed scheme (installed and operational
in each node) for optimal resource allocation without
exchanging spectrum dynamics information between remote
nodes. Considering the power masks, each node makes
resource-allocation decisions based on current or past
local information from neighboring nodes to satisfy the
throughput requirement of each flow. Parameters of
these proposed schemes are configured to maintain the
network stability. The performance of the proposed
scheme for both asynchronous and synchronous scenarios
is analyzed comparatively. Both cases of sufficient and
insufficient network capacity are considered.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhu:2012:RCC,
author = "Yi Zhu and Jason P. Jue",
title = "Reliable collective communications with weighted
{SRLGs} in optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "851--863",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2167157",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the problem of reliable
collective communication (broadcast or gossip) with the
objective of maximizing the reliability of the
collective communication. The need for collective
communication arises in many problems of parallel and
distributed computing, including Grid or cloud
computing and database management. We describe the
network model, formulate the reliable collective
communication problem, prove that the maximum reliable
collective communication problem is NP-hard, and
provide an integer linear program (ILP) formulation for
the problem. We then provide a greedy approximation
algorithm to construct collective communication
(through a spanning tree) that achieves an
approximation ratio of $ 1 + \ln (|V| + \alpha |E| - 1)
$, where is the average number of shared link risk
groups (SRLGs) along links, and $ |V| $ and $ |E| $ are
the total number of vertices and edges of the network,
respectively. Simulations demonstrate that our
approximation algorithm achieves good performance in
both small and large networks and that, in almost 95\%
of total cases, our algorithm outperforms the modified
minimum spanning tree algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tan:2012:GGR,
author = "Guang Tan and Anne-Marie Kermarrec",
title = "Greedy geographic routing in large-scale sensor
networks: a minimum network decomposition approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "864--877",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2167758",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In geographic (or geometric) routing, messages are by
default routed in a greedy manner: The current node
always forwards a message to its neighbor node that is
closest to the destination. Despite its simplicity and
general efficiency, this strategy alone does not
guarantee delivery due to the existence of local minima
(or dead ends). Overcoming local minima requires nodes
to maintain extra nonlocal state or to use auxiliary
mechanisms. We study how to facilitate greedy
forwarding by using a minimum amount of such nonlocal
states in topologically complex networks. Specifically,
we investigate the problem of decomposing a given
network into a minimum number of greedily routable
components (GRCs), where greedy routing is guaranteed
to work. We approach it by considering an approximate
version of the problem in a continuous domain, with a
central concept called the greedily routable region
(GRR). A full characterization of GRR is given
concerning its geometric properties and routing
capability. We then develop simple approximate
algorithms for the problem. These results lead to a
practical routing protocol that has a routing stretch
below 7 in a continuous domain, and close to 1 in
several realistic network settings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sorooshyari:2012:PCC,
author = "Siamak Sorooshyari and Chee Wei Tan and Mung Chiang",
title = "Power control for cognitive radio networks: axioms,
algorithms, and analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "878--891",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2169986",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The deployment of cognitive radio networks enables
efficient spectrum sharing and opportunistic spectrum
access. It also presents new challenges to the
classical problem of interference management in
wireless networks. This paper develops an axiomatic
framework for power allocation in cognitive radio
networks based on four goals: QoS protection to primary
users, opportunism to secondary users, admissibility to
secondary users, and autonomous operation by individual
users. Two additional goals, licensing and versatility,
which are desirable rather than essential, are also
presented. A general class of Duo Priority Class Power
Control (DPCPC) policies that satisfy such goals is
introduced. Through theoretical analysis and
simulation, it is shown that a specific
interference-aware power-control algorithm reaches such
goals.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Venkitasubramaniam:2012:GTA,
author = "Parv Venkitasubramaniam and Lang Tong",
title = "A game-theoretic approach to anonymous networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "892--905",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2176511",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Anonymous wireless networking is studied when an
adversary monitors the transmission timing of an
unknown subset of the network nodes. For a desired
quality of service (QoS), as measured by network
throughput, the problem of maximizing anonymity is
investigated from a game-theoretic perspective.
Quantifying anonymity using conditional entropy of the
routes given the adversary's observation, the problem
of optimizing anonymity is posed as a two-player
zero-sum game between the network designer and the
adversary: The task of the adversary is to choose a
subset of nodes to monitor so that anonymity of routes
is minimum, whereas the task of the network designer is
to maximize anonymity by choosing a subset of nodes to
evade flow detection by generating independent
transmission schedules. In this two-player game, it is
shown that a unique saddle-point equilibrium exists for
a general category of finite networks. At the saddle
point, the strategy of the network designer is to
ensure that any subset of nodes monitored by the
adversary reveals an identical amount of information
about the routes. For a specific class of parallel
relay networks, the theory is applied to study the
optimal performance tradeoffs and equilibrium
strategies. In particular, when the nodes employ
transmitter-directed signaling, the tradeoff between
throughput and anonymity is characterized analytically
as a function of the network parameters and the
fraction of nodes monitored. The results are applied to
study the relationships between anonymity, the fraction
of monitored relays, and the fraction of hidden relays
in large networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gopalan:2012:IAL,
author = "Abishek Gopalan and Srinivasan Ramasubramanian",
title = "On identifying additive link metrics using linearly
independent cycles and paths",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "906--916",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2174648",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the problem of identifying
constant additive link metrics using linearly
independent monitoring cycles and paths. A monitoring
cycle starts and ends at the same monitoring station,
while a monitoring path starts and ends at distinct
monitoring stations. We show that three-edge
connectivity is a necessary and sufficient condition to
identify link metrics using one monitoring station and
employing monitoring cycles. We develop a
polynomial-time algorithm to compute the set of
linearly independent cycles. For networks that are less
than three-edge-connected, we show how the minimum
number of monitors required and their placement may be
computed. For networks with symmetric directed links,
we show the relationship between the number of monitors
employed, the number of directed links for which metric
is known a priori, and the identifiability for the
remaining links. To the best of our knowledge, this is
the first work that derives the necessary and
sufficient conditions on the network topology for
identifying additive link metrics and develops a
polynomial-time algorithm to compute linearly
independent cycles and paths.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2012:MPH,
author = "Xinbing Wang and Luoyi Fu and Chenhui Hu",
title = "Multicast performance with hierarchical cooperation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "917--930",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2170584",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It has been shown in a previous version of this paper
that hierarchical cooperation achieves a linear
throughput scaling for unicast traffic, which is due to
the advantage of long-range concurrent transmissions
and the technique of distributed
multiple-input-multiple-output (MIMO). In this paper,
we investigate the scaling law for multicast traffic
with hierarchical cooperation, where each of the n
nodes communicates with k randomly chosen destination
nodes. Specifically, we propose a new class of
scheduling policies for multicast traffic. By utilizing
the hierarchical cooperative MIMO transmission, our new
policies can obtain an aggregate throughput of $ \Omega
((n / k)^{1 - \epsilon }) $ for any $ \epsilon \geq 0
$. This achieves a gain of nearly $ \sqrt {n} / k $
compared to the noncooperative scheme in Li et al.'s
work (Proc. ACM MobiCom, 2007, pp. 266-277). Among all
four cooperative strategies proposed in our paper, one
is superior in terms of the three performance metrics:
throughput, delay, and energy consumption. Two factors
contribute to the optimal performance: multihop MIMO
transmission and converge-based scheduling. Compared to
the single-hop MIMO transmission strategy, the multihop
strategy achieves a throughput gain of $ (n / k)^{h - 1
/ h (2 h - 1)} $ and meanwhile reduces the energy
consumption by $ k^{\alpha - 2 / 2} $ times
approximately, where $ h > 1 $ is the number of the
hierarchical layers, and $ \alpha \geq 2 $ is the
path-loss exponent. Moreover, to schedule the traffic
with the converge multicast instead of the pure
multicast strategy, we can dramatically reduce the
delay by a factor of about $ (n / k)^{h / 2} $. Our
optimal cooperative strategy achieves an approximate
delay-throughput tradeoff $ D(n, k) / T(n, k) = \Theta
(k) $ when $ h \to \infty $. This tradeoff ratio is
identical to that of noncooperative scheme, while the
throughput is greatly improved.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eriksson:2012:ENT,
author = "Brian Eriksson and Gautam Dasarathy and Paul Barford
and Robert Nowak",
title = "Efficient network tomography for {Internet} topology
discovery",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "931--943",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175747",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Accurate and timely identification of the router-level
topology of the Internet is one of the major unresolved
problems in Internet research. Topology recovery via
tomographic inference is potentially an attractive
complement to standard methods that use TTL-limited
probes. Unfortunately, limitations of prior tomographic
techniques make timely resolution of large-scale
topologies impossible due to the requirement of an
infeasible number of measurements. In this paper, we
describe new techniques that aim toward efficient
tomographic inference for accurate router-level
topology measurement. We introduce methodologies based
on Depth-First Search (DFS) ordering that clusters
end-hosts based on shared infrastructure and enables
the logical tree topology of a network to be recovered
accurately and efficiently. We evaluate the
capabilities of our algorithms in large-scale
simulation and find that our methods will reconstruct
topologies using less than 2\%of the measurements
required by exhaustive methods and less than 15\% of
the measurements needed by the current state-of-the-art
tomographic approach. We also present results from a
study of the live Internet where we show our DFS-based
methodologies can recover the logical router-level
topology more accurately and with fewer probes than
prior techniques.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:EES,
author = "Dan Li and Yuanjie Li and Jianping Wu and Sen Su and
Jiangwei Yu",
title = "{ESM}: efficient and scalable data center multicast
routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "944--955",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2169985",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multicast benefits group communications in saving
network traffic and improving application throughput,
both of which are important for data center
applications. However, the technical trend of data
center design poses new challenges for efficient and
scalable multicast routing. First, the densely
connected networks make traditional receiver-driven
multicast routing protocols inefficient in multicast
tree formation. Second, it is quite difficult for the
low-end switches widely used in data centers to hold
the routing entries of massive multicast groups. In
this paper, we propose ESM, an efficient and scalable
multicast routing scheme for data center networks. ESM
addresses the challenges above by exploiting the
feature of modern data center networks. Based on the
regular topology of data centers, ESM uses a
source-to-receiver expansion approach to build
efficient multicast trees, excluding many unnecessary
intermediate switches used in receiver-driven multicast
routing. For scalable multicast routing, ESM combines
both in-packet Bloom Filters and in-switch entries to
make the tradeoff between the number of multicast
groups supported and the additional bandwidth overhead.
Simulations show that ESM saves 40\% --- 50\% network
traffic and doubles the application throughputs
compared to receiver-driven multicast routing, and the
combination routing scheme significantly reduces the
number of in-switch entries required. We implement ESM
on a Linux platform. The experimental results further
demonstrate that ESM can well support online tree
building for large-scale groups with churns, and the
overhead of the combination forwarding engine is
light-weighted.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zheng:2012:SWD,
author = "Zizhan Zheng and Prasun Sinha and Santosh Kumar",
title = "Sparse {WiFi} deployment for vehicular {Internet}
access with bounded interconnection gap",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "956--969",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2170218",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Vehicular Internet access via open WiFi access points
(APs) has been demonstrated to be a feasible solution
to provide opportunistic data service to moving
vehicles. Using an in situ deployment, however, such a
solution does not provide performance guarantees due to
unpredictable intermittent connectivity. On the other
hand, a solution that tries to cover every point in an
entire road network with APs (a full coverage) is not
very practical due to prohibitive deployment and
operational costs. In this paper, we introduce a new
notion of intermittent coverage for mobile users,
called Alpha Coverage, which provides worst-case
guarantees on the interconnection gap, i.e., the
distance or expected delay between two consecutive
mobile-AP contacts for a vehicle, while using
significantly fewer APs than needed for full coverage.
We propose efficient algorithms to verify whether a
given deployment provides Alpha Coverage. The problem
of finding an economic deployment that provides $
\alpha $-coverage turns out to be NP-hard. We hence
provide both approximation algorithms that have
provable guarantees on the performance as well as
efficient heuristics that perform well in practice. The
efficiency of our algorithms is demonstrated via
simulations using data from real-world road networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bremler-Barr:2012:AMM,
author = "Anat Bremler-Barr and Yaron Koral",
title = "Accelerating multipattern matching on compressed
{HTTP} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "3",
pages = "970--983",
month = jun,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2172456",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 11:13:33 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Current security tools, using ``signature-based''
detection, do not handle compressed traffic, whose
market-share is constantly increasing. This paper
focuses on compressed HTTP traffic. HTTP uses GZIP
compression and requires some kind of decompression
phase before performing a string matching. We present a
novel algorithm, Aho--Corasick-based algorithm for
Compressed HTTP (ACCH), that takes advantage of
information gathered by the decompression phase in
order to accelerate the commonly used Aho--Corasick
pattern-matching algorithm. By analyzing real HTTP
traffic and real Web application firewall signatures,
we show that up to 84\% of the data can be skipped in
its scan. Surprisingly, we show that it is faster to
perform pattern matching on the compressed data, with
the penalty of decompression, than on regular traffic.
As far as we know, we are the first paper that analyzes
the problem of ``on-the-fly'' multipattern matching on
compressed HTTP traffic and suggest a solution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Basile:2012:NLA,
author = "Cataldo Basile and Alberto Cappadonia and Antonio
Lioy",
title = "Network-level access control policy analysis and
transformation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "985--998",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network-level access control policies are often
specified by various people (network, application, and
security administrators), and this may result in
conflicts or suboptimal policies. We have defined a new
formal model for policy representation that is
independent of the actual enforcement elements, along
with a procedure that allows the easy identification
and removal of inconsistencies and anomalies.
Additionally, the policy can be translated to the model
used by the target access control element to prepare it
for actual deployment. In particular, we show that
every policy can be translated into one that uses the
``First Matching Rule'' resolution strategy. Our policy
model and optimization procedure have been implemented
in a tool that experimentally demonstrates its
applicability to real-life cases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Passos:2012:JAR,
author = "Diego Passos and Celio V. N. Albuquerque",
title = "A joint approach to routing metrics and rate
adaptation in wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "999--1009",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2170585",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents MARA, a joint mechanism for
automatic rate selection and route quality evaluation
in wireless mesh networks. This mechanism targets at
avoiding the problems of lack of synchronization
between metric and rate selection decisions and
inaccurate link quality estimates, common to main
existing proposals of multihop wireless routing metrics
and automatic rate adaptation. In this proposal, the
statistics collected by the routing protocol are used
by the rate adaptation algorithm to compute the best
rate for each wireless link. This coordinated decision
aims at providing better routing and rate choices. In
addition to the basic MARA algorithm, two variations
are proposed: MARA-P and MARA-RP. The first considers
the size of each packet in the transmission rate
decision. The second variation considers the packet
size also for the routing choices. For evaluation
purposes, experiments were conducted on both real and
simulated environments. In these experiments, MARA was
compared to a number of rate adaptation algorithms and
routing metrics. Results from both environments
indicate that MARA may lead to an overall network
performance improvement.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Trestian:2012:TMD,
author = "Ionut Trestian and Supranamaya Ranjan and Aleksandar
Kuzmanovic and Antonio Nucci",
title = "Taming the mobile data deluge with drop zones",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1010--1023",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2172952",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Human communication has changed by the advent of
smartphones. Using commonplace mobile device features,
they started uploading large amounts of content that
increases. This increase in demand will overwhelm
capacity and limits the providers' ability to provide
the quality of service demanded by their users. In the
absence of technical solutions, cellular network
providers are considering changing billing plans to
address this. Our contributions are twofold. First, by
analyzing user content upload behavior, we find that
the user-generated content problem is a user behavioral
problem. Particularly, by analyzing user mobility and
data logs of 2 million users of one of the largest US
cellular providers, we find that: (1) users upload
content from a small number of locations; (2) because
such locations are different for users, we find that
the problem appears ubiquitous. However, we find that:
(3) there exists a significant lag between content
generation and uploading times, and (4) with respect to
users, it is always the same users to delay. Second, we
propose a cellular network architecture. Our approach
proposes capacity upgrades at a select number of
locations called Drop Zones. Although not particularly
popular for uploads originally, Drop Zones seamlessly
fall within the natural movement patterns of a large
number of users. They are therefore suited for
uploading larger quantities of content in a postponed
manner. We design infrastructure placement algorithms
and demonstrate that by upgrading infrastructure in
only 963 base stations across the entire US, it is
possible to deliver 50\% of content via Drop Zones.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sharma:2012:TPE,
author = "Vicky Sharma and Koushik Kar and K. K. Ramakrishnan
and Shivkumar Kalyanaraman",
title = "A transport protocol to exploit multipath diversity in
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1024--1039",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2181979",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless networks (including wireless mesh networks)
provide opportunities for using multiple paths.
Multihoming of hosts, possibly using different
technologies and providers, also makes it attractive
for end-to-end transport connections to exploit
multiple paths. In this paper, we propose a multipath
transport protocol, based on a carefully crafted set of
enhancements to TCP, that effectively utilizes the
available bandwidth and diversity provided by
heterogeneous, lossy wireless paths. Our Multi-Path
LOss-Tolerant (MPLOT) transport protocol can be used to
obtain significant goodput gains in wireless networks,
subject to bursty, correlated losses with average loss
rates as high as 50\%. MPLOT is built around the
principle of separability of reliability and congestion
control functions in an end-to-end transport protocol.
Congestion control is performed separately on
individual paths, and the reliability mechanism works
over the aggregate set of paths available for an
end-to-end session. MPLOT distinguishes between
congestion and link losses through Explicit Congestion
Notification (ECN), and uses Forward Error Correction
(FEC) coding to recover from data losses. MPLOT uses a
dynamic packet mapping based on the current path
characteristics to choose a path for a packet. Use of
erasure codes and block-level recovery ensures that in
MPLOT the receiving transport entity can recover all
data as long as a necessary number of packets in the
block are received, irrespective of which packets are
lost. We present a theoretical analysis of the
different design choices of MPLOT and show that MPLOT
chooses its policies and parameters such that a
desirable tradeoff between goodput with data recovery
delay is attained. We evaluate MPLOT, through
simulations, under a variety of test scenarios and
demonstrate that it effectively exploits path diversity
in addition to efficiently aggregating path bandwidths
while remaining fair to a conventional TCP flow on each
path.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2012:DBS,
author = "Hao Wang and Haiquan Zhao and Bill Lin and Jun Xu",
title = "{DRAM}-based statistics counter array architecture
with performance guarantee",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1040--1053",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2171360",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The problem of efficiently maintaining a large number
(say millions) of statistics counters that need to be
updated at very high speeds (e.g., 40 Gb/s) has
received considerable research attention in recent
years. This problem arises in a variety of router
management and data streaming applications where large
arrays of counters are used to track various network
statistics and implement various counting sketches. It
proves too costly to store such large counter arrays
entirely in SRAM, while DRAM is viewed as too slow for
providing wirespeed updates at such high line rates. In
particular, we propose a DRAM-based counter
architecture that can effectively maintain wirespeed
updates to large counter arrays. The proposed approach
is based on the observation that modern commodity DRAM
architectures, driven by aggressive performance
roadmaps for consumer applications, such as video
games, have advanced architecture features that can be
exploited to make a DRAM-based solution practical. In
particular, we propose a randomized DRAM architecture
that can harness the performance of modern commodity
DRAM offerings by interleaving counter updates to
multiple memory banks. The proposed architecture makes
use of a simple randomization scheme, a small cache,
and small request queues to statistically guarantee a
near-perfect load-balancing of counter updates to the
DRAM banks. The statistical guarantee of the proposed
randomized scheme is proven using a novel combination
of convex ordering and large deviation theory. Our
proposed counter scheme can support arbitrary
increments and decrements at wirespeed, and they can
support different number representations, including
both integer and floating point number
representations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shi:2012:SFR,
author = "Yi Shi and Y. Thomas Hou",
title = "Some fundamental results on base station movement
problem for wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1054--1067",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2171990",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The benefits of using a mobile base station to prolong
sensor network lifetime have been well recognized.
However, due to the complexity of the problem
(time-dependent network topology and traffic routing),
theoretical performance limits and provably optimal
algorithms remain difficult to develop. This paper
fills this important gap by contributing some
theoretical results regarding the optimal movement of a
mobile base station. Our main result hinges upon two
key intermediate results. In the first result, we show
that a time-dependent joint base station movement and
flow routing problem can be transformed into a
location-dependent problem. In the second result, we
show that, for $ (1 - \epsilon) $ optimality, the
infinite possible locations for base station movement
can be reduced to a finite set of locations via several
constructive steps [i.e., discretization of energy cost
through a geometric sequence, division of a disk into a
finite number of subareas, and representation of each
subarea with a fictitious cost point (FCP)].
Subsequently, for each FCP, we can obtain the optimal
sojourn time for the base station (as well as the
corresponding location-dependent flow routing) via a
simple linear program. We prove that the proposed
solution can guarantee the achieved network lifetime is
at least $ (1 - \epsilon) $ of the maximum (unknown)
network lifetime, where $ \epsilon $ can be made
arbitrarily small depending on the required
precision.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kumar:2012:DME,
author = "Ashwini Kumar and Kang G. Shin",
title = "{DSASync}: managing end-to-end connections in dynamic
spectrum access wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1068--1081",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178264",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless LANs (WLANs) have been widely deployed as
edge access networks that provide the important service
of Internet access to wireless devices. Therefore,
performance of end-to-end connections to/from such
WLANs is of great importance. The advent of Dynamic
Spectrum Access (DSA) technology is expected to play a
key role in improving wireless communication. With DSA
capability, WLANs opportunistically access licensed
channels in order to improve spectrum-usage efficiency
and provide better network performance. In this paper,
we identify the key issues that impact end-to-end
connection performance when a DSA-enabled WLAN is
integrated with the wired cloud. We propose a new
network management framework, called DSASync, to
mitigate the identified performance issues. DSASync
achieves this objective by managing the connections at
the transport layer as a third-party supervisor and
targets both TCP streams and UDP flows. DSASync
requires no modifications to the network infrastructure
or the existing network stack and protocols while
ensuring transport protocol (TCP or UDP) semantics to
be obeyed. It mainly consists of a combination of
buffering and traffic-shaping algorithms to minimize
the adverse side-effects of DSA on active connections.
DSASync is evaluated using a prototype implementation
and deployment in a testbed. The results show
significant improvement in end-to-end connection
performance, with substantial gains on QoS metrics like
goodput, delay, and jitter. Thus, DSASync is a
promising step toward applying DSA technology in
consumer WLANs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eswaran:2012:CTU,
author = "Sharanya Eswaran and Archan Misra and Thomas F. {La
Porta}",
title = "Control-theoretic utility maximization in multihop
wireless networks under mission dynamics",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1082--1095",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2176510",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Both bandwidth and energy become important resource
constraints when multihop wireless networks are used to
transport high-data-rate traffic for a moderately long
duration. In such networks, it is important to control
the traffic rates to not only conform to the link
capacity bounds, but also to ensure that the energy of
battery-powered forwarding nodes is utilized
judiciously to avoid premature exhaustion (i.e., the
network lasts as long as the applications require data
from the sources) without being unnecessarily
conservative (i.e., ensuring that the applications
derive the maximum utility possible). Unlike prior work
that focuses on the instantaneous distributed
optimization of such networks, we consider the more
challenging question of how such optimal usage of both
link capacity and node energy may be achieved over a
time horizon. Our key contributions are twofold. We
first show how the formalism of optimal control may be
used to derive optimal resource usage strategies over a
time horizon, under a variety of both deterministic and
statistically uncertain variations in various
parameters, such as the duration for which individual
applications are active or the time-varying recharge
characteristics of renewable energy sources (e.g.,
solar cell batteries). In parallel, we also demonstrate
that these optimal adaptations can be embedded, with
acceptably low signaling overhead, into a distributed,
utility-based rate adaptation protocol. Simulation
studies, based on a combination of synthetic and real
data traces, validate the close-to-optimal performance
characteristics of these practically realizable
protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jagannathan:2012:QLA,
author = "Krishna Jagannathan and Mihalis Markakis and Eytan
Modiano and John N. Tsitsiklis",
title = "Queue-length asymptotics for generalized max-weight
scheduling in the presence of heavy-tailed traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1096--1111",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2173553",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the asymptotic behavior of the
steady-state queue-length distribution under
generalized max-weight scheduling in the presence of
heavy-tailed traffic. We consider a system consisting
of two parallel queues, served by a single server. One
of the queues receives heavy-tailed traffic, and the
other receives light-tailed traffic. We study the class
of throughput-optimal max-weight-$ \alpha $ scheduling
policies and derive an exact asymptotic
characterization of the steady-state queue-length
distributions. In particular, we show that the tail of
the light queue distribution is at least as heavy as a
power-law curve, whose tail coefficient we obtain
explicitly. Our asymptotic characterization also shows
that the celebrated max-weight scheduling policy leads
to the worst possible tail coefficient of the light
queue distribution, among all nonidling policies.
Motivated by the above negative result regarding the
max-weight-$ \alpha $ policy, we analyze a
log-max-weight (LMW) scheduling policy. We show that
the LMWpolicy guarantees an exponentially decaying
light queue tail while still being
throughput-optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:ETB,
author = "Bin Li and Atilla Eryilmaz",
title = "Exploring the throughput boundaries of randomized
schedulers in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1112--1124",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2172953",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Randomization is a powerful and pervasive strategy for
developing efficient and practical transmission
scheduling algorithms in interference-limited wireless
networks. Yet, despite the presence of a variety of
earlier works on the design and analysis of particular
randomized schedulers, there does not exist an
extensive study of the limitations of randomization on
the efficient scheduling in wireless networks. In this
paper, we aim to fill this gap by proposing a common
modeling framework and three functional forms of
randomized schedulers that utilize queue-length
information to probabilistically schedule
nonconflicting transmissions. This framework not only
models many existing schedulers operating under a
timescale separation assumption as special cases, but
it also contains a much wider class of potential
schedulers that have not been analyzed. We identify
some sufficient and some necessary conditions on the
network topology and on the functional forms used in
the randomization for throughput optimality. Our
analysis reveals an exponential and a subexponential
class of functions that exhibit differences in the
throughput optimality. Also, we observe the
significance of the network's scheduling diversity for
throughput optimality as measured by the number of
maximal schedules each link belongs to. We further
validate our theoretical results through numerical
studies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bampas:2012:NMW,
author = "Evangelos Bampas and Aris Pagourtzis and George
Pierrakos and Katerina Potika",
title = "On a noncooperative model for wavelength assignment in
multifiber optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1125--1137",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2173948",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose and investigate SELFISH PATH MULTICOLORING
games as a natural model for noncooperative wavelength
assignment in multifiber optical networks. In this
setting, we view the wavelength assignment process as a
strategic game in which each communication request
selfishly chooses a wavelength in an effort to minimize
the maximum congestion that it encounters on the chosen
wavelength. We measure the cost of a certain wavelength
assignment as the maximum, among all physical links,
number of parallel fibers employed by this assignment.
We start by settling questions related to the existence
and computation of and convergence to pure Nash
equilibria in these games. Our main contribution is a
thorough analysis of the price of anarchy of such
games, that is, the worst-case ratio between the cost
of a Nash equilibrium and the optimal cost. We first
provide upper bounds on the price of anarchy for games
defined on general network topologies. Along the way,
we obtain an upper bound of 2 for games defined on star
networks. We next show that our bounds are tight even
in the case of tree networks of maximum degree 3,
leading to nonconstant price of anarchy for such
topologies. In contrast, for network topologies of
maximum degree 2, the quality of the solutions obtained
by selfish wavelength assignment is much more
satisfactory: We prove that the price of anarchy is
bounded by 4 for a large class of practically
interesting games defined on ring networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ryu:2012:TDR,
author = "Jung Ryu and Lei Ying and Sanjay Shakkottai",
title = "Timescale decoupled routing and rate control in
intermittently connected networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1138--1151",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2182360",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study an intermittently connected network (ICN)
composed of multiple clusters of wireless nodes. Within
each cluster, nodes can communicate directly using the
wireless links. However, these clusters are far away
from each other such that direct communication between
the clusters is impossible except through ``mobile''
contact nodes. These mobile contact nodes are data
carriers that shuffle between clusters and transport
data from the source to the destination clusters. There
are several applications of our network model, such as
clusters of mobile soldiers connected via unmanned
aerial vehicles. Our work here focuses on a queue-based
cross-layer technique known as the back-pressure
algorithm. The algorithm is known to be
throughput-optimal, as well as resilient to disruptions
in the network, making it an ideal candidate
communication protocol for our intermittently connected
network. In this paper, we design a back-pressure
routing/rate control algorithm for ICNs. Though it is
throughput-optimal, the back-pressure algorithm has
several drawbacks when used in ICNs, including long
end-to-end delays, large number of potential queues
needed, and loss in throughput due to intermittency. We
present a modified back-pressure algorithm that
addresses these issues. We implement our algorithm on a
16-node experimental testbed and present our
experimental results in this paper.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Keung:2012:IDM,
author = "Gabriel Y. Keung and Bo Li and Qian Zhang",
title = "The intrusion detection in mobile sensor network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1152--1161",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186151",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Intrusion detection is an important problem in sensor
networks. Prior works in static sensor environments
show that constructing sensor barriers with random
sensor deployment can be effective for intrusion
detection. In response to the recent surge of interest
in mobile sensor applications, this paper studies the
intrusion detection problem in a mobile sensor network,
where it is believed that mobile sensors can improve
barrier coverage. Specifically, we focus on providing
$k$-barrier coverage against moving intruders. This
problem becomes particularly challenging given that the
trajectories of sensors and intruders need to be
captured. We first demonstrate that this problem is
similar to the classical kinetic theory of gas
molecules in physics. We then derive the inherent
relationship between barrier coverage performance and a
set of crucial system parameters including sensor
density, sensing range, and sensor and intruder
mobility. We examine the correlations and sensitivity
from the system parameters, and we derive the minimum
number of mobile sensors that needs to be deployed in
order to maintain the $k$-barrier coverage for a mobile
sensor network. Finally, we show that the coverage
performance can be improved by an order of magnitude
with the same number of sensors when compared to that
of the static sensor environment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pujol:2012:LEC,
author = "Josep M. Pujol and Vijay Erramilli and Georgos Siganos
and Xiaoyuan Yang and Nikolaos Laoutaris and Parminder
Chhabra and Pablo Rodriguez",
title = "The little engine(s) that could: scaling online social
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1162--1175",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188815",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The difficulty of partitioning social graphs has
introduced new system design challenges for scaling of
online social networks (OSNs). Vertical scaling by
resorting to full replication can be a costly
proposition. Scaling horizontally by partitioning and
distributing data among multiple servers using, for
e.g., distributed hash tables (DHTs), can suffer from
expensive interserver communication. Such challenges
have often caused costly rearchitecting efforts for
popular OSNs like Twitter and Facebook. We design,
implement, and evaluate SPAR, a Social Partitioning and
Replication middleware that mediates transparently
between the application and the database layer of an
OSN. SPAR leverages the underlying social graph
structure in order to minimize the required replication
overhead for ensuring that users have their neighbors'
data colocated in the same machine. The gains from this
are multifold: Application developers can assume local
semantics, i.e., develop as they would for a single
machine; scalability is achieved by adding commodity
machines with low memory and network I/O requirements;
and N+K redundancy is achieved at a fraction of the
cost. We provide a complete system design, extensive
evaluation based on datasets from Twitter, Orkut, and
Facebook, and a working implementation. We show that
SPAR incurs minimum overhead, can help a well-known
Twitter clone reach Twitter's scale without changing a
line of its application logic, and achieves higher
throughput than Cassandra, a popular key-value store
database.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lehrieder:2012:CBL,
author = "Frank Lehrieder and Gy{\"o}rgy D{\'a}n and Tobias
Ho{\ss}feld and Simon Oechsner and Vlad Singeorzan",
title = "Caching for {BitTorrent}-like {P2P} systems: a simple
fluid model and its implications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1176--1189",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175246",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer file-sharing systems are responsible for
a significant share of the traffic between Internet
service providers (ISPs) in the Internet. In order to
decrease their peer-to-peer-related transit traffic
costs, many ISPs have deployed caches for peer-to-peer
traffic in recent years. We consider how the different
types of peer-to-peer caches--caches already available
on the market and caches expected to become available
in the future--can possibly affect the amount of
inter-ISP traffic. We develop a fluid model that
captures the effects of the caches on the system
dynamics of peer-to-peer networks and show that caches
can have adverse effects on the system dynamics
depending on the system parameters. We combine the
fluid model with a simple model of inter-ISP traffic
and show that the impact of caches cannot be accurately
assessed without considering the effects of the caches
on the system dynamics. We identify scenarios when
caching actually leads to increased transit traffic.
Motivated by our findings, we propose a proximity-aware
peer-selection mechanism that avoids the increase of
the transit traffic and improves the cache efficiency.
We support the analytical results by extensive
simulations and experiments with real BitTorrent
clients.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2012:DIP,
author = "Hongbo Jiang and Arun Iyengar and Erich Nahum and
Wolfgang Segmuller and Asser N. Tantawi and Charles P.
Wright",
title = "Design, implementation, and performance of a load
balancer for {SIP} server clusters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1190--1202",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2183612",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces several novel load-balancing
algorithms for distributing Session Initiation Protocol
(SIP) requests to a cluster of SIP servers. Our load
balancer improves both throughput and response time
versus a single node while exposing a single interface
to external clients. We present the design,
implementation, and evaluation of our system using a
cluster of Intel x86 machines running Linux. We compare
our algorithms to several well-known approaches and
present scalability results for up to 10 nodes. Our
best algorithm, Transaction Least-Work-Left (TLWL),
achieves its performance by integrating several
features: knowledge of the SIP protocol, dynamic
estimates of back-end server load, distinguishing
transactions from calls, recognizing variability in
call length, and exploiting differences in processing
costs for different SIP transactions. By combining
these features, our algorithm provides finer-grained
load balancing than standard approaches, resulting in
throughput improvements of up to 24\% and response-time
improvements of up to two orders of magnitude. We
present a detailed analysis of occupancy to show how
our algorithms significantly reduce response time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jindal:2012:NCW,
author = "Apoorva Jindal and Mingyan Liu",
title = "Networked computing in wireless sensor networks for
structural health monitoring",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1203--1216",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175450",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the problem of distributed
computation over a network of wireless sensors. While
this problem applies to many emerging applications, to
keep our discussion concrete, we will focus on sensor
networks used for structural health monitoring. Within
this context, the heaviest computation is to determine
the singular value decomposition (SVD) to extract mode
shapes (eigenvectors) of a structure. Compared to
collecting raw vibration data and performing SVD at a
central location, computing SVD within the network can
result in significantly lower energy consumption and
delay. Using recent results on decomposing SVD, a
well-known centralized operation, we seek to determine
a near-optimal communication structure that enables the
distribution of this computation and the reassembly of
the final results, with the objective of minimizing
energy consumption subject to a computational delay
constraint. We show that this reduces to a generalized
clustering problem and establish that it is NP-hard. By
relaxing the delay constraint, we derive a lower bound.
We then propose an integer linear program (ILP) to
solve the constrained problem exactly as well as an
approximate algorithm with a proven approximation
ratio. We further present a distributed version of the
approximate algorithm. We present both simulation and
experimentation results to demonstrate the
effectiveness of these algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2012:ITS,
author = "Charles Shen and Erich Nahum and Henning Schulzrinne
and Charles P. Wright",
title = "The impact of {TLS} on {SIP} server performance:
measurement and modeling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1217--1230",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2180922",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Securing Voice over IP (VoIP) is a crucial requirement
for its successful adoption. A key component of this is
securing the signaling path, which is performed by the
Session Initiation Protocol (SIP). Securing SIP can be
accomplished by using Transport Layer Security (TLS)
instead of UDP as the transport protocol. However,
using TLS for SIP is not yet widespread, perhaps due to
concerns about the performance overhead. This paper
studies the performance impact of using TLS as a
transport protocol for SIP servers. We evaluate the
cost of TLS experimentally using a testbed with
OpenSIPS, OpenSSL, and Linux running on an Intel-based
server. We analyze TLS costs using application,
library, and kernel profiling and use the profiles to
illustrate when and how different costs are incurred.
We show that using TLS can reduce performance by up to
a factor of 17 compared to the typical case of
SIP-over-UDP. The primary factor in determining
performance is whether and how TLS connection
establishment is performed due to the heavy costs of
RSA operations used for session negotiation. This
depends both on how the SIP proxy is deployed and what
TLS operation modes are used. The cost of symmetric key
operations such as AES, in contrast, tends to be small.
Network operators deploying SIP-over-TLS should attempt
to maximize the persistence of secure connections and
will need to assess the server resources required. To
aid them, we provide a measurement-driven cost model
for use in provisioning SIP servers using TLS. Our cost
model predicts performance within 15\% on average.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Medina:2012:GRS,
author = "Daniel Medina and Felix Hoffmann and Francesco
Rossetto and Carl-Herbert Rokitansky",
title = "A geographic routing strategy for {North Atlantic}
in-flight {Internet} access via airborne mesh
networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1231--1244",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2175487",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Airborne Internet is a vision of a large-scale
multihop wireless mesh network consisting of commercial
passenger aircraft connected via long-range highly
directional air-to-air radio links. We propose a
geographic load sharing strategy to fully exploit the
total air-to-ground capacity available at any given
time. When forwarding packets for a given destination,
a node considers not one but a set of next-hop
candidates and spreads traffic among them based on
queue dynamics. In addition, load balancing is
performed among Internet Gateways by using a
congestion-aware handover strategy. Our simulations
using realistic North Atlantic air traffic demonstrate
the ability of such a load sharing mechanism to
approach the maximum theoretical throughput in the
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ling:2012:NCC,
author = "Zhen Ling and Junzhou Luo and Wei Yu and Xinwen Fu and
Dong Xuan and Weijia Jia",
title = "A new cell-counting-based attack against {Tor}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1245--1261",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178036",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Various low-latency anonymous communication systems
such as Tor and Anonymizer have been designed to
provide anonymity service for users. In order to hide
the communication of users, most of the anonymity
systems pack the application data into equal-sized
cells (e.g., 512 B for Tor, a known real-world,
circuit-based, low-latency anonymous communication
network). Via extensive experiments on Tor, we found
that the size of IP packets in the Tor network can be
very dynamic because a cell is an application concept
and the IP layer may repack cells. Based on this
finding, we investigate a new cell-counting-based
attack against Tor, which allows the attacker to
confirm anonymous communication relationship among
users very quickly. In this attack, by marginally
varying the number of cells in the target traffic at
the malicious exit onion router, the attacker can embed
a secret signal into the variation of cell counter of
the target traffic. The embedded signal will be carried
along with the target traffic and arrive at the
malicious entry onion router. Then, an accomplice of
the attacker at the malicious entry onion router will
detect the embedded signal based on the received cells
and confirm the communication relationship among users.
We have implemented this attack against Tor, and our
experimental data validate its feasibility and
effectiveness. There are several unique features of
this attack. First, this attack is highly efficient and
can confirm very short communication sessions with only
tens of cells. Second, this attack is effective, and
its detection rate approaches 100\% with a very low
false positive rate. Third, it is possible to implement
the attack in a way that appears to be very difficult
for honest participants to detect (e.g., using our
hopping-based signal embedding).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bando:2012:FBG,
author = "Masanori Bando and Yi-Li Lin and H. Jonathan Chao",
title = "{FlashTrie}: beyond {100-Gb/s} {IP} route lookup using
hash-based prefix-compressed trie",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1262--1275",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188643",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is becoming apparent that the next-generation IP
route lookup architecture needs to achieve speeds of
100 Gb/s and beyond while supporting IPv4 and IPv6 with
fast real-time updates to accommodate ever-growing
routing tables. Some of the proposed
multibit-trie-based schemes, such as TreeBitmap, have
been used in today's high-end routers. However, their
large data structures often require multiple external
memory accesses for each route lookup. A pipelining
technique is widely used to achieve high-speed lookup
with the cost of using many external memory chips.
Pipelining also often leads to poor memory
load-balancing. In this paper, we propose a new IP
route lookup architecture called FlashTrie that
overcomes the shortcomings of the multibit-trie-based
approaches. We use a hash-based membership query to
limit off-chip memory accesses per lookup and to
balance memory utilization among the memory modules. By
compacting the data structure size, the lookup depth of
each level can be increased. We also develop a new data
structure called Prefix-Compressed Trie that reduces
the size of a bitmap by more than 80\%. Our simulation
and implementation results show that FlashTrie can
achieve 80-Gb/s worst-case throughput while
simultaneously supporting 2 M prefixes for IPv4 and 318
k prefixes for IPv6 with one lookup engine and two
Double-Data-Rate (DDR3) SDRAM chips. When implementing
five lookup engines on a state-of-the-art field
programmable gate array (FPGA) chip and using 10 DDR3
memory chips, we expect FlashTrie to achieve 1-Gpps
(packet per second) throughput, equivalent to 400 Gb/s
for IPv4 and 600 Gb/s for IPv6. FlashTrie also supports
incremental real-time updates.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kai:2012:ABP,
author = "Cai Hong Kai and Soung Chang Liew",
title = "Applications of belief propagation in {CSMA} wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1276--1289",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2177994",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "``Belief propagation'' (BP) is an efficient way to
solve ``inference'' problems in graphical models, such
as Bayesian networks and Markov random fields. It has
found great success in many application areas due to
its simplicity, high accuracy, and distributed nature.
This paper is a first attempt to apply BP algorithms in
CSMA wireless networks. Compared to prior CSMA
optimization algorithms such as ACSMA, which are
measurement-based, BP-based algorithms are proactive
and computational, without the need for network probing
and traffic measurement. Consequently, BP-based
algorithms are not affected by the temporal throughput
fluctuations and can converge faster. Specifically,
this paper explores three applications of BP. (1) We
show how BP can be used to compute the throughputs of
different links in the network given their access
intensities, defined as the mean packet transmission
time divided by the mean backoff countdown time. (2) We
propose an inverse-BP algorithm to solve the reverse
problem of how to set the access intensities of
different links to meet their target throughputs. (3)
We introduce a BP-adaptive CSMA algorithm to find the
link access intensities that can achieve optimal system
utility. The first two applications are NP-hard
problems, and BP provides good approximations to them.
The advantage of BP is that it can converge faster
compared to prior algorithms like ACSMA, especially in
CSMA networks with temporal throughput fluctuations.
Furthermore, this paper goes beyond BP and considers a
generalized version of it, GBP, to improve accuracy in
networks with a loopy contention graph. The distributed
implementation of GBP is nontrivial to construct. A
contribution of this paper is to show that a ``maximal
clique'' method of forming regions in GBP: (1) yields
accurate results; and (2) is amenable to distributed
implementation in CSMA networks, with messages passed
between one-hop neighbors only. We show that both BP
and GBP algorithms for all three applications can yield
solutions within seconds in real operation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Miao:2012:CAD,
author = "Guowang Miao and Ye Li and Ananthram Swami",
title = "Channel-aware distributed medium access control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1290--1303",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2177473",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we solve a fundamental problem: how to
use distributed random access to achieve the
performance of centralized schedulers. We consider
wireless networks with arbitrary topologies and spatial
traffic distributions, where users can receive traffic
from or send traffic to different users and different
communication links may interfere with each other. The
channels are assumed heterogeneous, and the random
channel gains of different links may have different
distributions. To resolve the network contention in a
distributed way, each frame is divided into contention
and transmission periods. The contention period is used
to resolve conflicts, while the transmission period is
used to send payload in collision-free scenarios. We
design a multistage channel-aware Aloha scheme for the
contention period to enable users with relatively
better channel states to have higher probabilities of
contention success while assuring fairness among all
users. We show analytically that the proposed scheme
completely resolves network contention and achieves
throughput close to that of centralized schedulers.
Furthermore, the proposed scheme is robust to any
uncertainty in channel estimation. Simulation results
demonstrate that it significantly improves network
performance while maintaining fairness among different
users. The proposed random access approach can be
applied to different wireless networks, such as
cellular, sensor, and mobile ad hoc networks, to
improve quality of service.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:CBT,
author = "Pan Li and Miao Pan and Yuguang Fang",
title = "Capacity bounds of three-dimensional wireless ad hoc
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1304--1315",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178123",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network capacity investigation has been intensive in
the past few years. A large body of work on wireless
network capacity has appeared in the literature.
However, so far most of the effort has been made on
two-dimensional (2-D) wireless networks only. With the
great development of wireless technologies, wireless
networks are envisioned to extend from 2-D space to
three-dimensional (3-D) space. In this paper, we
investigate the throughput capacity of 3-D regular ad
hoc networks (RANETs) and of 3-D nonhomogeneous ad hoc
networks (NANETs), respectively, by employing a
generalized physical model. In 3-D RANETs, we assume
that the nodes are regularly placed, while in 3-D
NANETs, we consider that the nodes are distributed
according to a general Nonhomogeneous Poisson Process
(NPP). We find both lower and upper bounds in both
types of networks in a broad power propagation regime,
i.e., when the path loss exponent is no less than 2.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Le:2012:OCW,
author = "Long Bao Le and Eytan Modiano and Ness B. Shroff",
title = "Optimal control of wireless networks with finite
buffers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "4",
pages = "1316--1329",
month = aug,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2176140",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Oct 22 08:33:08 MDT 2012",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper considers network control for wireless
networks with finite buffers. We investigate the
performance of joint flow control, routing, and
scheduling algorithms that achieve high network utility
and deterministically bounded backlogs inside the
network. Our algorithms guarantee that buffers inside
the network never overflow. We study the tradeoff
between buffer size and network utility and show that
under the one-hop interference model, if internal
buffers have size, $ (N - 1) / 2 \epsilon $ then $
\epsilon $-optimal network utility can be achieved,
where $ \epsilon $ is a control parameter $N$ and is
the number of network nodes. The underlying
scheduling/routing component of the considered control
algorithms requires ingress queue length information
(IQI) at all network nodes. However, we show that these
algorithms can achieve the same utility performance
with delayed ingress queue length information at the
cost of a larger average backlog bound. We also show
how to extend the results to other interference models
and to wireless networks with time-varying link
quality. Numerical results reveal that the considered
algorithms achieve nearly optimal network utility with
a significant reduction in queue backlog compared to
existing algorithms in the literature.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kokku:2012:NSV,
author = "Ravi Kokku and Rajesh Mahindra and Honghai Zhang and
Sampath Rangarajan",
title = "{NVS}: a substrate for virtualizing wireless resources
in cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1333--1346",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2179063",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper describes the design and implementation of
a network virtualization substrate (NVS) for effective
virtualization of wireless resources in cellular
networks. Virtualization fosters the realization of
several interesting deployment scenarios such as
customized virtual networks, virtual services, and
wide-area corporate networks, with diverse performance
objectives. In virtualizing a base station's uplink and
downlink resources into slices, NVS meets three key
requirements --- isolation, customization, and
efficient resource utilization --- using two novel
features: (1) NVS introduces a provably optimal slice
scheduler that allows existence of slices with
bandwidth-based and resource-based reservations
simultaneously; and (2) NVS includes a generic
framework for efficiently enabling customized flow
scheduling within the base station on a per-slice
basis. Through a prototype implementation and detailed
evaluation on a WiMAX testbed, we demonstrate the
efficacy of NVS. For instance, we show for both
downlink and uplink directions that NVS can run
different flow schedulers in different slices, run
different slices simultaneously with different types of
reservations, and perform slice-specific application
optimizations for providing customized services.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khouzani:2012:MDM,
author = "M. H. R. Khouzani and Saswati Sarkar and Eitan
Altman",
title = "Maximum damage malware attack in mobile wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1347--1360",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2183642",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Malware attacks constitute a serious security risk
that threatens to slow down the large-scale
proliferation of wireless applications. As a first step
toward thwarting this security threat, we seek to
quantify the maximum damage inflicted on the system due
to such outbreaks and identify the most vicious
attacks. We represent the propagation of malware in a
battery-constrained mobile wireless network by an
epidemic model in which the worm can dynamically
control the rate at which it kills the infected node
and also the transmission ranges and/or the media
scanning rates. At each moment of time, the worm at
each node faces the following tradeoffs: (1) using
larger transmission ranges and media scanning rates to
accelerate its spread at the cost of exhausting the
battery and thereby reducing the overall infection
propagation rate in the long run; or (2) killing the
node to inflict a large cost on the network, however at
the expense of losing the chance of infecting more
susceptible nodes at later times. We mathematically
formulate the decision problems and utilize Pontryagin
Maximum Principle from optimal control theory to
quantify the damage that the malware can inflict on the
network by deploying optimum decision rules. Next, we
establish structural properties of the optimal strategy
of the attacker over time. Specifically, we prove that
it is optimal for the attacker to defer killing of the
infective nodes in the propagation phase until reaching
a certain time and then start the slaughter with
maximum effort. We also show that in the optimal attack
policy, the battery resources are used according to a
decreasing function of time, i.e., most aggressively
during the initial phase of the outbreak. Finally, our
numerical investigations reveal a framework for
identifying intelligent defense strategies that can
limit the damage by appropriately selecting network
parameters.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sherman:2012:FDB,
author = "Alex Sherman and Jason Nieh and Clifford Stein",
title = "{FairTorrent}: a deficit-based distributed algorithm
to ensure fairness in peer-to-peer systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1361--1374",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2185058",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer file-sharing applications suffer from a
fundamental problem of unfairness. Free-riders cause
slower download times for others by contributing little
or no upload bandwidth while consuming much download
bandwidth. Previous attempts to address this fair
bandwidth allocation problem suffer from slow peer
discovery, inaccurate predictions of neighboring peers'
bandwidth allocations, underutilization of bandwidth,
and complex parameter tuning. We present FairTorrent, a
new deficit-based distributed algorithm that accurately
rewards peers in accordance with their contribution. A
FairTorrent peer simply uploads the next data block to
a peer to whom it owes the most data as measured by a
deficit counter. FairTorrent is resilient to
exploitation by free-riders and strategic peers, is
simple to implement, requires no bandwidth
overallocation, no prediction of peers' rates, no
centralized control, and no parameter tuning. We
implemented FairTorrent in a BitTorrent client without
modifications to the BitTorrent protocol and evaluated
its performance against other widely used BitTorrent
clients. Our results show that FairTorrent provides up
to two orders of magnitude better fairness, up to five
times better download times for contributing peers, and
60\%-100\% better performance on average in live
BitTorrent swarms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koutsonikolas:2012:PHT,
author = "Dimitrios Koutsonikolas and Y. Charlie Hu and
Chih-Chun Wang",
title = "Pacifier: high-throughput, reliable multicast without
{``Crying} babies'' in wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1375--1388",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2177274",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In contrast to unicast routing, high-throughput
reliable multicast routing in wireless mesh networks
(WMNs) has received little attention. There are two
primary challenges to supporting high-throughput,
reliable multicast in WMNs. The first is no different
from unicast: Wireless links are inherently lossy due
to varying channel conditions and interference. The
second, known as the ``crying baby'' problem, is unique
to multicast: The multicast source may have varying
throughput to different multicast receivers, and hence
trying to satisfy the reliability requirement for
poorly connected receivers can potentially result in
performance degradation for the rest of the receivers.
In this paper, we propose Pacifier, a new
high-throughput, reliable multicast protocol for WMNs.
Pacifier seamlessly integrates four building blocks ---
namely, tree-based opportunistic routing, intraflow
network coding, source rate limiting, and round-robin
batching --- to support high-throughput, reliable
multicast routing in WMNs, while at the same time it
effectively addresses the ``crying baby'' problem. Our
experiments on a 22-node IEEE 802.11 WMN testbed show
that Pacifier increases the average throughput over a
state-of-the-art reliable network coding-based protocol
MORE by up to 144\%, while at the same time it solves
the ``crying baby'' problem by improving the throughput
of well-connected receivers by up to a factor of 14.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2012:BAN,
author = "Wei Chen and Khaled B. Letaief and Zhigang Cao",
title = "Buffer-aware network coding for wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1389--1401",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2176958",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network coding, which can combine various traffic
flows or packets via algebraic operations, has the
potential of achieving substantial throughput and power
efficiency gains in wireless networks. As such, it is
considered as a powerful solution to meet the stringent
demands and requirements of next-generation wireless
systems. However, because of the random and
asynchronous packet arrivals, network coding may result
in severe delay and packet loss because packets need to
wait to be network-coded with each others. To overcome
this and guarantee quality of service (QoS), we present
a novel cross-layer approach, which we shall refer to
as Buffer-Aware Network Coding, or BANC, which allows
transmission of some packets without network coding to
reduce the packet delay. We shall derive the average
delay and power consumption of BANC by presenting a
random mapping description of BANC and Markov models of
buffer states. A cross-layer optimization problem that
minimizes the average delay under a given power
constraint is then proposed and analyzed. Its solution
will not only demonstrate the fundamental performance
limits of BANC in terms of the achievable delay region
and delay-power tradeoff, but also obtains the
delay-optimal BANC schemes. Simulation results will
show that the proposed approach can strike the optimal
tradeoff between power efficiency and QoS.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qin:2012:SST,
author = "Yang Qin and Lie-Liang Yang",
title = "Steady-state throughput analysis of network coding
nodes employing stop-and-wait automatic repeat
request",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1402--1411",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178860",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper analyzes the steady-state throughput of
network coding nodes when data is transmitted based on
the stop-and-wait automatic repeat request (SW-ARQ)
scheme. The state transition of network coding nodes
employing SW-ARQ is analyzed, which shows that the
operations of network coding nodes can be modeled by a
finite state machine. Therefore, the throughput
expressions of network coding nodes can be derived
based on the properties of finite state machines.
Furthermore, the throughput performance of network
coding nodes is investigated either by simulations or
by evaluation of the expressions obtained. It can be
shown that the simulation results converge closely to
the numerical results and justify the effectiveness of
our analytical expressions obtained.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:MPA,
author = "Yongkun Li and Bridge Qiao Zhao and John C. S. Lui",
title = "On modeling product advertisement in large-scale
online social networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1412--1425",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2178078",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the following advertisement problem in
online social networks (OSNs). Given a fixed
advertisement investment, e.g., a number of free
samples that can be given away to a small number of
users, a company needs to determine the probability
that users in the OSN will eventually purchase the
product. In this paper, we model OSNs as scale-free
graphs (either with or without high clustering
coefficient). We employ various influence mechanisms
that govern the influence spreading in such large-scale
OSNs and use the local mean field (LMF) technique to
analyze these online social networks wherein states of
nodes can be changed by various influence mechanisms.
We extend our model for advertising with multiple
rating levels. Extensive simulations are carried out to
validate our models, which can provide insight on
designing efficient advertising strategies in online
social networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Guo:2012:EPL,
author = "Danhua Guo and Laxmi Narayan Bhuyan and Bin Liu",
title = "An efficient parallelized {L7-filter} design for
multicore servers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1426--1439",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2177858",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "L7-filter is a significant deep packet inspection
(DPI) extension to Netfilter in Linux's QoS framework.
It classifies network traffic based on information
hidden in the packet payload. Although the
computationally intensive payload classification can be
accelerated with multiple processors, the default OS
scheduler is oblivious to both the software
characteristics and the underlying multicore
architecture. In this paper, we present a parallelized
L7-filter algorithm and an efficient scheduler
technique for multicore servers. Our multithreaded
L7-filter algorithm can process the incoming packets on
multiple servers boosting the throughput tremendously.
Our scheduling algorithm is based on Highest Random
Weight (HRW), which maintains the connection locality
for the incoming traffic, but only guarantees load
balance at the connection level. We present an Adapted
Highest Random Weight (AHRW) algorithm that enhances
HRW by applying packet-level load balancing with an
additional feedback vector corresponding to the queue
length at each processor. We further introduce a
Hierarchical AHRW (AHRW-tree) algorithm that considers
characteristics of the multicore architecture such as
cache and hardware topology by developing a hash tree
architecture. The algorithm reduces the scheduling
overhead to $ O(\log N) $ instead of $ O(N) $ and
produces a better balance between locality and load
balancing. Results show that the AHRW-tree scheduler
can improve the L7-filter throughput by about 50\% on a
Sun-Niagara-2-based server compared to a connection
locality-based scheduler. Although extensively tested
for L7-filter traces, our technique is applicable to
many other packet processing applications, where
connection locality and load balancing are important
while executing on multiple processors. With these
speedups and inherent software flexibility, our design
and implementation provide a cost-effective alternative
to the traffic monitoring and filtering ASICs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zafer:2012:LGS,
author = "Murtaza Zafer and Dakshi Agrawal and Mudhakar
Srivatsa",
title = "Limitations of generating a secret key using wireless
fading under active adversary",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1440--1451",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2183146",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, many research studies have explored the use
of wireless fading to generate an information-theoretic
shared secret key over an open wireless channel. While
this line of research is now mature enough to be built
into demonstrative working systems for scenarios
involving a (limited) passive/eavesdropping adversary
model, the case of an active (jamming) adversary has
not been sufficiently studied. Under an active
adversary, information-bits that need to be exchanged
during the process of key setup will not only be
subject to eavesdropping, but also message disruptions
that could lead to a high communication cost per bit of
secret key generated. Measuring efficiency of key
exchange as the ratio of communication cost to the size
of secret key generated, in this paper, we address the
following question: Is generating a secret key by
exploiting wireless fading an efficient process? We
obtain analytical results that quantify the minimum
number of information-bits that must be exchanged to
obtain one bit of shared secret key and show that this
number rapidly increases with an active adversary's
signal power. Thus, through our analysis, we conclude
that the effectiveness of generating a secret key from
wireless fading is limited when considering active
adversaries.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Camp:2012:CFU,
author = "Joseph Camp and Ehsan Aryafar and Edward Knightly",
title = "Coupled 802.11 flows in urban channels: model and
experimental evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1452--1465",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2181863",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Contending flows in multihop 802.11 wireless networks
compete with two fundamental asymmetries: (1) channel
asymmetry, in which one flow has a stronger signal,
potentially yielding physical layer capture; and (2)
topological asymmetry, in which one flow has increased
channel state information, potentially yielding an
advantage in winning access to the channel. Prior work
has considered these asymmetries independently with a
highly simplified view of the other. However, in this
paper, we perform thousands of measurements on coupled
flows in urban environments and build a simple yet
accurate model that jointly considers information and
channel asymmetries. We show that if these two
asymmetries are not considered jointly, throughput
predictions of even two coupled flows are vastly
distorted from reality when traffic characteristics are
only slightly altered (e.g., changes to modulation
rate, packet size, or access mechanism). These
performance modes are sensitive not only to small
changes in system properties, but also small-scale link
fluctuations that are common in an urban mesh network.
We analyze all possible capture relationships for
two-flow subtopologies and show that capture of the
reverse traffic can allow a previously starving flow to
compete fairly. Finally, we show how to extend and
apply the model in domains such as modulation rate
adaptation and understanding the interaction of control
and data traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gai:2012:CNO,
author = "Yi Gai and Bhaskar Krishnamachari and Rahul Jain",
title = "Combinatorial network optimization with unknown
variables: multi-armed bandits with linear rewards and
individual observations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1466--1478",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2181864",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We formulate the following combinatorial multiarmed
bandit (MAB) problem: There are $N$ random variables
with unknown mean that are each instantiated in an
i.i.d. fashion over time. At each time multiple random
variables can be selected, subject to an arbitrary
constraint on weights associated with the selected
variables. All of the selected individual random
variables are observed at that time, and a linearly
weighted combination of these selected variables is
yielded as the reward. The goal is to find a policy
that minimizes regret, defined as the difference
between the reward obtained by a genie that knows the
mean of each random variable, and that obtained by the
given policy. This formulation is broadly applicable
and useful for stochastic online versions of many
interesting tasks in networks that can be formulated as
tractable combinatorial optimization problems with
linear objective functions, such as maximum weighted
matching, shortest path, and minimum spanning tree
computations. Prior work on multi-armed bandits with
multiple plays cannot be applied to this formulation
because of the general nature of the constraint. On the
other hand, the mapping of all feasible combinations to
arms allows for the use of prior work on MAB with
single-play, but results in regret, storage, and
computation growing exponentially in the number of
unknown variables. We present new efficient policies
for this problem that are shown to achieve regret that
grows logarithmically with time, and polynomially in
the number of unknown variables. Furthermore, these
policies only require storage that grows linearly in
the number of unknown parameters. For problems where
the underlying deterministic problem is tractable,
these policies further require only polynomial
computation. For computationally intractable problems,
we also present results on a different notion of regret
that is suitable when a polynomial-time approximation
algorithm is used.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Traskov:2012:SNC,
author = "Danail Traskov and Michael Heindlmaier and Muriel
M{\'e}dard and Ralf Koetter",
title = "Scheduling for network-coded multicast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1479--1488",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2180736",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider multicasting using random linear network
coding over a multihop wireless network in the
bandwidth limited regime. We address the associated
medium access problem and propose a scheduling
technique that activates hyperarcs rather than links,
as in classical scheduling approaches. We encapsulate
the constraints on valid network configurations in a
conflict graph model and formulate a joint optimization
problem taking into account both the network coding
subgraph and the schedule. Next, using Lagrangian
relaxation, we decompose the overall problem into two
subproblems, a multiple-shortest-paths problem and a
maximum weighted stable set (MWSS) problem. We show
that if we use a greedy heuristic for the MWSS part of
the problem, the overall algorithm is completely
distributed. We provide extensive simulation results
for both the centralized optimal and the decentralized
algorithms. The optimal algorithm improves performance
by up to a factor of two over widely used techniques
such as orthogonal or two-hop-constrained scheduling.
The decentralized algorithm is shown to buy its
distributed operation with some throughput losses.
Experimental results on randomly generated networks
suggest that these losses are not large. Finally, we
study the power consumption of our scheme and quantify
the tradeoff between power and bandwidth efficiency.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Song:2012:ETB,
author = "Haoyu Song and Murali Kodialam and Fang Hao and T. V.
Lakshman",
title = "Efficient trie braiding in scalable virtual routers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1489--1500",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2181412",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many popular algorithms for fast packet forwarding and
filtering rely on the tree data structure. Examples are
the trie-based IP lookup and packet classification
algorithms. With the recent interest in network
virtualization, the ability to run multiple virtual
router instances on a common physical router platform
is essential. An important scaling issue is the number
of virtual router instances that can run on the
platform. One limiting factor is the amount of
high-speed memory and caches available for storing the
packet forwarding and filtering data structures. An
ideal goal is to achieve good scaling while maintaining
total isolation among the virtual routers. However,
total isolation requires maintaining separate data
structures in high-speed memory for each virtual
router. In this paper, we study the case where some
sharing of the forwarding and filtering data structures
is permissible and develop algorithms for combining
tries used for IP lookup and packet classification.
Specifically, we develop a mechanism called trie
braiding that allows us to combine tries from the data
structures of different virtual routers into just one
compact trie. Two optimal braiding algorithms and a
faster heuristic algorithm are presented, and the
effectiveness is demonstrated using the real-world data
sets.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2012:CSG,
author = "Wentao Huang and Xinbing Wang",
title = "Capacity scaling of general cognitive networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1501--1513",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2180400",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There has been recent interest within the networking
research community to understand how performance scales
in cognitive networks with overlapping $n$ primary
nodes and $m$ secondary nodes. Two important metrics,
i.e., throughput and delay, are studied in this paper.
We first propose a simple and extendable decision
model, i.e., the hybrid protocol model, for the
secondary nodes to exploit spatial gap among primary
transmissions for frequency reuse. Then, a framework
for general cognitive networks is established based on
the hybrid protocol model to analyze the occurrence of
transmission opportunities for secondary nodes. We show
that if the primary network operates in a generalized
TDMA fashion, or employs a routing scheme such that
traffic flows choose relays independently, then the
hybrid protocol model suffices to guide the secondary
network to achieve the same throughput and delay
scaling as a standalone network without harming the
performance of the primary network, as long as the
secondary transmission range is smaller than the
primary range in order. Our approach is general in the
sense that we only make a few weak assumptions on both
networks, and therefore it obtains a wide variety of
results. We show secondary networks can obtain the same
order of throughput and delay as standalone networks
when primary networks are classic static networks,
networks with random walk mobility, hybrid networks,
multicast networks, CSMA networks, networks with
general mobility, or clustered networks. Our work
presents a relatively complete picture of the
performance scaling of cognitive networks and provides
fundamental insight on the design of them.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aezladen:2012:ELB,
author = "Mhameed Aezladen and Reuven Cohen and Danny Raz",
title = "Efficient location-based decision-supporting content
distribution to mobile groups",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1514--1526",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2182057",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper deals with efficient location-based
decision-supporting content distribution to mobile
groups. We consider the case where a set of information
dissemination devices (IDDs) broadcast a limited amount
of location-based information to passing mobile nodes
that are moving along well-defined paths. We develop a
novel model that captures the main aspects of the
problem and define a new optimization problem we call
Maximum Benefit Message Assignment Problem (MBMAP). We
study several variants of this problem in the case
where the IDDs are cooperative and in the case where
they are not. We develop new approximation algorithms
for these variants and then focus on the practical
effects of using them in realistic networking
scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Saleh:2012:AAM,
author = "Mohammad A. Saleh and Ahmed E. Kamal",
title = "Approximation algorithms for many-to-many traffic
grooming in optical {WDM} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1527--1540",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2183005",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A large number of network applications today allow
several users to interact together using the
many-to-many service mode. In many-to-many
communication, also referred to as group communication,
a session consists of a group of users (we refer to
them as members), where each member transmits its
traffic to all other members in the same group. In this
paper, we address the problem of grooming subwavelength
many-to-many traffic (e.g., OC-3) into high-bandwidth
wavelength channels (e.g., OC-192) in optical
wavelength division multiplexing (WDM) mesh networks.
The cost of an optical WDM network is dominated by the
cost of higher-layer electronic ports (i.e.,
transceivers). A transceiver is needed for each
initiation and termination of a lightpath. Therefore,
our objective is to minimize the total number of
lightpaths established. Unfortunately, the grooming
problem even with unicast traffic has been shown to be
NP-hard. In this paper, we introduce two novel
approximation algorithms for the many-to-many traffic
grooming problem. We also consider the routing and
wavelength assignment problem with the objective of
minimizing the number of wavelengths used. Through
extensive experiments, we show that the proposed
algorithms use a number of lightpaths that is very
close to that of a derived lower bound. Also, we
compare the two algorithms on other important
objectives such as the number of logical hops traversed
by a traffic stream, total amount of electronic
switching at a node, and Min-Max objectives.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tekin:2012:ACG,
author = "Cem Tekin and Mingyan Liu and Richard Southwell and
Jianwei Huang and Sahand Haji Ali Ahmad",
title = "Atomic congestion games on graphs and their
applications in networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1541--1552",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2182779",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we introduce and analyze the properties
of a class of games, the atomic congestion games on
graphs (ACGGs), which is a generalization of the
classical congestion games. In particular, an ACGG
captures the spatial information that is often ignored
in a classical congestion game. This is useful in many
networking problems, e.g., wireless networks where
interference among the users heavily depends on the
spatial information. In an ACGG, a player's payoff for
using a resource is a function of the number of players
who interact with it and use the same resource. Such
spatial information can be captured by a graph. We
study fundamental properties of the ACGGs: under what
conditions these games possess a pure strategy Nash
equilibrium (PNE), or the finite improvement property
(FIP), which is sufficient for the existence of a PNE.
We show that a PNE may not exist in general, but that
it does exist in many important special cases including
tree, loop, or regular bipartite networks. The FIP
holds for important special cases including systems
with two resources or identical payoff functions for
each resource. Finally, we present two wireless network
applications of ACGGs: power control and channel
contention under IEEE 802.11.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gao:2012:SAM,
author = "Wei Gao and Qinghua Li and Bo Zhao and Guohong Cao",
title = "Social-aware multicast in disruption-tolerant
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1553--1566",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2183643",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Node mobility and end-to-end disconnections in
disruption-tolerant networks (DTNs) greatly impair the
effectiveness of data forwarding. Although social-based
approaches can address the problem, most existing
solutions only focus on forwarding data to a single
destination. In this paper, we study multicast with
single and multiple data items in DTNs from a social
network perspective, develop analytical models for
multicast relay selection, and furthermore investigate
the essential difference between multicast and unicast
in DTNs. The proposed approach selects relays according
to their capabilities, measured by social-based
metrics, for forwarding data to the destinations. The
design of social-based metrics exploits social network
concepts such as node centrality and social community,
and the selected relays ensure achieving the required
data delivery ratio within the given time constraint.
Extensive trace-driven simulations show that the
proposed approach has similar data delivery ratio and
delay to that of Epidemic routing, but significantly
reduces data forwarding cost, measured by the number of
relays used.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aparicio-Pardo:2012:NRV,
author = "Ramon Aparicio-Pardo and Nina Skorin-Kapov and Pablo
Pavon-Marino and Belen Garcia-Manrubia",
title = "{(Non-)reconfigurable} virtual topology design under
multihour traffic in optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1567--1580",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2184300",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates offline virtual topology
design in transparent optical networks under a
multihour traffic demand. The main problem variant
addressed here designs a reconfigurable virtual
topology that evolves over time to more efficiently
utilize network resources (the MH-VTD-R problem). The
case of designing a static non-reconfigurable virtual
topology that can accommodate the time-varying traffic
(the MH-VTD-NR problem) is also considered. The
objectives are to minimize: (1) the number of
transceivers, which make up for the main network cost;
and (2) the frequency of reconfiguration (for
MH-VTD-R), which incurs additional overhead and
potential service disruption. We formulate this
multiobjective problem as an exact mixed integer linear
program (MILP). Due to its high complexity, we propose
a very efficient heuristic algorithm called Greedy
Approach with Reconfiguration Flattening (GARF). GARF
not only solves both (non-)reconfigurable problem
variants, but it allows for tuning of the relative
importance of the two objectives. Exhaustive
experiments on real and synthetic traffic and
comparison to previous proposals and bounds reveal the
merits of GARF with respect to both solution quality
and execution time. Furthermore, the obtained results
indicate that the maximal transceiver cost savings
achieved by the fully reconfigurable case may not be
enough to justify the associated increase in
reconfiguration cost. However, results show that an
advantageous tradeoff between transceiver cost savings
and reconfiguration cost can be achieved by a allowing
a small number of virtual topology reconfigurations
over time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Phan:2012:NOD,
author = "Khoa Tran Phan and Jaeok Park and Mihaela {Van Der
Schaar}",
title = "Near-optimal deviation-proof medium access control
designs in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1581--1594",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2011.2182359",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed medium access control (MAC) protocols are
essential for the proliferation of low-cost,
decentralized wireless local area networks (WLANs).
Most MAC protocols are designed with the presumption
that nodes comply with prescribed rules. However,
selfish nodes have natural motives to manipulate
protocols in order to improve their own performance.
This often degrades the performance of other nodes as
well as that of the overall system. In this paper, we
propose a class of protocols that limit the performance
gain from selfish manipulation while incurring only a
small efficiency loss. The proposed protocols are based
on the idea of a review strategy, with which nodes
collect signals about the actions of other nodes over a
period of time, use a statistical test to infer whether
or not other nodes are following the prescribed
behavior, and trigger a punishment if a deviation is
inferred. We consider the cases of private and public
signals and provide analytical and numerical results to
demonstrate the properties of the proposed protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2012:WMS,
author = "Honghai Zhang and Yuanxi Jiang and Karthik Sundaresan
and Sampath Rangarajan and Baohua Zhao",
title = "Wireless multicast scheduling with switched
beamforming antennas",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1595--1607",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191977",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Using beamforming antennas to improve wireless
multicast transmissions has received considerable
attention recently. A recent work proposes to partition
all single-lobe beams into groups and to form composite
multilobe beam patterns to transmit multicast traffic.
Depending on how the power is split among the
individual beams constituting a composite beam pattern,
two power models are considered: (1) equal power split
(EQP), and (2) asymmetric power split (ASP). This paper
revisits the key challenge --- beam partitioning in the
beamforming-multicast problem --- and makes significant
progress in both algorithmic and analytic aspects of
the problem. Under EQP, we propose a low-complexity
optimal algorithm based on dynamic programming. Under
ASP, we prove that it is NP-hard to have $ (3 / 2 -
\epsilon)$-approximation algorithm for any $ \epsilon >
0$. For discrete rate functions under ASP, we develop
an Asymptotic Polynomial-Time Approximation Scheme
(APTAS), an asymptotic $ (3 / 2 + \beta)$-approximation
solution (where $ \beta \geq 0$ depends on the wireless
technology), and an asymptotic 2-approximation solution
to the problem by relating the problem to a generalized
version of the bin-packing problem. In retrospect, we
also obtain an asymptotic 2-approximation solution for
the generalized bin-packing problem, which is of
independent interest. For continuous rate functions
under ASP, we develop sufficient conditions under which
the optimal number of composite beams is $1$, {$K$},
and arbitrary, respectively, where {$K$} is the total
number of single-lobe beams. Both experimental results
and simulations based on real-world channel
measurements corroborate our analytical results by
showing significant improvement compared to
state-of-the-art algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bodas:2012:LCS,
author = "Shreeshankar Bodas and Sanjay Shakkottai and Lei Ying
and R. Srikant",
title = "Low-complexity scheduling algorithms for multichannel
downlink wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1608--1621",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2185709",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper considers the problem of designing
scheduling algorithms for multichannel (e.g.,
OFDM-based) wireless downlink networks, with a large
number of users and proportionally large bandwidth. For
this system, while the classical MaxWeight algorithm is
known to be throughput-optimal, its buffer-overflow
performance is very poor (formally, it is shown that it
has zero rate function in our setting). To address
this, a class of algorithms called iterated Heaviest
matching with Longest Queues First (iHLQF) is proposed.
The algorithms in this class are shown to be
throughput-optimal for a general class of arrival\slash
channel processes, and also rate-function-optimal
(i.e., exponentially small buffer overflow probability)
for certain arrival\slash channel processes. iHLQF,
however, has higher complexity than MaxWeight ($ n^4 $
versus $ n^2 $, respectively). To overcome this issue,
a new algorithm called Server-Side Greedy (SSG) is
proposed. It is shown that SSG is throughput-optimal,
results in a much better per-user buffer overflow
performance than the MaxWeight algorithm (positive rate
function for certain arrival\slash channel processes),
and has a computational complexity ($ n^2$) that is
comparable to the MaxWeight algorithm. Thus, it
provides a nice tradeoff between buffer-overflow
performance and computational complexity. These results
are validated by both analysis and simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:PFT,
author = "Tao Li and Shigang Chen and Yibei Ling",
title = "Per-flow traffic measurement through randomized
counter sharing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1622--1634",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2192447",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic measurement provides critical real-world data
for service providers and network administrators to
perform capacity planning, accounting and billing,
anomaly detection, and service provision. One of the
greatest challenges in designing an online measurement
module is to minimize the per-packet processing time in
order to keep up with the line speed of the modern
routers. To meet this challenge, we should minimize the
number of memory accesses per packet and implement the
measurement module in the on-die SRAM. The small size
of SRAM requires extremely compact data structures to
be designed for storing per-flow information. The best
existing work, called counter braids, requires more
than 4 bits per flow and performs six or more memory
accesses per packet. In this paper, we design a fast
and compact measurement function that estimates the
sizes of all flows. It achieves the optimal processing
speed: two memory accesses per packet. In addition, it
provides reasonable measurement accuracy in a tight
space where the counter braids no longer work. Our
design is based on a new data encoding/decoding scheme,
called randomized counter sharing. This scheme allows
us to mix per-flow information together in storage for
compactness and, at the decoding time, separate the
information of each flow through statistical removal of
the error introduced during information mixing from
other flows. The effectiveness of our online per-flow
measurement approach is analyzed and confirmed through
extensive experiments based on real network traffic
traces. We also propose several methods to increase the
estimation range of flow sizes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Magistretti:2012:MDM,
author = "Eugenio Magistretti and Omer Gurewitz and Edward W.
Knightly",
title = "Measurement-driven modeling of transmission
coordination for 802.11 online",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1635--1648",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2192482",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In 802.11 managed wireless networks, the manager can
address underserved links by rate-limiting the
conflicting nodes. In order to determine to what extent
each conflicting node is responsible for the poor
performance, the manager needs to understand the
coordination among conflicting nodes' transmissions. In
this paper, we present a management framework called
Management, Inference, and Diagnostics using Activity
Share (MIDAS). We introduce the concept of Activity
Share, which characterizes the coordination among any
set of network nodes in terms of the time they spend
transmitting simultaneously. Unfortunately, the
Activity Share cannot be locally measured by the nodes.
Thus, MIDAS comprises an inference tool that, based on
a combined physical, protocol, and statistical
approach, infers the Activity Share by using a small
set of passively collected, time-aggregate local
channel measurements reported by the nodes. MIDAS uses
the estimated Activity Share as the input of a simple
model that predicts how limiting the transmission rate
of any conflicting node would benefit the throughput of
the underserved link. The model is based on the current
network conditions, thus representing the first
throughput model using online measurements. We
implemented our tool on real hardware and deployed it
on an indoor testbed. Our extensive validation combines
testbed experiments and simulations. The results show
that MIDAS infers the Activity Share with a mean
relative error as low as 4\% in testbed experiments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:SEE,
author = "Ruogu Li and Atilla Eryilmaz",
title = "Scheduling for end-to-end deadline-constrained traffic
with reliability requirements in multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1649--1662",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186978",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We attack the challenging problem of designing a
scheduling policy for end-to-end deadline-constrained
traffic with reliability requirements in a multihop
network. It is well known that the end-to-end delay
performance for a multihop flow has a complex
dependence on the high-order statistics of the arrival
process and the algorithm itself. Thus, neither the
earlier optimization-based approaches that aim to meet
the long-term throughput demands nor the solutions that
focus on a similar problem for single-hop flows
directly apply. Moreover, a dynamic programming-based
approach becomes intractable for such multi-timescale
quality-of-service (QoS)-constrained traffic in a
multihop environment. This motivates us in this paper
to develop a useful architecture that enables us to
exploit the degree of freedom in choosing appropriate
service discipline. Based on the new architecture, we
propose three different approaches, each leading to an
original algorithm. We study the performance of these
algorithms in different scenarios to show both
optimality characteristics and to demonstrate the
favorable service discipline characteristics they
possess. We provide extensive numerical results to
compare the performance of all of these solutions to
throughput-optimal back-pressure-type schedulers and to
longest waiting-time-based schedulers that have
provably optimal asymptotic performance
characteristics. Our results reveal that the dynamic
choice of service discipline of our proposed solutions
yields substantial performance improvements compared to
both of these types of traditional solutions under
nonasymptotic conditions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yadav:2012:DAG,
author = "Sandeep Yadav and Ashwath Kumar Krishna Reddy and A.
L. Narasimha Reddy and Supranamaya Ranjan",
title = "Detecting algorithmically generated domain-flux
attacks with {DNS} traffic analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "5",
pages = "1663--1677",
month = oct,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2184552",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:36 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent botnets such as Conficker, Kraken, and Torpig
have used DNS-based ``domain fluxing'' for
command-and-control, where each Bot queries for
existence of a series of domain names and the owner has
to register only one such domain name. In this paper,
we develop a methodology to detect such ``domain
fluxes'' in DNS traffic by looking for patterns
inherent to domain names that are generated
algorithmically, in contrast to those generated by
humans. In particular, we look at distribution of
alphanumeric characters as well as bigrams in all
domains that are mapped to the same set of IP
addresses. We present and compare the performance of
several distance metrics, including K-L distance, Edit
distance, and Jaccard measure. We train by using a good
dataset of domains obtained via a crawl of domains
mapped to all IPv4 address space and modeling bad
datasets based on behaviors seen so far and expected.
We also apply our methodology to packet traces
collected at a Tier-1 ISP and show we can automatically
detect domain fluxing as used by Conficker botnet with
minimal false positives, in addition to discovering a
new botnet within the ISP trace. We also analyze a
campus DNS trace to detect another unknown botnet
exhibiting advanced domain-name generation technique.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2012:UMP,
author = "Minghua Chen and Miroslav Ponec and Sudipta Sengupta
and Jin Li and Philip A. Chou",
title = "Utility maximization in peer-to-peer systems with
applications to video conferencing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1681--1694",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2201166",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the problem of utility
maximization in peer-to-peer (P2P) systems, in which
aggregate application-specific utilities are maximized
by running distributed algorithms on P2P nodes, which
are constrained by their uplink capacities. For certain
P2P topologies, we show that routing along a linear
number of trees per source can achieve the largest rate
region that can be possibly obtained by intrasession
and intersession network coding. This observation
allows us to develop a simple multitree formulation for
the problem. For the resulting nonstrictly concave
optimization problem, we develop a Primal-dual
distributed algorithm and prove its global convergence
using our proposed sufficient conditions. These
conditions are general and add understanding to the
convergence of primal-dual algorithms under nonstrictly
concave settings. We implement the proposed distributed
algorithm in a peer-assisted multiparty conferencing
system by utilizing only end-to-end delay measurements
between P2P nodes. We demonstrate its superior
performance through actual experiments on a LAN testbed
and the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Han:2012:ABE,
author = "Bo Han and Lusheng Ji and Seungjoon Lee and Bobby
Bhattacharjee and Robert R. Miller",
title = "Are all bits equal?: experimental study of {IEEE}
802.11 communication bit errors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1695--1706",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2225842",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, practical subframe-level schemes, such as
frame combining and partial packet recovery, have been
proposed for combating wireless transmission errors.
These approaches depend heavily on the bit error
behavior of wireless data transmissions, which is
overlooked in the literature. We study the
characteristics of subframe bit errors and their
location distribution by conducting extensive
experiments on several IEEE 802.11 WLAN testbeds. Our
measurement results identify three bit error patterns:
slope-line, saw-line, and finger. Among these three
patterns, we have verified that the slope-line and
saw-line are present in different physical environments
and across various hardware platforms. However, the
finger pattern does not appear on some platforms. We
discuss our current hypotheses for the reasons behind
these bit error patterns and how identifying these
patterns may help improve the robustness of WLAN
transmissions. We believe that identifiable bit error
patterns can potentially introduce new opportunities in
channel coding, network coding, forward error
correction (FEC), and frame combining.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2012:OCA,
author = "Lu Zhang and Xueyan Tang",
title = "Optimizing client assignment for enhancing
interactivity in distributed interactive applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1707--1720",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2187674",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed interactive applications (DIAs) are
networked systems that allow multiple participants at
different locations to interact with each other. Wide
spreads of client locations in large-scale DIAs often
require geographical distribution of servers to meet
the latency requirements of the applications. In the
distributed server architecture, the network latencies
involved in the interactions between clients are
directly affected by how the clients are assigned to
the servers. In this paper, we focus on the problem of
assigning clients to appropriate servers in DIAs to
enhance their interactivity. We formulate the problem
as a combinational optimization problem and prove that
it is NP-complete. Then, we propose several heuristic
algorithms for fast computation of good client
assignments and theoretically analyze their
approximation ratios. The proposed algorithms are also
experimentally evaluated with real Internet latency
data. The results show that the proposed algorithms are
efficient and effective in reducing the interaction
time between clients, and our proposed
Distributed-Modify-Assignment adapts well to the
dynamics of client participation and network
conditions. For the special case of tree network
topologies, we develop a polynomial-time algorithm to
compute the optimal client assignment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qazi:2012:CCM,
author = "Ihsan Ayyub Qazi and Lachlan L. H. Andrew and Taieb
Znati",
title = "Congestion control with multipacket feedback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1721--1733",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188838",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many congestion control protocols use explicit
feedback from the network to achieve high performance.
Most of these either require more bits for feedback
than are available in the IP header or incur
performance limitations due to inaccurate congestion
feedback. There has been recent interest in protocols
that obtain high-resolution estimates of congestion by
combining the explicit congestion notification (ECN)
marks of multiple packets, and using this to guide
multiplicative increase, additive increase,
multiplicative decrease (MI-AI-MD) window adaptation.
This paper studies the potential of such approaches,
both analytically and by simulation. The evaluation
focuses on a new protocol called Binary Marking
Congestion Control (BMCC). It is shown that these
schemes can quickly acquire unused capacity, quickly
approach a fair rate distribution, and have relatively
smooth sending rates, even on high bandwidth-delay
product networks. This is achieved while maintaining
low average queue length and negligible packet loss.
Using extensive simulations, we show that BMCC
outperforms XCP, VCP, MLCP, CUBIC, CTCP, SACK, and in
some cases RCP, in terms of average flow completion
times. Suggestions are also given for the incremental
deployment of BMCC.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yan:2012:GRG,
author = "He Yan and Lee Breslau and Zihui Ge and Dan Massey and
Dan Pei and Jennifer Yates",
title = "{G-RCA}: a generic root cause analysis platform for
service quality management in large {IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1734--1747",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188837",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An increasingly diverse set of applications, such as
Internet games, streaming videos, e-commerce, online
banking, and even mission-critical emergency call
services, all relies on IP networks. In such an
environment, best-effort service is no longer
acceptable. This requires a transformation in network
management from detecting and replacing individual
faulty network elements to managing the end-to-end
service quality as a whole. In this paper, we describe
the design and development of a Generic Root Cause
Analysis platform (G-RCA) for service quality
management (SQM) in large IP networks. G-RCA contains a
comprehensive service dependency model that
incorporates topological and cross-layer relationships,
protocol interactions, and control plane dependencies.
G-RCA abstracts the root cause analysis process into
signature identification for symptom and diagnostic
events, temporal and spatial event correlation, and
reasoning and inference logic. G-RCA provides a
flexible rule specification language that allows
operators to quickly customize G-RCA and provide
different root cause analysis tools as new problems
need to be investigated. G-RCA is also integrated with
data trending, manual data exploration, and statistical
correlation mining capabilities. G-RCA has proven to be
a highly effective SQM platform in several different
applications, and we present results regarding BGP
flaps, PIM flaps in Multicast VPN service, and
end-to-end throughput degradation in content delivery
network (CDN) service.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xie:2012:MSN,
author = "Liguang Xie and Yi Shi and Y. Thomas Hou and Hanif D.
Sherali",
title = "Making sensor networks immortal: an energy-renewal
approach with wireless power transfer",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1748--1761",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2185831",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless sensor networks are constrained by limited
battery energy. Thus, finite network lifetime is widely
regarded as a fundamental performance bottleneck.
Recent breakthrough in the area of wireless power
transfer offers the potential of removing this
performance bottleneck, i.e., allowing a sensor network
to remain operational forever. In this paper, we
investigate the operation of a sensor network under
this new enabling energy transfer technology. We
consider the scenario of a mobile charging vehicle
periodically traveling inside the sensor network and
charging each sensor node's battery wirelessly. We
introduce the concept of renewable energy cycle and
offer both necessary and sufficient conditions. We
study an optimization problem, with the objective of
maximizing the ratio of the wireless charging vehicle
(WCV)'s vacation time over the cycle time. For this
problem, we prove that the optimal traveling path for
the WCV is the shortest Hamiltonian cycle and provide a
number of important properties. Subsequently, we
develop a near-optimal solution by a piecewise linear
approximation technique and prove its performance
guarantee.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tapolcai:2012:NWL,
author = "J{\'a}nos Tapolcai and Pin-Han Ho and Lajos R{\'o}nyai
and Bin Wu",
title = "Network-wide local unambiguous failure localization
{(NWL-UFL)} via monitoring trails",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1762--1773",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186461",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Monitoring trail ($m$-trail) has been proposed as an
effective approach for link failure localization in
all-optical wavelength division multiplexing (WDM) mesh
networks. Previous studies in failure localization rely
on alarm dissemination via control plane signaling such
that the network controller can collect the flooded
alarms to form an alarm code for failure
identification. Such cross-layer signaling effort
obviously leads to additional control complexity. This
paper investigates a novel $m$-trail failure
localization scenario, called network-wide local
unambiguous failure localization (NWL-UFL), where each
node can perform UFL based on locally available ON-OFF
state of traversing $m$-trails, such that alarm
dissemination in the control plane can be completely
avoided. The paper first defines and formulates the
$m$-trail allocation problem under NWL-UFL and conducts
a series of bound analysis on the cover length required
for localizing any single-link failure. This is the
first study on monitoring trail allocation problem that
aims to gain understanding on the consumed cover length
via analytical approaches due to the special feature of
the NWL-UFL scenario. A novel heuristic algorithm based
on random spanning tree assignment (RSTA) and greedy
link swapping (GLS) is developed for solving the
formulated problem. Extensive simulation on thousands
of randomly generated network topologies is conducted
to verify the proposed scheme by comparing it to a
naive counterpart and with the derived lower bounds. We
also demonstrate the impact of topology diversity on
the performance of the proposed scheme as well as its
scalability regarding network sizes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2012:PIP,
author = "Fei Chen and Alex X. Liu",
title = "Privacy- and integrity-preserving range queries in
sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1774--1787",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188540",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The architecture of two-tiered sensor networks, where
storage nodes serve as an intermediate tier between
sensors and a sink for storing data and processing
queries, has been widely adopted because of the
benefits of power and storage saving for sensors as
well as the efficiency of query processing. However,
the importance of storage nodes also makes them
attractive to attackers. In this paper, we propose
SafeQ, a protocol that prevents attackers from gaining
information from both sensor collected data and sink
issued queries. SafeQ also allows a sink to detect
compromised storage nodes when they misbehave. To
preserve privacy, SafeQ uses a novel technique to
encode both data and queries such that a storage node
can correctly process encoded queries over encoded data
without knowing their values. To preserve integrity, we
propose two schemes --- one using Merkle hash trees and
another using a new data structure called neighborhood
chains --- to generate integrity verification
information so that a sink can use this information to
verify whether the result of a query contains exactly
the data items that satisfy the query. To improve
performance, we propose an optimization technique using
Bloom filters to reduce the communication cost between
sensors and storage nodes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Brauckhoff:2012:AEB,
author = "Daniela Brauckhoff and Xenofontas Dimitropoulos and
Arno Wagner and Kav{\'e} Salamatian",
title = "Anomaly extraction in backbone networks using
association rules",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1788--1799",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2187306",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Anomaly extraction refers to automatically finding, in
a large set of flows observed during an anomalous time
interval, the flows associated with the anomalous
event(s). It is important for root-cause analysis,
network forensics, attack mitigation, and anomaly
modeling. In this paper, we use meta-data provided by
several histogram-based detectors to identify
suspicious flows, and then apply association rule
mining to find and summarize anomalous flows. Using
rich traffic data from a backbone network, we show that
our technique effectively finds the flows associated
with the anomalous event(s) in all studied cases. In
addition, it triggers a very small number of false
positives, on average between 2 and 8.5, which exhibit
specific patterns and can be trivially sorted out by an
administrator. Our anomaly extraction method
significantly reduces the work-hours needed for
analyzing alarms, making anomaly detection systems more
practical.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ding:2012:MVD,
author = "Yong Ding and Yang Yang and Li Xiao",
title = "Multisource video on-demand streaming in wireless mesh
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1800--1813",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2188642",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the multisource video on-demand (VoD)
application in multichannel multiradio wireless mesh
networks. When a user initiates a new video request,
the application can stream the video not only from the
media servers, but also from the peers that have
buffered the video. The multipath multisource video
on-demand streaming has been applied in wired networks
with great success. However, it remains a challenging
task in wireless networks due to wireless interference.
In this paper, we first focus on the problem of finding
the maximum number of high-quality and independent
paths from the user to the servers or peers for each
VoD request by considering the effect of wireless
interference. We formulate it as a constrained maximum
independent paths problem and propose two efficient
heuristic path discovery algorithms. Based on the
multiple paths discovered, we further propose a joint
routing and rate allocation algorithm, which minimizes
the network congestion caused by the new VoD session.
The algorithm is aware of the optimization for both
existing and potential VoD sessions in the wireless
mesh network. We evaluate our algorithms with real
video traces. Simulation results demonstrate that our
algorithm not only improves the average video streaming
performance over all the coexisting VoD sessions in the
network, but also increases the network's capacity of
satisfying more subsequent VoD requests.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2012:FFA,
author = "Anduo Wang and Limin Jia and Wenchao Zhou and Yiqing
Ren and Boon Thau Loo and Jennifer Rexford and Vivek
Nigam and Andre Scedrov and Carolyn Talcott",
title = "{FSR}: formal analysis and implementation toolkit for
safe interdomain routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1814--1827",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2187924",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Interdomain routing stitches the disparate parts of
the Internet together, making protocol stability a
critical issue to both researchers and practitioners.
Yet, researchers create safety proofs and
counterexamples by hand and build simulators and
prototypes to explore protocol dynamics. Similarly,
network operators analyze their router configurations
manually or using homegrown tools. In this paper, we
present a comprehensive toolkit for analyzing and
implementing routing policies, ranging from high-level
guidelines to specific router configurations. Our
Formally Safe Routing (FSR) toolkit performs all of
these functions from the same algebraic representation
of routing policy. We show that routing algebra has a
natural translation to both integer constraints (to
perform safety analysis with SMT solvers) and
declarative programs (to generate distributed
implementations). Our extensive experiments with
realistic topologies and policies show how FSR can
detect problems in an autonomous system's (AS's) iBGP
configuration, prove sufficient conditions for Border
Gateway Protocol (BGP) safety, and empirically evaluate
convergence time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Francois:2012:FCP,
author = "J{\'e}r{\^o}me Fran{\c{c}}ois and Issam Aib and Raouf
Boutaba",
title = "{FireCol}: a collaborative protection network for the
detection of flooding {DDoS} attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1828--1841",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2194508",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed denial-of-service (DDoS) attacks remain a
major security problem, the mitigation of which is very
hard especially when it comes to highly distributed
botnet-based attacks. The early discovery of these
attacks, although challenging, is necessary to protect
end-users as well as the expensive network
infrastructure resources. In this paper, we address the
problem of DDoS attacks and present the theoretical
foundation, architecture, and algorithms of FireCol.
The core of FireCol is composed of intrusion prevention
systems (IPSs) located at the Internet service
providers (ISPs) level. The IPSs form virtual
protection rings around the hosts to defend and
collaborate by exchanging selected traffic information.
The evaluation of FireCol using extensive simulations
and a real dataset is presented, showing FireCol
effectiveness and low overhead, as well as its support
for incremental deployment in real networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vanbever:2012:LML,
author = "Laurent Vanbever and Stefano Vissicchio and Cristel
Pelsser and Pierre Francois and Olivier Bonaventure",
title = "Lossless migrations of link-state {IGPs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1842--1855",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190767",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network-wide migrations of a running network, such as
the replacement of a routing protocol or the
modification of its configuration, can improve the
performance, scalability, manageability, and security
of the entire network. However, such migrations are an
important source of concerns for network operators as
the reconfiguration campaign can lead to long,
service-disrupting outages. In this paper, we propose a
methodology that addresses the problem of seamlessly
modifying the configuration of link-state Interior
Gateway Protocols (IGPs). We illustrate the benefits of
our methodology by considering several migration
scenarios, including the addition and the removal of
routing hierarchy in a running IGP, and the replacement
of one IGP with another. We prove that a strict
operational ordering can guarantee that the migration
will not create any service outage. Although finding a
safe ordering is NP-complete, we describe techniques
that efficiently find such an ordering and evaluate
them using several real-world and inferred ISP
topologies. Finally, we describe the implementation of
a provisioning system that automatically performs the
migration by pushing the configurations on the routers
in the appropriate order while monitoring the entire
migration process.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altman:2012:SSG,
author = "Eitan Altman and Anurag Kumar and Chandramani Singh
and Rajesh Sundaresan",
title = "Spatial {SINR} games of base station placement and
mobile association",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1856--1869",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186980",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the question of determining locations of base
stations (BSs) that may belong to the same or to
competing service providers. We take into account the
impact of these decisions on the behavior of
intelligent mobile terminals that can connect to the
base station that offers the best utility. The
signal-to-interference-plus-noise ratio (SINR) is used
as the quantity that determines the association. We
first study the SINR association-game: We determine the
cells corresponding to each base stations, i.e., the
locations at which mobile terminals prefer to connect
to a given base station than to others. We make some
surprising observations: (1) displacing a base station
a little in one direction may result in a displacement
of the boundary of the corresponding cell to the
opposite direction; (2) a cell corresponding to a BS
may be the union of disconnected subcells. We then
study the hierarchical equilibrium in the combined BS
location and mobile association problem: We determine
where to locate the BSs so as to maximize the revenues
obtained at the induced SINR mobile association game.
We consider the cases of single frequency band and two
frequency bands of operation. Finally, we also consider
hierarchical equilibria in two frequency systems with
successive interference cancellation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mertzios:2012:PRO,
author = "George B. Mertzios and Ignasi Sau and Mordechai Shalom
and Shmuel Zaks",
title = "Placing regenerators in optical networks to satisfy
multiple sets of requests",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1870--1879",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186462",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The placement of regenerators in optical networks has
become an active area of research during the last few
years. Given a set of lightpaths in a network {$G$} and
a positive integer $d$, regenerators must be placed in
such a way that in any lightpath there are no more than
$d$ hops without meeting a regenerator. The cost
function we consider is given by the total number of
regenerators placed at the nodes, which we believe to
be a more accurate estimation of the real cost of the
network than the number of locations considered in the
work of Flammini et al. (IEEE/ACM Trans. Netw., vol.
{\bf 19}, no. 2, pp. 498--511, Apr. 2011). Furthermore,
in our model we assume that we are given a finite set
of $p$ possible traffic patterns (each given by a set
of lightpaths), and our objective is to place the
minimum number of regenerators at the nodes so that
each of the traffic patterns is satisfied. While this
problem can be easily solved when $ d = 1$ or $ p = 1$,
we prove that for any fixed $ d, p \geq 2$, it does not
admit a PTAS, even if $G$ has maximum degree at most
$3$ and the lightpaths have length $ O(d)$. We
complement this hardness result with a constant-factor
approximation algorithm with ratio (dcp). We then study
the case where $G$ is a path, proving that the problem
is polynomial-time solvable for two particular families
of instances. Finally, we generalize our model in two
natural directions, which allows us to capture the
model of Flammini et al. as a particular case, and we
settle some questions that were left open therein.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nguyen:2012:TCM,
author = "Thuy T. T. Nguyen and Grenville Armitage and Philip
Branch and Sebastian Zander",
title = "Timely and continuous machine-learning-based
classification for interactive {IP} traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1880--1894",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2187305",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Machine Learning (ML) for classifying IP traffic has
relied on the analysis of statistics of full flows or
their first few packets only. However, automated QoS
management for interactive traffic flows requires quick
and timely classification well before the flows finish.
Also, interactive flows are often long-lived and should
be continuously monitored during their lifetime. We
propose to achieve this by using statistics derived
from sub-flows --- a small number of most recent
packets taken at any point in a flow's lifetime. Then,
the ML classifier must be trained on a set of
sub-flows, and we investigate different sub-flow
selection strategies. We also propose to augment
training datasets so that classification accuracy is
maintained even when a classifier mixes up
client-to-server and server-to-client directions for
applications exhibiting asymmetric traffic
characteristics. We demonstrate the effectiveness of
our approach with the Naive Bayes and C4.5 Decision
Tree ML algorithms, for the identification of
first-person-shooter online game and VoIP traffic. Our
results show that we can classify both applications
with up to 99\% Precision and 95\% Recall within less
than 1\,s. Stable results are achieved regardless of
where within a flow the classifier captures the packets
and the traffic direction.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Keslassy:2012:PPG,
author = "Isaac Keslassy and Kirill Kogan and Gabriel Scalosub
and Michael Segal",
title = "Providing performance guarantees in multipass network
processors",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1895--1909",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2186979",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Current network processors (NPs) increasingly deal
with packets with heterogeneous processing times. In
such an environment, packets that require many
processing cycles delay low-latency traffic because the
common approach in today's NPs is to employ
run-to-completion processing. These difficulties have
led to the emergence of the Multipass NP architecture,
where after a processing cycle ends, all processed
packets are recycled into the buffer and recompete for
processing resources. In this paper, we provide a model
that captures many of the characteristics of this
architecture, and we consider several scheduling and
buffer management algorithms that are specially
designed to optimize the performance of multipass
network processors. In particular, we provide
analytical guarantees for the throughput performance of
our algorithms. We further conduct a comprehensive
simulation study, which validates our results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Seibert:2012:IWI,
author = "Jeff Seibert and Ruben Torres and Marco Mellia and
Maurizio M. Munafo and Cristina Nita-Rotaru and Sanjay
Rao",
title = "The {Internet}-wide impact of {P2P} traffic
localization on {ISP} profitability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1910--1923",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190093",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We conduct a detailed simulation study to examine how
localizing P2P traffic within network boundaries
impacts the profitability of an ISP. A distinguishing
aspect of our work is the focus on Internet-wide
implications, i.e., how adoption of localization within
an ISP affects both itself and other ISPs. Our
simulations are based on detailed models that estimate
inter-autonomous system (AS) P2P traffic and inter-AS
routing, localization models that predict the extent to
which P2P traffic is reduced, and pricing models that
predict the impact of changes in traffic on the profit
of an ISP. We evaluate our models by using a
large-scale crawl of BitTorrent containing over 138
million users sharing 2.75 million files. Our results
show that the benefits of localization must not be
taken for granted. Some of our key findings include:
(1) residential ISPs can actually lose money when
localization is employed, and some of them will not see
increased profitability until other ISPs employ
localization; (2) the reduction in costs due to
localization will be limited for small ISPs and tends
to grow only logarithmically with client population;
and (3) some ISPs can better increase profitability
through alternate strategies to localization by taking
advantage of the business relationships they have with
other ISPs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiao:2012:RRW,
author = "Weiyao Xiao and Sachin Agarwal and David Starobinski
and Ari Trachtenberg",
title = "Reliable rateless wireless broadcasting with near-zero
feedback",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1924--1937",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2189016",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We examine the problem of minimizing feedback in
reliable wireless broadcasting by pairing rateless
coding with extreme value theory. Our key observation
is that, in a broadcast environment, this problem
resolves into estimating the maximum number of packets
dropped among many receivers rather than for each
individual receiver. With rateless codes, this
estimation relates to the number of redundant
transmissions needed at the source in order for all
receivers to correctly decode a message with high
probability. We develop and analyze two new data
dissemination protocols, called Random Sampling (RS)
and Full Sampling with Limited Feedback (FSLF), based
on the moment and maximum likelihood estimators in
extreme value theory. Both protocols rely on a
single-round learning phase, requiring the transmission
of a few feedback packets from a small subset of
receivers. With fixed overhead, we show that FSLF has
the desirable property of becoming more accurate as the
receivers' population gets larger. Our protocols are
channel-agnostic, in that they do not require a priori
knowledge of (i.i.d.) packet loss probabilities, which
may vary among receivers. We provide simulations and an
improved full-scale implementation of the Rateless
Deluge over-the-air programming protocol on sensor
motes as a demonstration of the practical benefits of
our protocols, which translate into about 30\% latency
and energy consumption savings. Furthermore, we apply
our protocols to real-time (RT) oblivious rateless
codes in broadcast settings. Through simulations, we
demonstrate a 100-fold reduction in the amount of
feedback packets while incurring an increase of only
10\%-20\% in the number of encoded packets
transmissions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{DiPalantino:2012:TES,
author = "Dominic DiPalantino and Ramesh Johari",
title = "Traffic engineering with semiautonomous users: a
game-theoretic perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1938--1949",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2208475",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:36:40 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we explore the interaction between
traffic engineering and the users of a network. Because
a traffic engineer may be unaware of the structure of
content distribution systems or overlay networks, his
management of the network does not fully anticipate how
traffic might change as a result of his actions.
Content distribution systems that assign servers at the
application level can respond very rapidly to changes
in the routing of the network. Consequently, the
traffic engineer's decisions may not be applied to the
intended traffic. We use a game-theoretic framework in
which infinitesimal users of a network select the
source of content, and the traffic engineer decides how
the traffic will route through the network. We
formulate a game and prove the existence of equilibria.
Additionally, we present a setting in which equilibria
are socially optimal, essentially unique, and stable.
Conditions under which efficiency loss may be bounded
are presented, and the results are extended to the
cases of general overlay networks and multiple
autonomous systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2012:GTH,
author = "Jiajia Liu and Xiaohong Jiang and Hiroki Nishiyama and
Nei Kato",
title = "Generalized two-hop relay for flexible delay control
in {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1950--1963",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2187923",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:41:48 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The available two-hop relay protocols with
out-of-order or strictly in-order reception cannot
provide a flexible control for the packet delivery
delay, which may significantly limit their applications
to the future mobile ad hoc networks (MANETs) with
different delay requirements. This paper extends the
conventional two-hop relay and proposes a general
group-based two-hop relay algorithm with packet
redundancy. In such an algorithm with packet redundancy
limit $f$ and group size $g$ (2HR-$ (f, g)$ for short),
each packet is delivered to at most $f$ distinct relay
nodes and can be accepted by its destination if it is a
fresh packet to the destination and also it is among g
packets of the group the destination is currently
requesting. The 2HR-$ (f, g)$ covers the available
two-hop relay protocols as special cases, like the
in-order reception ones $ (f \geq 1, g = 1)$, the
out-of-order reception ones with redundancy $ (f > 1, g
= \infty)$, or without redundancy $ (f = 1, g =
\infty)$. A Markov chain-based theoretical framework is
further developed to analyze how the mean value and
variance of packet delivery delay vary with the
parameters $f$ and $g$, where the important medium
contention, interference, and traffic contention issues
are carefully incorporated into the analysis. Extensive
simulation and theoretical results are provided to
illustrate the performance of the 2HR-$ (f, g)$
algorithm and the corresponding theoretical framework,
which indicate that the theoretical framework is
efficient in delay analysis and the new 2HR-$ (f, g)$
algorithm actually enables both the mean value and
variance of packet delivery delay to be flexibly
controlled in a large region.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yun:2012:PMW,
author = "Ziqiu Yun and Xiaole Bai and Dong Xuan and Weijia Jia
and Wei Zhao",
title = "Pattern mutation in wireless sensor deployment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1964--1977",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2199515",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:41:48 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the optimal deployment pattern
problem in wireless sensor networks (WSNs). We propose
a new set of patterns, particularly when sensors'
communication range $ (r c) $ is relatively small
compared to their sensing range $ (r s) $, and prove
their optimality. In this study, we discover an
interesting phenomenon --- pattern mutation. To the
best of our knowledge, this is the first time that
mutation in pattern deployments has been discovered.
This phenomenon, which contradicts the conjecture
presented in a previous work that there exists a
universal elemental pattern among optimal pattern
deployment, significantly furthers our understanding of
optimal patterns in WSNs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2012:GEE,
author = "Tao Li and Samuel S. Wu and Shigang Chen and Mark C.
K. Yang",
title = "Generalized energy-efficient algorithms for the {RFID}
estimation problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1978--1990",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2192448",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:41:48 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Radio frequency identification (RFID) has been gaining
popularity for inventory control, object tracking, and
supply-chain management in warehouses, retail stores,
hospitals, etc. Periodically and automatically
estimating the number of RFID tags deployed in a large
area has many important applications in inventory
management and theft detection. Prior works focus on
designing time-efficient algorithms that can estimate
tens of thousands of tags in seconds. We observe that
for an RFID reader to access tags in a large area,
active tags are likely to be used due to their longer
operational ranges. These tags are battery-powered and
use their own energy for information transmission.
However, recharging batteries for tens of thousands of
tags is laborious. Hence, conserving energy for active
tags becomes critical. Some prior works have studied
how to reduce energy expenditure of an RFID reader when
it reads tag IDs. We study how to reduce the amount of
energy consumed by active tags during the process of
estimating the number of tags in a system. We design
two energy-efficient probabilistic estimation
algorithms that iteratively refine a control parameter
to optimize the information carried in transmissions
from tags, such that both the number and the size of
transmissions are reduced. These algorithms can also
take time efficiency into consideration. By tuning a
contention probability parameter $ \omega $, the new
algorithms can make tradeoff between energy cost and
estimation time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kasbekar:2012:GCV,
author = "Gaurav S. Kasbekar and Yigal Bejerano and Saswati
Sarkar",
title = "Generic coverage verification without location
information using dimension reduction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "1991--2004",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190620",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:41:48 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless sensor networks (WSNs) have recently emerged
as a key sensing technology with diverse civilian and
military applications. In these networks, a large
number of small sensors or nodes perform distributed
sensing of a target field. Each node is capable of
sensing events of interest within its sensing range and
communicating with neighboring nodes. The target field
is said to be $k$-covered if every point in it is
within the sensing range of at least $k$ sensors, where
$k$ is any positive integer. We present a comprehensive
framework for verifying $k$-coverage of a
$d$-dimensional target field for an arbitrary positive
integer $k$ and $ d \in \{ 1, 2, 3 \} $. Our framework
uses a divide-and-conquer approach based on the
technique of dimension reduction, in which the
$k$-coverage verification problem in $d$ dimensions is
reduced to a number of coverage verification problems
in $ (d - 1)$ dimensions, which are then recursively
solved. Our framework leads to a distributed
polynomial-time coverage verification algorithm that
does not require knowledge of the locations of nodes or
directional information, which is difficult to obtain
in WSNs. Each node can execute the algorithm using only
the distances between adjacent nodes within its
transmission range and their sensing radii. We
analytically prove that the scheme detects a coverage
hole if and only if the target field has a coverage
hole.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kone:2012:EOS,
author = "Vinod Kone and Lei Yang and Xue Yang and Ben Y. Zhao
and Haitao Zheng",
title = "The effectiveness of opportunistic spectrum access: a
measurement study",
journal = j-IEEE-TRANS-NETWORKING,
volume = "20",
number = "6",
pages = "2005--2016",
month = dec,
year = "2012",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191571",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jan 12 08:41:48 MST 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Dynamic spectrum access networks are designed to allow
today's bandwidth-hungry ``secondary devices'' to share
spectrum allocated to legacy devices, or ``primary
users.'' The success of this wireless communication
model relies on the availability of unused spectrum and
the ability of secondary devices to utilize spectrum
without disrupting transmissions of primary users.
While recent measurement studies have shown that there
is sufficient underutilized spectrum available, little
is known about whether secondary devices can
efficiently make use of available spectrum while
minimizing disruptions to primary users. In this paper,
we present the first comprehensive study on the
presence of ``usable'' spectrum in opportunistic
spectrum access systems, and whether sufficient
spectrum can be extracted by secondary devices to
support traditional networking applications. We use for
our study fine-grain usage traces of a wide spectrum
range (20 MHz-6 GHz) taken at four locations in
Germany, the Netherlands, and Santa Barbara, CA. Our
study shows that on average, 54\% of spectrum is never
used and 26\% is only partially used. Surprisingly, in
this 26\% of partially used spectrum, secondary devices
can utilize very little spectrum using conservative
access policies to minimize interference with primary
users. Even assuming an optimal access scheme and
extensive statistical knowledge of primary-user access
patterns, a user can only extract between 20\%-30\% of
the total available spectrum. To provide better
spectrum availability, we propose frequency bundling,
where secondary devices build reliable channels by
combining multiple unreliable frequencies into virtual
frequency bundles. Analyzing our traces, we find that
there is little correlation of spectrum availability
across channels, and that bundling random channels
together can provide sustained periods of reliable
transmission with only short interruptions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tariq:2013:ATD,
author = "Mukarram Bin Tariq and Kaushik Bhandankar and Vytautas
Valancius and Amgad Zeitoun and Nick Feamster and
Mostafa Ammar",
title = "Answering: techniques and deployment experience",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "1--13",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230448",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Designers of content distribution networks (CDNs)
often need to determine how changes to infrastructure
deployment and configuration affect service response
times when they deploy a new data center, change ISP
peering, or change the mapping of clients to servers.
Today, the designers use coarse, back-of-the-envelope
calculations or costly field deployments; they need
better ways to evaluate the effects of such
hypothetical ``what-if'' questions before the actual
deployments. This paper presents What-If Scenario
Evaluator (WISE), a tool that predicts the effects of
possible configuration and deployment changes in
content distribution networks. WISE makes three
contributions: (1) an algorithm that uses traces from
existing deployments to learn causality among factors
that affect service response-time distributions; (2) an
algorithm that uses the learned causal structure to
estimate a dataset that is representative of the
hypothetical scenario that a designer may wish to
evaluate, and uses these datasets to predict
hypothetical response-time distributions; (3) a
scenario specification language that allows a network
designer to easily express hypothetical deployment
scenarios without being cognizant of the dependencies
between variables that affect service response times.
Our evaluation, both in a controlled setting and in a
real-world field deployment on a large, global CDN,
shows that WISE can quickly and accurately predict
service response-time distributions for many practical
what-if scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2013:CAA,
author = "Yunyue Lin and Qishi Wu",
title = "Complexity analysis and algorithm design for advance
bandwidth scheduling in dedicated networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "14--27",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2189127",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An increasing number of high-performance networks
provision dedicated channels through circuit switching
or MPLS/GMPLS techniques to support large data
transfer. The link bandwidths in such networks are
typically shared by multiple users through advance
reservation, resulting in varying bandwidth
availability in future time. Developing efficient
scheduling algorithms for advance bandwidth reservation
has become a critical task to improve the utilization
of network resources and meet the transport
requirements of application users. We consider an
exhaustive combination of different path and bandwidth
constraints and formulate four types of advance
bandwidth scheduling problems, with the same objective
to minimize the data transfer end time for a given
transfer request with a prespecified data size: (1)
fixed path with fixed bandwidth (FPFB); (2) fixed path
with variable bandwidth (FPVB); (3) variable path with
fixed bandwidth (VPFB); and (4) variable path with
variable bandwidth (VPVB). For VPFB and VPVB, we
further consider two subcases where the path switching
delay is negligible or nonnegligible. We propose an
optimal algorithm for each of these scheduling problems
except for FPVB and VPVB with nonnegligible path
switching delay, which are proven to be NP-complete and
nonapproximable, and then tackled by heuristics. The
performance superiority of these heuristics is verified
by extensive experimental results in a large set of
simulated networks in comparison to optimal and greedy
strategies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jin:2013:DDN,
author = "Youngmi Jin and George Kesidis and Ju Wook Jang",
title = "Diffusion dynamics of network technologies with
bounded rational users: aspiration-based learning",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "28--40",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2189891",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, economic models have been proposed to study
adoption dynamics of entrant and incumbent technologies
motivated by the need for new network architectures to
complement the current Internet. We propose new models
of adoption dynamics of entrant and incumbent
technologies among bounded rational users who choose a
satisfying strategy rather than an optimal strategy
based on aspiration-based learning. Two models of
adoption dynamics are proposed according to the
characteristics of aspiration level. The impacts of
switching cost, the benefit from entrant and incumbent
technologies, and the initial aspiration level on the
adoption dynamics are investigated.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Neely:2013:DBN,
author = "Michael J. Neely",
title = "Delay-based network utility maximization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "41--54",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191157",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It is well known that max-weight policies based on a
queue backlog index can be used to stabilize stochastic
networks, and that similar stability results hold if a
delay index is used. Using Lyapunov optimization, we
extend this analysis to design a utility maximizing
algorithm that uses explicit delay information from the
head-of-line packet at each user. The resulting policy
is shown to ensure deterministic worst-case delay
guarantees and to yield a throughput utility that
differs from the optimally fair value by an amount that
is inversely proportional to the delay guarantee. Our
results hold for a general class of 1-hop networks,
including packet switches and multiuser wireless
systems with time-varying reliability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Manfredi:2013:DCL,
author = "Sabato Manfredi and Francesco Oliviero and Simon
Pietro Romano",
title = "A distributed control law for load balancing in
content delivery networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "55--68",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190297",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we face the challenging issue of
defining and implementing an effective law for load
balancing in Content Delivery Networks (CDNs). We base
our proposal on a formal study of a CDN system, carried
out through the exploitation of a fluid flow model
characterization of the network of servers. Starting
from such characterization, we derive and prove a lemma
about the network queues equilibrium. This result is
then leveraged in order to devise a novel distributed
and time-continuous algorithm for load balancing, which
is also reformulated in a time-discrete version. The
discrete formulation of the proposed balancing law is
eventually discussed in terms of its actual
implementation in a real-world scenario. Finally, the
overall approach is validated by means of
simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vasudevan:2013:EAN,
author = "Sudarshan Vasudevan and Micah Adler and Dennis Goeckel
and Don Towsley",
title = "Efficient algorithms for neighbor discovery in
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "69--83",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2189892",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Neighbor discovery is an important first step in the
initialization of a wireless ad hoc network. In this
paper, we design and analyze several algorithms for
neighbor discovery in wireless networks. Starting with
a single-hop wireless network of $n$ nodes, we propose
a $ \Theta (n \ln n)$ ALOHA-like neighbor discovery
algorithm when nodes cannot detect collisions, and an
order-optimal $ \Theta (n)$ receiver feedback-based
algorithm when nodes can detect collisions. Our
algorithms neither require nodes to have a priori
estimates of the number of neighbors nor
synchronization between nodes. Our algorithms allow
nodes to begin execution at different time instants and
to terminate neighbor discovery upon discovering all
their neighbors. We finally show that receiver feedback
can be used to achieve a $ \Theta (n)$ running time,
even when nodes cannot detect collisions. We then
analyze neighbor discovery in a general multihop
setting. We establish an upper bound of $ O (\Delta \ln
n)$ on the running time of the ALOHA-like algorithm,
where $ \Delta $ denotes the maximum node degree in the
network and $n$ the total number of nodes. We also
establish a lower bound of $ \Omega (\Delta + \ln n)$
on the running time of any randomized neighbor
discovery algorithm. Our result thus implies that the
ALOHA-like algorithm is at most a factor $ \min
(\Delta, \ln n)$ worse than optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fu:2013:SGW,
author = "Fangwen Fu and Ulas C. Kozat",
title = "Stochastic game for wireless network virtualization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "84--97",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190419",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "We propose a new framework for wireless network
virtualization. In this framework, service providers
(SPs) and the network operator (NO) are decoupled from
each other: The NO is solely responsible for spectrum
management, and SPs are responsible for
quality-of-service (QoS) management for their own
users. SPs compete for the shared wireless resources to
satisfy their distinct service objectives and
constraints. We model the dynamic interactions among
SPs and the NO as a stochastic game. SPs bid for the
resources via dynamically announcing their value
functions. The game is regulated by the NO through: (1)
sum-utility optimization under rate region constraints;
(2) enforcement of Vickrey-Clarke-Groves (VCG)
mechanism for pricing the instantaneous rate
consumption; and (3) declaration of conjectured prices
for future resource consumption. We prove that there
exists one Nash equilibrium in the conjectural prices
that is efficient, i.e., the sum-utility is maximized.
Thus, the NO has the incentive to compute the
equilibrium point and feedback to SPs. Given the
conjectural prices and the VCG mechanism, we also show
that SPs must reveal their truthful value functions at
each step to maximize their long-term utilities. As
another major contribution, we develop an online
learning algorithm that allows the SPs to update the
value functions and the NO to update the conjectural
prices iteratively. Thus, the proposed framework can
deal with unknown dynamics in traffic characteristics
and channel conditions. We present simulation results
to show the convergence to the Nash equilibrium prices
under various dynamic traffic and channel conditions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Song:2013:AAB,
author = "Haoyu Song and Jonathan S. Turner",
title = "{ABC}: adaptive binary cuttings for multidimensional
packet classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "98--109",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2190519",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Decision tree-based packet classification algorithms
are easy to implement and allow the tradeoff between
storage and throughput. However, the memory consumption
of these algorithms remains quite high when high
throughput is required. The Adaptive Binary Cuttings
(ABC) algorithm exploits another degree of freedom to
make the decision tree adapt to the geometric
distribution of the filters. The three variations of
the adaptive cutting procedure produce a set of
different-sized cuts at each decision step, with the
goal to balance the distribution of filters and to
reduce the filter duplication effect. The ABC algorithm
uses stronger and more straightforward criteria for
decision tree construction. Coupled with an efficient
node encoding scheme, it enables a smaller, shorter,
and well-balanced decision tree. The hardware-oriented
implementation of each variation is proposed and
evaluated extensively to demonstrate its scalability
and sensitivity to different configurations. The
results show that the ABC algorithm significantly
outperforms the other decision tree-based algorithms.
It can sustain more than 10-Gb/s throughput and is the
only algorithm among the existing well-known packet
classification algorithms that can compete with TCAMs
in terms of the storage efficiency.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2013:UMF,
author = "Juan Liu and Wei Chen and Ying Jun Zhang and Zhigang
Cao",
title = "A utility maximization framework for fair and
efficient multicasting in multicarrier wireless
cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "110--120",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2192747",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multicast/broadcast is regarded as an efficient
technique for wireless cellular networks to transmit a
large volume of common data to multiple mobile users
simultaneously. To guarantee the quality of service for
each mobile user in such single-hop multicasting, the
base-station transmitter usually adapts its data rate
to the worst channel condition among all users in a
multicast group. On one hand, increasing the number of
users in a multicast group leads to a more efficient
utilization of spectrum bandwidth, as users in the same
group can be served together. On the other hand, too
many users in a group may lead to unacceptably low data
rate at which the base station can transmit. Hence, a
natural question that arises is how to efficiently and
fairly transmit to a large number of users requiring
the same message. This paper endeavors to answer this
question by studying the problem of multicasting over
multicarriers in wireless orthogonal frequency division
multiplexing (OFDM) cellular systems. Using a unified
utility maximization framework, we investigate this
problem in two typical scenarios: namely, when users
experience roughly equal path losses and when they
experience different path losses, respectively. Through
theoretical analysis, we obtain optimal multicast
schemes satisfying various throughput-fairness
requirements in these two cases. In particular, we show
that the conventional multicast scheme is optimal in
the equal-path-loss case regardless of the utility
function adopted. When users experience different path
losses, the group multicast scheme, which divides the
users almost equally into many multicast groups and
multicasts to different groups of users over
nonoverlapping subcarriers, is optimal.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhu:2013:AEF,
author = "Ting Zhu and Ziguo Zhong and Tian He and Zhi-Li
Zhang",
title = "Achieving efficient flooding by utilizing link
correlation in wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "121--134",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2197689",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Although existing flooding protocols can provide
efficient and reliable communication in wireless sensor
networks on some level, further performance improvement
has been hampered by the assumption of link
independence, which requires costly acknowledgments
(ACKs) from every receiver. In this paper, we present
collective flooding (CF), which exploits the link
correlation to achieve flooding reliability using the
concept of collective ACKs. CF requires only 1-hop
information at each node, making the design highly
distributed and scalable with low complexity. We
evaluate CF extensively in real-world settings, using
three different types of testbeds: a single-hop network
with 20 MICAz nodes, a multihop network with 37 nodes,
and a linear outdoor network with 48 nodes along a
326-m-long bridge. System evaluation and extensive
simulation show that CF achieves the same reliability
as state-of-the-art solutions while reducing the total
number of packet transmission and the dissemination
delay by 30\%-50\% and 35\%-50\%, respectively.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2013:RWG,
author = "Yanhua Li and Zhi-Li Zhang",
title = "Random walks and {Green}'s function on digraphs: a
framework for estimating wireless transmission costs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "135--148",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191158",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Various applications in wireless networks, such as
routing and query processing, can be formulated as
random walks on graphs. Many results have been obtained
for such applications by utilizing the theory of random
walks (or spectral graph theory), which is mostly
developed for undirected graphs. However, this
formalism neglects the fact that the underlying
(wireless) networks in practice contain asymmetric
links, which are best characterized by directed graphs
(digraphs). Therefore, random walk on digraphs is a
more appropriate model to consider for such networks.
In this paper, by generalizing the random walk theory
(or spectral graph theory) that has been primarily
developed for undirected graphs to digraphs, we show
how various transmission costs in wireless networks can
be formulated in terms of hitting times and cover times
of random walks on digraphs. Using these results, we
develop a unified theoretical framework for estimating
various transmission costs in wireless networks. Our
framework can be applied to random walk query
processing strategy and the three routing
paradigms--best path routing, opportunistic routing,
and stateless routing--to which nearly all existing
routing protocols belong. Extensive simulations
demonstrate that the proposed digraph-based analytical
model can achieve more accurate transmission cost
estimation over existing methods.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deng:2013:FPH,
author = "Xi Deng and Yuanyuan Yang and Sangjin Hong",
title = "A flexible platform for hardware-aware network
experiments and a case study on wireless network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "149--161",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191156",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present the design and
implementation of a general, flexible, hardware-aware
network platform that takes hardware processing
behavior into consideration to accurately evaluate
network performance. The platform adopts a
network-hardware co-simulation approach in which the
NS-2 network simulator supervises the network-wide
traffic flow and the SystemC hardware simulator
simulates the underlying hard-ware processing in
network nodes. In addition, as a case study, we
implemented wireless all-to-all broadcasting with
network coding on the platform. We analyze the hardware
processing behavior during the algorithm execution and
evaluate the overall performance of the algorithm. Our
experimental results demonstrate that hardware
processing can have a significant impact on the
algorithm performance and hence should be taken into
consideration in the algorithm design. We expect that
this hardware-aware platform will become a very useful
tool for more accurate network simulations and more
efficient design space exploration of
processing-intensive applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2013:EDS,
author = "Miao Wang and Lisong Xu and Byrav Ramamurthy",
title = "Exploring the design space of multichannel
peer-to-peer live video streaming systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "162--175",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2194165",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Most of the commercial peer-to-peer (P2P) video
streaming deployments support hundreds of channels and
are referred to as multichannel systems. Recent
research studies have proposed specific protocols to
improve the streaming quality for all channels by
enabling cross-channel cooperation among multiple
channels. In this paper, we focus on the following
fundamental problems in designing cooperating
multichannel systems: (1) what are the general
characteristics of existing and potential designs? and
(2) under what circumstances should a particular design
be used to achieve the desired streaming quality with
the lowest implementation complexity? To answer the
first question, we propose simple models based on
linear programming and network-flow graphs for three
general designs, namely Naive Bandwidth allocation
Approach (NBA), Passive Channel-aware bandwidth
allocation Approach (PCA), and Active Channel-aware
bandwidth allocation Approach (ACA), which provide
insight into understanding the key characteristics of
cross-channel resource sharing. For the second
question, we first develop closed-form results for
two-channel systems. Then, we use extensive numerical
simulations to compare the three designs for various
peer population distributions, upload bandwidth
distributions, and channel structures. Our analytical
and simulation results show that: (1) the NBA design
can rarely achieve the desired streaming quality in
general cases; (2) the PCA design can achieve the same
performance as the ACA design in general cases; and (3)
the ACA design should be used for special
applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chun:2013:SST,
author = "Sung Hyun Chun and Richard J. La",
title = "Secondary spectrum trading: auction-based framework
for spectrum allocation and profit sharing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "176--189",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2191418",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, dynamic spectrum sharing has been gaining
interest as a potential solution to scarcity of
available spectrum. We investigate the problem of
designing a secondary spectrum-trading market when
there are multiple sellers and multiple buyers and
propose a general framework for the trading market
based on an auction mechanism. To this end, we first
introduce a new optimal auction mechanism, called the
generalized Branco's mechanism (GBM). The GBM, which is
both incentive-compatible and individually rational, is
used to determine the assigned frequency bands and
prices for them. Second, we assume that buyers of the
spectrum are selfish and model their interaction as a
noncooperative game. Using this model, we prove that
when the sellers employ the GBM to vend their frequency
bands, they can guarantee themselves the largest
expected profits by selling their frequency bands
jointly. Third, based on the previous finding, we model
the interaction among the sellers as a cooperative game
and demonstrate that, for any fixed strategies of the
buyers, the core of the cooperative game is nonempty.
This suggests that there exists a way for the sellers
to share the profits from the joint sale of the
spectrum so that no subset of sellers will find it
beneficial to vend their frequency bands separately
without the remaining sellers. Finally, we propose a
profit-sharing scheme that can achieve any expected
profit vector in the nonempty core of the cooperative
game while satisfying two desirable properties.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Young:2013:TPC,
author = "Maxwell Young and Aniket Kate and Ian Goldberg and
Martin Karsten",
title = "Towards practical communication in
{Byzantine}-resistant {DHTs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "190--203",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2195729",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There are several analytical results on distributed
hash tables (DHTs) that can tolerate Byzantine faults.
Unfortunately, in such systems, operations such as data
retrieval and message sending incur significant
communication costs. For example, a simple scheme used
in many Byzantine fault-tolerant DHT constructions of n
nodes requires O (log$^3$ n ) messages; this is likely
impractical for real-world applications. The previous
best known message complexity is O (log$^2$ n ) in
expectation. However, the corresponding protocol
suffers from prohibitive costs owing to hidden
constants in the asymptotic notation and setup costs.
In this paper, we focus on reducing the communication
costs against a computationally bounded adversary. We
employ threshold cryptography and distributed key
generation to define two protocols, both of which are
more efficient than existing solutions. In comparison,
our first protocol is deterministic with O (log$^2$ n )
message complexity, and our second protocol is
randomized with expected O (log n ) message complexity.
Furthermore, both the hidden constants and setup costs
for our protocols are small, and no trusted third party
is required. Finally, we present results from
microbenchmarks conducted over PlanetLab showing that
our protocols are practical for deployment under
significant levels of churn and adversarial behavior.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{He:2013:SRB,
author = "Yong He and Jie Sun and Xiaojun Ma and Athanasios V.
Vasilakos and Ruixi Yuan and Weibo Gong",
title = "Semi-random backoff: towards resource reservation for
channel access in wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "204--217",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2202323",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes a semi-random backoff (SRB) method
that enables resource reservation in contention-based
wireless LANs. The proposed SRB is fundamentally
different from traditional random backoff methods
because it provides an easy migration path from random
backoffs to deterministic slot assignments. The central
idea of the SRB is for the wireless station to set its
backoff counter to a deterministic value upon a
successful packet transmission. This deterministic
value will allow the station to reuse the time-slot in
consecutive backoff cycles. When multiple stations with
successful packet transmissions reuse their respective
time-slots, the collision probability is reduced, and
the channel achieves the equivalence of resource
reservation. In case of a failed packet transmission, a
station will revert to the standard random backoff
method and probe for a new available time-slot. The
proposed SRB method can be readily applied to both
802.11 DCF and 802.11e EDCA networks with minimum
modification to the existing DCF/EDCA implementations.
Theoretical analysis and simulation results validate
the superior performance of the SRB for small-scale and
heavily loaded wireless LANs. When combined with an
adaptive mechanism and a persistent backoff process,
SRB can also be effective for large-scale and lightly
loaded wireless networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ren:2013:ESS,
author = "Shaolei Ren and Jaeok Park and Mihaela {Van Der
Schaar}",
title = "Entry and spectrum sharing scheme selection in
femtocell communications markets",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "218--232",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2198073",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Focusing on a femtocell communications market, we
study the entrant network service provider's (NSP's)
long-term decision: whether to enter the market and
which spectrum sharing technology to select to maximize
its profit. This long-term decision is closely related
to the entrant's pricing strategy and the users'
aggregate demand, which we model as medium-term and
short-term decisions, respectively. We consider two
markets, one with no incumbent and the other with one
incumbent. For both markets, we show the existence and
uniqueness of an equilibrium point in the user
subscription dynamics and provide a sufficient
condition for the convergence of the dynamics. For the
market with no incumbent, we derive upper and lower
bounds on the optimal price and market share that
maximize the entrant's revenue, based on which the
entrant selects an available technology to maximize its
long-term profit. For the market with one incumbent, we
model competition between the two NSPs as a
noncooperative game, in which the incumbent and the
entrant choose their market shares independently, and
provide a sufficient condition that guarantees the
existence of at least one pure Nash equilibrium.
Finally, we formalize the problem of entry and
spectrum-sharing scheme selection for the entrant and
provide numerical results to complement our analysis.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhou:2013:RAP,
author = "Yipeng Zhou and Tom Z. J. Fu and Dah Ming Chiu",
title = "On replication algorithm in {P2P VoD}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "233--243",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2196444",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traditional video-on-demand (VoD) systems rely purely
on servers to stream video content to clients, which
does not scale. In recent years, peer-to-peer assisted
VoD (P2P VoD) has proven to be practical and effective.
In P2P VoD, each peer contributes some storage to store
videos (or segments of videos) to help the video
server. Assuming peers have sufficient bandwidth for
the given video playback rate, a fundamental question
is what is the relationship between the storage
capacity (at each peer), the number of videos, the
number of peers, and the resultant off-loading of video
server bandwidth. In this paper, we use a simple
statistical model to derive this relationship. We
propose and analyze a generic replication algorithm
Random with Load Balancing (RLB) that balances the
service to all movies for both deterministic and random
(but stationary) demand models and both homogeneous and
heterogeneous peers (in upload bandwidth). We use
simulation to validate our results for sensitivity
analysis and for comparisons to other popular
replication algorithms. This study leads to several
fundamental insights for P2P VoD system design in
practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Athanasopoulou:2013:BPB,
author = "Eleftheria Athanasopoulou and Loc X. Bui and Tianxiong
Ji and R. Srikant and Alexander Stolyar",
title = "Back-pressure-based packet-by-packet adaptive routing
in communication networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "244--257",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2195503",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Back-pressure-based adaptive routing algorithms where
each packet is routed along a possibly different path
have been extensively studied in the literature.
However, such algorithms typically result in poor delay
performance and involve high implementation complexity.
In this paper, we develop a new adaptive routing
algorithm built upon the widely studied backpressure
algorithm. We decouple the routing and scheduling
components of the algorithm by designing a
probabilistic routing table that is used to route
packets to per-destination queues. The scheduling
decisions in the case of wireless networks are made
using counters called shadow queues. The results are
also extended to the case of networks that employ
simple forms of network coding. In that case, our
algorithm provides a low-complexity solution to
optimally exploit the routing-coding tradeoff.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ayesta:2013:SRE,
author = "Urtzi Ayesta and Martin Erausquin and Matthieu
Jonckheere and Ina Maria Verloop",
title = "Scheduling in a random environment: stability and
asymptotic optimality",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "258--271",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2199764",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the scheduling of a common resource
between several concurrent users when the feasible
transmission rate of each user varies randomly over
time. Time is slotted, and users arrive and depart upon
service completion. This may model, for example, the
flow-level behavior of end-users in a narrowband HDR
wireless channel (CDMA 1xEV-DO). As performance
criteria, we consider the stability of the system and
the mean delay experienced by the users. Given the
complexity of the problem, we investigate the
fluid-scaled system, which allows to obtain important
results and insights for the original system: (1)We
characterize for a large class of scheduling policies
the stability conditions and identify a set of maximum
stable policies, giving in each time-slot preference to
users being in their best possible channel condition.
We find in particular that many opportunistic
scheduling policies like Score-Based, Proportionally
Best, or Potential Improvement are stable under the
maximum stability conditions, whereas the opportunistic
scheduler Relative-Best or the $ c \mu $-rule are not.
(2) We show that choosing the right tie-breaking rule
is crucial for the performance (e.g., average delay) as
perceived by a user. We prove that a policy is
asymptotically optimal if it is maximum stable and the
tie-breaking rule gives priority to the user with the
highest departure probability. We will refer to such
tie-breaking rule as myopic. (3) We derive the growth
rates of the number of users in the system in overload
settings under various policies, which give additional
insights on the performance. (4) We conclude that
simple priority-index policies with the myopic
tie-breaking rule are stable and asymptotically
optimal. All our findings are validated with extensive
numerical experiments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Woo:2013:EIM,
author = "Shinuk Woo and Hwangnam Kim",
title = "An empirical interference modeling for link
reliability assessment in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "272--285",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2197864",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In recent years, it has been widely believed in the
community that the link reliability is strongly related
to received signal strength indicator (RSSI) [or
signal-to-interference-plus-noise ratio (SINR)] and
external interference makes it unpredictable, which is
different from the previous understanding that there is
no tight relationship between the link reliability and
RSSI (or SINR), but multipath fading causes the
unpredictability. However, both cannot fully explain
why the unpredictability appears in the link state. In
this paper, we unravel the following questions: (1)
What causes frame losses that are directly related to
intermediate link states? (2) Is RSSI or SINR a right
criterion to represent the link reliability? (3) Is
there a better measure to assess the link reliability?
We first configured a testbed for performing a real
measurement study to identify the causes of frame
losses, and observed that link reliability depends on
an intraframe SINR distribution, not a single value of
RSSI (or SINR). We also learned that an RSSI value is
not always a good indicator to estimate the link state.
We then conducted a further investigation on the
intraframe SINR distribution and the relationship
between the SINR and link reliability with the ns-2
simulator. Based on these results, we finally propose
an interference modeling framework for estimating link
states in the presence of wireless interferences. We
envision that the framework can be used for developing
link-aware protocols to achieve their optimal
performance in a hostile wireless environment.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Radunovic:2013:DCC,
author = "Bozidar Radunovic and Alexandre Proutiere",
title = "On downlink capacity of cellular data networks with
{WLAN\slash WPAN} relays",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "286--296",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2198072",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the downlink of a cellular network
supporting data traffic in which each user is equipped
with the same type of IEEE 802.11-like WLAN or WPAN
interface used to relay packets to further users. We
are interested in the design guidelines for such
networks and how much capacity improvements the
additional relay layer can bring. A first objective is
to provide a scheduling/relay strategy that maximizes
the network capacity. Using theoretical analysis,
numerical evaluation, and simulations, we find that
when the number of active users is large, the
capacity-achieving strategy divides the cell into two
areas: one closer to the base station where the relay
layer is always saturated and some nodes receive
traffic through both direct and relay links, and the
farther one where the relay is never saturated and the
direct traffic is almost nonexistent. We also show that
it is approximately optimal to use fixed relay link
lengths, and we derive this length. We show that the
obtained capacity is independent of the cell size
(unlike in traditional cellular networks). Based on our
findings, we propose simple decentralized routing and
scheduling protocols. We show that in a fully saturated
network our optimized protocol substantially improves
performance over the protocols that use naive
relay-only or direct-only policies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dan:2013:CDP,
author = "Gy{\"o}rgy D{\'a}n and Niklas Carlsson",
title = "Centralized and distributed protocols for
tracker-based dynamic swarm management",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "297--310",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2198491",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With BitTorrent, efficient peer upload utilization is
achieved by splitting contents into many small pieces,
each of which may be downloaded from different peers
within the same swarm. Unfortunately, piece and
bandwidth availability may cause the file-sharing
efficiency to degrade in small swarms with few
participating peers. Using extensive measurements, we
identified hundreds of thousands of torrents with
several small swarms for which reallocating peers among
swarms and/or modifying the peer behavior could
significantly improve the system performance. Motivated
by this observation, we propose a centralized and a
distributed protocol for dynamic swarm management. The
centralized protocol (CSM) manages the swarms of peers
at minimal tracker overhead. The distributed protocol
(DSM) manages the swarms of peers while ensuring load
fairness among the trackers. Both protocols achieve
their performance improvements by identifying and
merging small swarms and allow load sharing for large
torrents. Our evaluations are based on measurement data
collected during eight days from over 700 trackers
worldwide, which collectively maintain state
information about 2.8 million unique torrents. We find
that CSM and DSM can achieve most of the performance
gains of dynamic swarm management. These gains are
estimated to be up to 40\% on average for small
torrents.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2013:LWS,
author = "Jizhong Zhao and Wei Xi and Yuan He and Yunhao Liu and
Xiang-Yang Li and Lufeng Mo and Zheng Yang",
title = "Localization of wireless sensor networks in the wild:
pursuit of ranging quality",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "311--323",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2200906",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Localization is a fundamental issue of wireless sensor
networks that has been extensively studied in the
literature. Our real-world experience from GreenOrbs, a
sensor network system deployed in a forest, shows that
localization in the wild remains very challenging due
to various interfering factors. In this paper, we
propose CDL, a Combined and Differentiated Localization
approach for localization that exploits the strength of
range-free approaches and range-based approaches using
received signal strength indicator (RSSI). A critical
observation is that ranging quality greatly impacts the
overall localization accuracy. To achieve a better
ranging quality, our method CDL incorporates
virtual-hop localization, local filtration, and
ranging-quality aware calibration. We have implemented
and evaluated CDL by extensive real-world experiments
in GreenOrbs and large-scale simulations. Our
experimental and simulation results demonstrate that
CDL outperforms current state-of-art localization
approaches with a more accurate and consistent
performance. For example, the average location error
using CDL in GreenOrbs system is 2.9 m, while the
previous best method SISR has an average error of 4.6
m.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Koksal:2013:CWN,
author = "C. Emre Koksal and Ozgur Ercetin and Yunus Sarikaya",
title = "Control of wireless networks with secrecy",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "1",
pages = "324--337",
month = feb,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2197410",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:17 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of cross-layer resource
allocation in time-varying cellular wireless networks
and incorporate information theoretic secrecy as a
quality-of-service constraint. Specifically, each node
in the network injects two types of traffic, private
and open, at rates chosen in order to maximize a global
utility function, subject to network stability and
secrecy constraints. The secrecy constraint enforces an
arbitrarily low mutual information leakage from the
source to every node in the network, except for the
sink node. We first obtain the achievable rate region
for the problem for single- and multiuser systems
assuming that the nodes have full channel state
information (CSI) of their neighbors. Then, we provide
a joint flow control, scheduling, and private encoding
scheme, which does not rely on the knowledge of the
prior distribution of the gain of any channel. We prove
that our scheme achieves a utility arbitrarily close to
the maximum achievable utility. Numerical experiments
are performed to verify the analytical results and to
show the efficacy of the dynamic control algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2013:IIC,
author = "Haitao Wu and Zhenqian Feng and Chuanxiong Guo and
Yongguang Zhang",
title = "{ICTCP}: incast congestion control for {TCP} in
data-center networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "345--358",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2197411",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Transport Control Protocol (TCP) incast congestion
happens in high-bandwidth and low-latency networks when
multiple synchronized servers send data to the same
receiver in parallel. For many important data-center
applications such as MapReduce and Search, this
many-to-one traffic pattern is common. Hence TCP incast
congestion may severely degrade their performances,
e.g., by increasing response time. In this paper, we
study TCP incast in detail by focusing on the
relationships between TCP throughput, round-trip time
(RTT), and receive window. Unlike previous approaches,
which mitigate the impact of TCP incast congestion by
using a fine-grained timeout value, our idea is to
design an Incast congestion Control for TCP (ICTCP)
scheme on the receiver side. In particular, our method
adjusts the TCP receive window proactively before
packet loss occurs. The implementation and experiments
in our testbed demonstrate that we achieve almost zero
timeouts and high goodput for TCP incast.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lorenzo:2013:CAN,
author = "Beatriz Lorenzo and Savo Glisic",
title = "Context-aware nanoscale modeling of multicast multihop
cellular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "359--372",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2199129",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a new approach to
optimization of multicast in multihop cellular
networks. We apply a hexagonal tessellation for inner
partitioning of the cell into smaller subcells of
radius r. Subcells may be several orders of magnitude
smaller than, e.g., microcells, resulting in what we
refer to as a nanoscale network model (NSNM), including
a special nanoscale channel model (NSCM) for this
application. For such tessellation, a spatial
interleaving SI MAC protocol is introduced for
context-aware interlink interference management. The
directed flooding routing protocol (DFRP) and
interflooding network coding (IFNC) are proposed for
such a network model including intercell flooding
coordination (ICFC) protocol to minimize the intercell
interference. By adjusting the radius of the subcell,
r, we obtain different hopping ranges that directly
affect the throughput, power consumption, and
interference. With r as the optimization parameter, in
this paper we jointly optimize scheduling, routing, and
power control to obtain the optimum tradeoff between
throughput, delay, and power consumption in multicast
cellular networks. A set of numerical results
demonstrates that the NSNM enables high-resolution
optimization of the system and an effective use of the
context awareness.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Preciado:2013:MBS,
author = "Victor M. Preciado and Ali Jadbabaie",
title = "Moment-based spectral analysis of large-scale networks
using local structural information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "373--382",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2217152",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The eigenvalues of matrices representing the structure
of large-scale complex networks present a wide range of
applications, fromthe analysis of dynamical processes
taking place in the network to spectral techniques
aiming to rank the importance of nodes in the network.
A common approach to study the relationship between the
structure of a network and its eigenvalues is to use
synthetic random networks in which structural
properties of interest, such as degree distributions,
are prescribed. Although very common, synthetic models
present two major flaws: (1) These models are only
suitable to study a very limited range of structural
properties; and (2) they implicitly induce structural
properties that are not directly controlled and can
deceivingly influence the network eigenvalue spectrum.
In this paper, we propose an alternative approach to
overcome these limitations. Our approach is not based
on synthetic models. Instead, we use algebraic graph
theory and convex optimization to study how structural
properties influence the spectrum of eigenvalues of the
network. Using our approach, we can compute, with low
computational overhead, global spectral properties of a
network from its local structural properties. We
illustrate our approach by studying how structural
properties of online social networks influence their
eigenvalue spectra.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Keys:2013:ISI,
author = "Ken Keys and Young Hyun and Matthew Luckie and Kim
Claffy",
title = "{Internet}-scale {IPv4} alias resolution with
{MIDAR}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "383--399",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2198887",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A critical step in creating accurate Internet topology
maps from traceroute data is mapping IP addresses to
routers, a process known as alias resolution. Recent
work in alias resolution inferred aliases based on
similarities in IP ID time series produced by different
IP addresses. We design, implement, and experiment with
a new tool that builds on these insights to scale to
Internet-scale topologies, i.e., millions of addresses,
with greater precision and sensitivity. MIDAR, our
Monotonic ID-Based Alias Resolution tool, provides an
extremely precise ID comparison test based on
monotonicity rather than proximity. MIDAR integrates
multiple probing methods, multiple vantage points, and
a novel sliding-window probe scheduling algorithm to
increase scalability to millions of IP addresses.
Experiments show that MIDAR's approach is effective at
minimizing the false positive rate sufficiently to
achieve a high positive predictive value at Internet
scale. We provide sample statistics from running MIDAR
on over 2 million addresses. We also validate MIDAR and
RadarGun against available ground truth and show that
MIDAR's results are significantly better than
RadarGun's. Tools such as MIDAR can enable longitudinal
study of the Internet's topological evolution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cheng:2013:TBE,
author = "Wei Cheng and Nan Zhang and Xiuzhen Cheng and Min Song
and Dechang Chen",
title = "Time-bounded essential localization for wireless
sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "400--412",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2200107",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In many practical applications of wireless sensor
networks, it is crucial to accomplish the localization
of sensors within a given time bound. We find that the
traditional definition of relative localization is
inappropriate for evaluating its actual overhead in
localization time. To address this issue, we define a
novel problem called essential localization and present
the first rigorous study on the essential
localizability of a wireless sensor network within a
given time bound. Additionally, we propose an efficient
distributed algorithm for time-bounded essential
localization over a sensor network and evaluate the
performance of the algorithm with analysis and
extensive simulation studies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Metnani:2013:SFC,
author = "Ammar Metnani and Brigitte Jaumard",
title = "Stability of {FIPP} $p$-cycles under dynamic traffic
in {WDM} networks: dynamic traffic,failure-independent
path-protecting {(FIPP)} $p$-cycles,path
protection,shared bandwidth protection,stability of
protection structures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "413--425",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2200905",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Application opportunities associated with video,
voice, and data triple-play result in a dramatic demand
increase in metro transport networks, with traffic
patterns becoming increasingly dynamic and difficult to
predict. This is driving the need of core networks with
a high degree of flexibility and multigranularities to
carry traffic. We propose to investigate the question
of what this means in terms of dynamic protection
provisioning. In other words, we want to study how
stable are the protection structures under dynamic
traffic, i.e., how much and how often they need to be
updated in a dynamic survivable WDM network. While most
studies on the stability of protection structures have
been conducted on p -cycles and link shared protection,
we propose to investigate here the stability of
failure-independent path-protecting (FIPP) p -cycles
under dynamic traffic. For doing so, we design and
develop an original scalable mathematical model that we
solve using large-scale optimization tools. Numerical
results show that FIPP p -cycles are remarkably stable
under the evaluation of the number of required optical
bypass reconfigurations under dynamic traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2013:CCS,
author = "Xinyu Zhang and Kang G. Shin",
title = "Cooperative carrier signaling: harmonizing coexisting
{WPAN} and {WLAN} devices",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "426--439",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2200499",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The unlicensed ISM spectrum is getting crowded by
wireless local area network (WLAN) and wireless
personal area network (WPAN) users and devices.
Spectrum sharing within the same network of devices can
be arbitrated by existing MAC protocols, but the
coexistence between WPAN and WLAN (e.g., ZigBee and
WiFi) remains a challenging problem. The traditional
MAC protocols are ineffective in dealing with the
disparate transmit-power levels, asynchronous
time-slots, and incompatible PHY layers of such
heterogeneous networks. Recent measurement studies have
shown moderate-to-high WiFi traffic to severely impair
the performance of coexisting ZigBee. We propose a
novel mechanism, called cooperative carrier signaling
(CCS), that exploits the inherent cooperation among
ZigBee nodes to harmonize their coexistence with WiFi
WLANs. CCS employs a separate ZigBee node to emit a
carrier signal (busy tone) concurrently with the
desired ZigBee's data transmission, thereby enhancing
the ZigBee's visibility to WiFi. It employs an
innovative way to concurrently schedule a busy tone and
a data transmission without causing interference
between them. We have implemented and evaluated CCS on
the TinyOS/MICAz and GNURadio/USRP platforms. Our
extensive experimental evaluation has shown that CCS
reduces collision between ZigBee and WiFi by 50\% for
most cases, and by up to 90\% in the presence of a
high-level interference, all at negligible WiFi
performance loss.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2013:MIC,
author = "Xinbing Wang and Xiaojun Lin and Qingsi Wang and
Wentao Luan",
title = "Mobility increases the connectivity of wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "440--454",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2200260",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the connectivity for
large-scale clustered wireless sensor and ad hoc
networks. We study the effect of mobility on the
critical transmission range for asymptotic connectivity
in k -hop clustered networks and compare to existing
results on nonclustered stationary networks. By
introducing k -hop clustering, any packet from a
cluster member can reach a cluster head within k hops,
and thus the transmission delay is bounded as \Theta
(1) for any finite k. We first characterize the
critical transmission range for connectivity in mobile
k -hop clustered networks where all nodes move under
either the random walk mobility model with nontrivial
velocity or the i.i.d. mobility model. By the term
nontrivial velocity, we mean that the velocity of a
node v is \omega (r(n)), where r(n) is the transmission
range of the node. We then compare with the critical
transmission range for stationary k -hop clustered
networks. In addition, the critical number of neighbors
is studied in a parallel manner for both stationary and
mobile networks. We also study the transmission power
versus delay tradeoff and the average energy
consumption per flow among different types of networks.
We show that random walk mobility with nontrivial
velocities increases connectivity in k -hop clustered
networks, and thus significantly decreases the energy
consumption and improves the power-delay tradeoff. The
decrease of energy consumption per flow is shown to be
\Theta (log n / n$^d$ ) in clustered networks. These
results provide insights on network design and
fundamental guidelines on building a large-scale
wireless network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gelal:2013:TCE,
author = "Ece Gelal and Jianxia Ning and Konstantinos
Pelechrinis and Tae-Suk Kim and Ioannis Broustis and
Srikanth V. Krishnamurthy and Bhaskar D. Rao",
title = "Topology control for effective interference
cancellation in multiuser {MIMO} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "455--468",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2205160",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In multiuser multiple-input-multiple-output (MIMO)
networks, receivers decode multiple concurrent signals
using successive interference cancellation (SIC). With
SIC, a weak target signal can be deciphered in the
presence of stronger interfering signals. However, this
is only feasible if each strong interfering signal
satisfies a signal-to-noise-plus-interference ratio
(SINR) requirement. This necessitates the appropriate
selection of a subset of links that can be concurrently
active in each receiver's neighborhood; in other words,
a subtopology consisting of links that can be
simultaneously active in the network is to be formed.
If the selected subtopologies are of small size, the
delay between the transmission opportunities on a link
increases. Thus, care should be taken to form a limited
number of subtopologies. We find that the problem of
constructing the minimum number of subtopologies such
that SIC decoding is successful with a desired
probability threshold is NP-hard. Given this, we
propose MUSIC, a framework that greedily forms and
activates subtopologies in a way that favors successful
SIC decoding with a high probability. MUSIC also
ensures that the number of selected subtopologies is
kept small. We provide both a centralized and a
distributed version of our framework. We prove that our
centralized version approximates the optimal solution
for the considered problem. We also perform extensive
simulations to demonstrate that: (1) MUSIC forms a
small number of subtopologies that enable efficient SIC
operations; the number of subtopologies formed is at
most 17\% larger than the optimum number of topologies,
discovered through exhaustive search (in small
networks); (2) MUSIC outperforms approaches that simply
consider the number of antennas as a measure for
determining the links that can be simultaneously
active. Specifically, MUSIC provides throughput
improvements of up to four times, as compared to such
an approach, in various topological settings. The
improvements can be directly attributable to a
significantly higher probability of correct SIC based
decoding with MUSIC.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Freris:2013:DAS,
author = "Nikolaos M. Freris and Cheng-Hsin Hsu and Jatinder Pal
Singh and Xiaoqing Zhu",
title = "Distortion-aware scalable video streaming to
multinetwork clients",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "469--481",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2203608",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of scalable video streaming
from a server to multinetwork clients over
heterogeneous access networks, with the goal of
minimizing the distortion of the received videos. This
problem has numerous applications including: (1) mobile
devices connecting to multiple licensed and ISM bands,
and (2) cognitive multiradio devices employing spectrum
bonding. In this paper, we ascertain how to optimally
determine which video packets to transmit over each
access network. We present models to capture the
network conditions and video characteristics and
develop an integer program for deterministic packet
scheduling. Solving the integer program exactly is
typically not computationally tractable, so we develop
heuristic algorithms for deterministic packet
scheduling, as well as convex optimization problems for
randomized packet scheduling. We carry out a thorough
study of the tradeoff between performance and
computational complexity and propose a convex
programming-based algorithm that yields good
performance while being suitable for real-time
applications. We conduct extensive trace-driven
simulations to evaluate the proposed algorithms using
real network conditions and scalable video streams. The
simulation results show that the proposed convex
programming-based algorithm: (1) outperforms the rate
control algorithms defined in the Datagram Congestion
Control Protocol (DCCP) by about 10-15 dB higher video
quality; (2) reduces average delivery delay by over
90\% compared to DCCP; (3) results in higher average
video quality of 4.47 and 1.92 dB than the two
developed heuristics; (4) runs efficiently, up to six
times faster than the best-performing heuristic; and
(5) does indeed provide service differentiation among
users.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altman:2013:COC,
author = "Eitan Altman and Amar Prakash Azad and Tamer Basar and
Francesco {De Pellegrini}",
title = "Combined optimal control of activation and
transmission in delay-tolerant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "482--494",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2206079",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Performance of a delay-tolerant network has strong
dependence on the nodes participating in data
transportation. Such networks often face several
resource constraints especially related to energy.
Energy is consumed not only in data transmission, but
also in listening and in several signaling activities.
On one hand these activities enhance the system's
performance while on the other hand, they consume a
significant amount of energy even when they do not
involve actual node transmission. Accordingly, in order
to use energy efficiently, one may have to limit not
only the amount of transmissions, but also the amount
of nodes that are active at each time. Therefore, we
study two coupled problems: (1) the activation problem
that determines when a mobile will turn on in order to
receive packets; and (2) the problem of regulating the
beaconing. We derive optimal energy management
strategies by formulating the problem as an optimal
control one, which we then explicitly solve. We also
validate our findings through extensive simulations
that are based on contact traces.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2013:LCC,
author = "Po-Kai Huang and Xiaojun Lin and Chih-Chun Wang",
title = "A low-complexity congestion control and scheduling
algorithm for multihop wireless networks with
order-optimal per-flow delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "495--508",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2213343",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Quantifying the end-to-end delay performance in
multihop wireless networks is a well-known challenging
problem. In this paper, we propose a new joint
congestion control and scheduling algorithm for
multihop wireless networks with fixed-route flows
operated under a general interference model with
interference degree $ \kappa $. Our proposed algorithm
not only achieves a provable throughput guarantee
(which is close to at least $ 1 / \kappa $ of the
system capacity region), but also leads to explicit
upper bounds on the end-to-end delay of every flow. Our
end-to-end delay and throughput bounds are in simple
and closed forms, and they explicitly quantify the
tradeoff between throughput and delay of every flow.
Furthermore, the per-flow end-to-end delay bound
increases linearly with the number of hops that the
flow passes through, which is order-optimal with
respect to the number of hops. Unlike traditional
solutions based on the backpressure algorithm, our
proposed algorithm combines window-based flow control
with a new rate-based distributed scheduling algorithm.
A key contribution of our work is to use a novel
stochastic dominance approach to bound the
corresponding per-flow throughput and delay, which
otherwise are often intractable in these types of
systems. Our proposed algorithm is fully distributed
and requires a low per-node complexity that does not
increase with the network size. Hence, it can be easily
implemented in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zarikoff:2013:MPI,
author = "Brad W. Zarikoff and Douglas J. Leith",
title = "Measuring pulsed interference in 802.11 links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "509--521",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2202686",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless IEEE 802.11 links operate in unlicensed
spectrum and so must accommodate other unlicensed
transmitters that generate pulsed interference. We
propose a new approach for detecting the presence of
pulsed interference affecting 802.11 links and for
estimating temporal statistics of this interference.
This approach builds on recent work on distinguishing
collision losses from noise losses in 802.11 links.
When the intervals between interference pulses are
i.i.d., the approach is not confined to estimating the
mean and variance of these intervals, but can recover
the complete probability distribution. The approach is
a transmitter-side technique that provides per-link
information and is compatible with standard hardware.
We demonstrate the effectiveness of the proposed
approach using extensive experimental measurements. In
addition to applications to monitoring, management, and
diagnostics, the fundamental information provided by
our approach can potentially be used to adapt the frame
durations used in a network so as to increase capacity
in the presence of pulsed interference.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2013:PBD,
author = "Lei Yang and Hongseok Kim and Junshan Zhang and Mung
Chiang and Chee Wei Tan",
title = "Pricing-based decentralized spectrum access control in
cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "522--535",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2203827",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates pricing-based spectrum access
control in cognitive radio networks, where primary
users (PUs) sell the temporarily unused spectrum and
secondary users (SUs) compete via random access for
such spectrum opportunities. Compared to existing
market-based approaches with centralized scheduling,
pricing-based spectrum management with random access
provides a platform for SUs contending for spectrum
access and is amenable to decentralized implementation
due to its low complexity. We focus on two market
models, one with a monopoly PU market and the other
with a multiple-PU market. For the monopoly PU market
model, we devise decentralized pricing-based spectrum
access mechanisms that enable SUs to contend for
channel usage. Specifically, we first consider SUs
contending via slotted Aloha. Since the revenue
maximization problem therein is nonconvex, we
characterize the corresponding Pareto-optimal region
and obtain a Pareto-optimal solution that maximizes the
SUs' throughput subject to their budget constraints. To
mitigate the spectrum underutilization due to the
``price of contention,'' we revisit the problem where
SUs contend via CSMA, which results in more efficient
spectrum utilization and higher revenue. We then study
the tradeoff between the PU's utility and its revenue
when the PU's salable spectrum is controllable. Next,
for the multiple-PU market model, we cast the
competition among PUs as a three-stage Stackelberg
game, where each SU selects a PU's channel to maximize
its throughput. We explore the existence and the
uniqueness of Nash equilibrium, in terms of access
prices and the spectrum offered to SUs, and develop an
iterative algorithm for strategy adaptation to achieve
the Nash equilibrium. Our findings reveal that there
exists a unique Nash equilibrium when the number of PUs
is less than a threshold determined by the budgets and
elasticity of SUs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2013:MDO,
author = "Kyunghan Lee and Joohyun Lee and Yung Yi and Injong
Rhee and Song Chong",
title = "Mobile data offloading: how much can {WiFi} deliver?",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "536--550",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2218122",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents a quantitative study on the
performance of 3G mobile data offloading through WiFi
networks. We recruited 97 iPhone users from
metropolitan areas and collected statistics on their
WiFi connectivity during a two-and-a-halfweek period in
February 2010. Our trace-driven simulation using the
acquired whole-day traces indicates that WiFi already
offloads about 65\% of the total mobile data traffic
and saves 55\% of battery power without using any
delayed transmission. If data transfers can be delayed
with some deadline until users enter a WiFi zone,
substantial gains can be achieved only when the
deadline is fairly larger than tens of minutes. With
100-s delays, the achievable gain is less than only
2\%-3\%, whereas with 1 h or longer deadlines, traffic
and energy saving gains increase beyond 29\% and 20\%,
respectively. These results are in contrast to the
substantial gain (20\%-33\%) reported by the existing
work even for 100-s delayed transmission using traces
taken from transit buses or war-driving. In addition, a
distribution model-based simulator and a theoretical
framework that enable analytical studies of the average
performance of offloading are proposed. These tools are
useful for network providers to obtain a rough estimate
on the average performance of offloading for a given
WiFi deployment condition.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2013:QVR,
author = "Alex X. Liu and Amir R. Khakpour",
title = "Quantifying and verifying reachability for access
controlled networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "551--565",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2203144",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Quantifying and querying network reachability is
important for security monitoring and auditing as well
as many aspects of network management such as
troubleshooting, maintenance, and design. Although
attempts to model network reachability have been made,
feasible solutions to computing network reachability
have remained unknown. In this paper, we propose a
suite of algorithms for quantifying reachability based
on network configurations [mainly Access Control Lists
(ACLs)] as well as solutions for querying network
reachability. We present a network reachability model
that considers connectionless and connection-oriented
transport protocols, stateless and stateful routers/
firewalls, static and dynamic NAT, PAT, IP tunneling,
etc. We implemented the algorithms in our network
reachability tool called Quarnet and conducted
experiments on a university network. Experimental
results show that the offline computation of
reachability matrices takes a few hours, and the online
processing of a reachability query takes 0.075s on
average.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tan:2013:OCP,
author = "Bo Tan and Laurent Massouli{\'e}",
title = "Optimal content placement for peer-to-peer
video-on-demand systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "566--579",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2208199",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we address the problem of content
placement in peer-to-peer (P2P) systems, with the
objective of maximizing the utilization of peers'
uplink bandwidth resources. We consider system
performance under a many-user asymptotic. We
distinguish two scenarios, namely ``Distributed Server
Networks'' (DSNs) for which requests are exogenous to
the system, and ``Pure P2P Networks'' (PP2PNs) for
which requests emanate from the peers themselves. For
both scenarios, we consider a loss network model of
performance and determine asymptotically optimal
content placement strategies in the case of a limited
content catalog. We then turn to an alternative ``large
catalog'' scaling where the catalog size scales with
the peer population. Under this scaling, we establish
that storage space per peer must necessarily grow
unboundedly if bandwidth utilization is to be
maximized. Relating the system performance to
properties of a specific random graph model, we then
identify a content placement strategy and a request
acceptance policy that jointly maximize bandwidth
utilization, provided storage space per peer grows
unboundedly, although arbitrarily slowly, with system
size.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Menasche:2013:CAB,
author = "Daniel S. Menasche and Antonio A. {De A.Rocha} and Bin
Li and Don Towsley and Arun Venkataramani",
title = "Content availability and bundling in swarming
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "580--593",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2212205",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "BitTorrent, the immensely popular file swarming
system, suffers a fundamental problem: content
unavailability. Although swarming scales well to
tolerate flash crowds for popular content, it is less
useful for unpopular content as peers arriving after
the initial rush find it unavailable. In this paper, we
present a model to quantify content availability in
swarming systems. We use the model to analyze the
availability and the performance implications of
bundling, a strategy commonly adopted by many
BitTorrent publishers today. We find that even a
limited amount of bundling exponentially reduces
content unavailability. For swarms with highly
unavailable publishers, the availability gain of
bundling can result in a net decrease in average
download time. We empirically confirm the model's
conclusions through experiments on PlanetLab using the
Mainline BitTorrent client.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rozner:2013:MDO,
author = "Eric Rozner and Mi Kyung Han and Lili Qiu and Yin
Zhang",
title = "Model-driven optimization of opportunistic routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "594--609",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2205701",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Opportunistic routing aims to improve wireless
performance by exploiting communication opportunities
arising by chance. A key challenge in opportunistic
routing is how to achieve good, predictable performance
despite the incidental nature of such communication
opportunities and the complicated effects of wireless
interference in IEEE 802.11 networks. To address the
challenge, we develop a model-driven optimization
framework to jointly optimize opportunistic routes and
rate limits for both unicast and multicast traffic. A
distinctive feature of our framework is that the
performance derived from optimization can be achieved
in a real IEEE 802.11 network. Our framework consists
of three key components: (1) a model for capturing the
interference among IEEE 802.11 broadcast transmissions;
(2) a novel algorithm for accurately optimizing
different performance objectives; and (3) effective
techniques for mapping the resulting solutions to
practical routing configurations. Extensive simulations
and testbed experiments show that our approach
significantly out-performs state-of-the-art
shortest-path routing and opportunistic routing
protocols. Moreover, the difference between the
achieved performance and our model estimation is
typically within 20\%. Evaluation in dynamic and
uncontrolled environments further shows that our
approach is robust against inaccuracy introduced by a
dynamic network and it also consistently outperforms
the existing schemes. These results clearly demonstrate
the effectiveness and accuracy of our approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Clementi:2013:OMM,
author = "Andrea Clementi and Francesco Pasquale and Riccardo
Silvestri",
title = "Opportunistic {MANETs}: mobility can make up for low
transmission power",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "610--620",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2204407",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Opportunistic mobile ad hoc networks (MANETs) are a
special class of sparse and disconnected MANETs where
data communication exploits sporadic contact
opportunities among nodes. We consider opportunistic
MANETs where nodes move independently at random over a
square of the plane. Nodes exchange data if they are at
a distance at most r within each other, where r > O is
the node transmission radius. The flooding time is the
number of time-steps required to broadcast a message
from a source node to every node of the network.
Flooding time is an important measure of how fast
information can spread in dynamic networks. We derive
the first upper bound on the flooding time, which is a
decreasing function of the maximal speed of the nodes.
The bound holds with high probability, and it is nearly
tight. Our bound shows that, thanks to node mobility,
even when the network is sparse and disconnected,
information spreading can be fast.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2013:FTR,
author = "Qianhong Wu and Bo Qin and Lei Zhang and Josep
Domingo-Ferrer and Jes{\'u}s A. Manj{\'o}n",
title = "Fast transmission to remote cooperative groups: a new
key management paradigm",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "621--633",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2208201",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The problem of efficiently and securely broadcasting
to a remote cooperative group occurs in many newly
emerging networks. A major challenge in devising such
systems is to overcome the obstacles of the potentially
limited communication from the group to the sender, the
unavailability of a fully trusted key generation
center, and the dynamics of the sender. The existing
key management paradigms cannot deal with these
challenges effectively. In this paper, we circumvent
these obstacles and close this gap by proposing a novel
key management paradigm. The new paradigm is a hybrid
of traditional broadcast encryption and group key
agreement. In such a system, each member maintains a
single public/secret key pair. Upon seeing the public
keys of the members, a remote sender can securely
broadcast to any intended subgroup chosen in an ad hoc
way. Following this model, we instantiate a scheme that
is proven secure in the standard model. Even if all the
nonintended members collude, they cannot extract any
useful information from the transmitted messages. After
the public group encryption key is extracted, both the
computation overhead and the communication cost are
independent of the group size. Furthermore, our scheme
facilitates simple yet efficient member deletion/
addition and flexible rekeying strategies. Its strong
security against collusion, its constant overhead, and
its implementation friendliness without relying on a
fully trusted authority render our protocol a very
promising solution to many applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ji:2013:TOS,
author = "Bo Ji and Changhee Joo and Ness B. Shroff",
title = "Throughput-optimal scheduling in multihop wireless
networks without per-flow information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "634--647",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2205017",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the problem of link
scheduling in multihop wireless networks under general
interference constraints. Our goal is to design
scheduling schemes that do not use per-flow or
per-destination information, maintain a single data
queue for each link, and exploit only local
information, while guaranteeing throughput optimality.
Although the celebrated back-pressure algorithm
maximizes throughput, it requires per-flow or
per-destination information. It is usually difficult to
obtain and maintain this type of information,
especially in large networks, where there are numerous
flows. Also, the backpressure algorithm maintains a
complex data structure at each node, keeps exchanging
queue-length information among neighboring nodes, and
commonly results in poor delay performance. In this
paper, we propose scheduling schemes that can
circumvent these drawbacks and guarantee throughput
optimality. These schemes use either the readily
available hop-count information or only the local
information for each link. We rigorously analyze the
performance of the proposed schemes using fluid limit
techniques via an inductive argument and show that they
are throughput-optimal. We also conduct simulations to
validate our theoretical results in various settings
and show that the proposed schemes can substantially
improve the delay performance in most scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hegde:2013:ECS,
author = "Malati Hegde and Pavan Kumar and K. R. Vasudev and N.
N. Sowmya and S. V. R. Anand and Anurag Kumar and Joy
Kuri",
title = "Experiences with a centralized scheduling approach for
performance management of {IEEE 802.11} wireless
{LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "648--662",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2207402",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a centralized integrated approach for: (1)
enhancing the performance of an IEEE 802.11
infrastructure wireless local area network (WLAN), and
(2) managing the access link that connects the WLAN to
the Internet. Our approach, which is implemented on a
standard Linux platform, and which we call ADvanced
Wi-fi Internet Service EnhanceR (ADWISER), is an
extension of our previous system WLAN Manager (WM).
ADWISER addresses several infrastructure WLAN
performance anomalies such as mixed-rate inefficiency,
unfair medium sharing between simultaneous TCP uploads
and downloads, and inefficient utilization of the
Internet access bandwidth when Internet transfers
compete with LAN-WLAN transfers, etc. The approach is
via centralized queueing and scheduling, using a novel,
configurable, cascaded packet queueing and scheduling
architecture, with an adaptive service rate. In this
paper, we describe the design of ADWISER and report
results of extensive experimentation conducted on a
hybrid testbed consisting of real end-systems and an
emulated WLAN on Qualnet. We also present results from
a physical testbed consisting of one access point (AP)
and a few end-systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lam:2013:GRD,
author = "Simon S. Lam and Chen Qian",
title = "Geographic routing in $d$-dimensional spaces with
guaranteed delivery and low stretch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "2",
pages = "663--677",
month = apr,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2214056",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Sat Jul 13 11:32:23 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Almost all geographic routing protocols have been
designed for 2-D. We present a novel geographic routing
protocol, named Multihop Delaunay Triangulation (MDT),
for 2-D, 3-D, and higher dimensions with these
properties: (1) guaranteed delivery for any connected
graph of nodes and physical links, and (2) low routing
stretch from efficient forwarding of packets out of
local minima. The guaranteed delivery property holds
for node locations specified by accurate, inaccurate,
or arbitrary coordinates. The MDT protocol suite
includes a packet forwarding protocol together with
protocols for nodes to construct and maintain a
distributed MDT for routing. We present the performance
of MDT protocols in 3-D and 4-D as well as performance
comparisons of MDT routing versus representative
geographic routing protocols for nodes in 2-D and 3-D.
Experimental results show that MDT provides the lowest
routing stretch in the comparisons. Furthermore, MDT
protocols are specially designed to handle churn, i.e.,
dynamic topology changes due to addition and deletion
of nodes and links. Experimental results show that
MDT's routing success rate is close to 100\% during
churn, and node states converge quickly to a correct
MDT after churn.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Soh:2013:RID,
author = "De Wen Soh and Wee Peng Tay and Tony Q. S. Quek",
title = "Randomized information dissemination in dynamic
environments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "681--691",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2209676",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider randomized broadcast or information
dissemination in wireless networks with switching
network topologies. We show that an upper bound for the
$ \epsilon $-dissemination time consists of the
conductance bound for a network without switching, and
an adjustment that accounts for the number of informed
nodes in each period between topology changes. Through
numerical simulations, we show that our bound is
asymptotically tight.We apply our results to the case
of mobile wireless networks with unreliable
communication links and establish an upper bound for
the dissemination time when the network undergoes
topology changes and periods of communication link
erasures.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pefkianakis:2013:TMA,
author = "Ioannis Pefkianakis and Suk-Bok Lee and Songwu Lu",
title = "Towards {MIMO}-aware {802.11n} rate adaptation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "692--705",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2207908",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we use real experiments to study
multiple-input-multiple-output (MIMO) 802.11n rate
adaptation (RA) on a programmable access point (AP)
platform. Our case study shows that existing RA
solutions offer much lower throughput than even a
fixed-rate scheme. It is proven that all such
algorithms are MIMO-mode oblivious; they do not
differentiate spatial diversity and spatial
multiplexing modes. We first design MiRA, a novel MIMO
RA scheme that zigzags between intra- and inter-MIMO
modes to addressMIMO 802.11n dynamics. Second, we
examine a window-based RA solution, which runs an
independent RA in each MIMO mode in parallel and a
signal-to-noise ratio (SNR)-based MIMO RA that
differentiates modes using SNR measurements. Our
experiments show that MIMO-mode aware designs
outperform MIMO-mode oblivious RAs in various settings,
with goodput gains up to 73.5\% in field trials.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tan:2013:FAP,
author = "Chee Wei Tan and Mung Chiang and R. Srikant",
title = "Fast algorithms and performance bounds for sum rate
maximization in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "706--719",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2210240",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider a wireless network where
interference is treated as noise, and we study the
nonconvex problem of sum rate maximization by power
control. We focus on finding approximately optimal
solutions that can be efficiently computed to this
NP-hard problem by studying the solutions to two
related problems, the sum rate maximization using a
signal-to-interference-plus-noise ratio (SINR)
approximation and the max-min weighted SINR
optimization. We show that these two problems are
intimately connected, can be solved efficiently by
algorithms with fast convergence and minimal parameter
configuration, and can yield high-quality approximately
optimal solutions to sum rate maximization in the low
interference regime. As an application of these
results, we analyze the connection-level stability of
cross-layer utility maximization in the wireless
network, where users arrive and depart randomly and are
subject to congestion control, and the queue service
rates at all the links are determined by the sum rate
maximization problem. In particular, we determine the
stability region when all the links solve the max-min
weighted SINR problem, using instantaneous queue sizes
as weights.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2013:PVP,
author = "Chris Y. T. Ma and David K. Y. Yau and Nung Kwan Yip
and Nageswara S. V. Rao",
title = "Privacy vulnerability of published anonymous mobility
traces",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "720--733",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2208983",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Mobility traces of people and vehicles have been
collected and published to assist the design and
evaluation of mobile networks, such as large-scale
urban sensing networks. Although the published traces
are often made anonymous in that the true identities of
nodes are replaced by random identifiers, the privacy
concern remains. This is because in real life, nodes
are open to observations in public spaces, or they may
voluntarily or inadvertently disclose partial knowledge
of their whereabouts. Thus, snapshots of nodes'
location information can be learned by interested third
parties, e.g., directly through chance/engineered
meetings between the nodes and their observers, or
indirectly through casual conversations or other
information sources about people. In this paper, we
investigate how an adversary, when equipped with a
small amount of the snapshot information termed as side
information, can infer an extended view of the
whereabouts of a victim node appearing in an anonymous
trace. Our results quantify the loss of victim nodes'
privacy as a function of the nodal mobility, the
inference strategies of adversaries, and any noise that
may appear in the trace or the side information.
Generally, our results indicate that the privacy
concern is significant in that a relatively small
amount of side information is sufficient for the
adversary to infer the true identity (either uniquely
or with high probability) of a victim in a set of
anonymous traces. For instance, an adversary is able to
identify the trace of 30\%-50\% of the victims when she
has collected 10 pieces of side information about a
victim.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nguyen:2013:RSA,
author = "Hung X. Nguyen and Matthew Roughan",
title = "Rigorous statistical analysis of {Internet} loss
measurements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "734--745",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2207915",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Loss measurements are widely used in today's networks.
There are existing standards and commercial products to
perform these measurements. The missing element is a
rigorous statistical methodology for their analysis.
Indeed, most existing tools ignore the correlation
between packet losses and severely underestimate the
errors in the measured loss ratios. In this paper, we
present a rigorous technique for analyzing performance
measurements, in particular, for estimating confidence
intervals of packet loss measurements. The task is
challenging because Internet packet loss ratios are
typically small and the packet loss process is bursty.
Our approach, SAIL, is motivated by some simple
observations about the mechanism of packet losses.
Packet losses occur when the buffer in a switch or
router fills, when there are major routing
instabilities, or when the hosts are overloaded, and so
we expect packet loss to proceed in episodes of loss,
interspersed with periods of successful packet
transmission. This can be modeled as a simple ON/OFF
process, and in fact, empirical measurements suggest
that an alternating renewal process is a reasonable
approximation to the real underlying loss process. We
use this structure to build a hidden semi-Markov model
(HSMM) of the underlying loss process and, from this,
to estimate both loss ratios and confidence intervals
on these loss ratios. We use both simulations and a set
of more than 18 000 hours of real Internet measurements
(between dedicated measurement hosts, PlanetLab hosts,
Web and DNS servers) to cross-validate our estimates
and show that they are better than any current
alternative.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Qian:2013:DCA,
author = "Dajun Qian and Dong Zheng and Junshan Zhang and Ness
B. Shroff and Changhee Joo",
title = "Distributed {CSMA} algorithms for link scheduling in
multihop {MIMO} networks under {SINR} model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "746--759",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2208200",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study distributed scheduling in
multihop multiple-input-multiple-output (MIMO)
networks. We first develop a ``MIMO-pipe'' model that
provides the upper layers a set of rates and
signal-to-interference-plus-noise ratio (SINR)
requirements that capture the rate-reliability tradeoff
in MIMO communications. The main thrust of this paper
is then dedicated to developing distributed carrier
sense multiple access (CSMA) algorithms for MIMO-pipe
scheduling under the SINR interference model. We choose
the SINR model over the extensively studied
protocol-based interference models because it more
naturally captures the impact of interference in
wireless networks. The coupling among the links caused
by the interference under the SINR model makes the
problem of devising distributed scheduling algorithms
very challenging. To that end, we explore the CSMA
algorithms for MIMO-pipe scheduling from two
perspectives. We start with an idealized
continuous-time CSMA network, where control messages
can be exchanged in a collision-free manner, and devise
a CSMA-based link scheduling algorithm that can achieve
throughput optimality under the SINR model. Next, we
consider a discrete-time CSMA network, where the
message exchanges suffer from collisions. For this more
challenging case, we develop a ``conservative''
scheduling algorithm by imposing a more stringent SINR
constraint on the MIMO-pipe model. We show that the
proposed conservative scheduling achieves an efficiency
ratio bounded from below.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Richa:2013:EFM,
author = "Andr{\'e}a Richa and Christian Scheideler and Stefan
Schmid and Jin Zhang",
title = "An efficient and fair {MAC} protocol robust to
reactive interference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "760--771",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2210241",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Interference constitutes a major challenge to
availability for communication networks operating over
a shared medium. This paper proposes the medium access
(MAC) protocol ANTIJAM, which achieves a high and fair
throughput even in harsh environments. Our protocol
mitigates internal interference, requiring no knowledge
about the number of participants in the network. It is
also robust to intentional and unintentional external
interference, e.g., due to coexisting networks or
jammers. We model external interference using a
powerful reactive adversary that can jam a (1- \epsilon
)-portion of the time-steps, where 0 < \epsilon \leq 1
is an arbitrary constant. The adversary uses carrier
sensing to make informed decisions on when it is most
harmful to disrupt communications.Moreover, we allow
the adversary to be adaptive and to have complete
knowledge of the entire protocol history. ANTIJAM makes
efficient use of the nonjammed time periods and
achieves, if \epsilon is constant, a \theta
(1)-competitive throughput. In addition, ANTIJAM
features a low convergence time and has excellent
fairness properties, such that channel access
probabilities do not differ among nodes by more than a
small constant factor.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fang:2013:FGC,
author = "Ji Fang and Kun Tan and Yuanyang Zhang and Shouyuan
Chen and Lixin Shi and Jiansong Zhang and Yongguang
Zhang and Zhenhui Tan",
title = "Fine-grained channel access in wireless {LAN}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "772--787",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2212207",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the increasing of physical-layer (PHY) data rate
in modern wireless local area networks (WLANs) (e.g.,
802.11n), the overhead of media access control (MAC)
progressively degrades data throughput efficiency. This
trend reflects a fundamental aspect of the current MAC
protocol, which allocates the channel as a single
resource at a time. This paper argues that, in a high
data rate WLAN, the channel should be divided into
separate subchannels whose width is commensurate with
the PHY data rate and typical frame size. Multiple
stations can then contend for and use subchannels
simultaneously according to their traffic demands,
thereby increasing overall efficiency. We introduce
FICA, a fine-grained channel access method that
embodies this approach to media access using two novel
techniques. First, it proposes a new PHY architecture
based on orthogonal frequency division multiplexing
(OFDM) that retains orthogonality among subchannels
while relying solely on the coordination mechanisms in
existing WLAN, carrier sensing and broadcasting.
Second, FICA employs a frequency-domain contention
method that uses physical-layer Request to Send/Clear
to Send (RTS/CTS) signaling and frequency domain
backoff to efficiently coordinate subchannel access. We
have implemented FICA, both MAC and PHY layers, using a
software radio platform, and our experiments
demonstrate the feasibility of the FICA design.
Furthermore, our simulation results show FICA can
improve the efficiency of WLANs from a few percent to
600\% compared to existing 802.11.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lalanne:2013:FDC,
author = "Felipe Lalanne and Stephane Maag",
title = "A formal data-centric approach for passive testing of
communication protocols",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "788--801",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2210443",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There is currently a high level of consciousness of
the importance and impact of formally testing
communicating networks. By applying formal description
techniques and formal testing approaches, we are able
to validate the conformance of implementations to the
requirements of communication protocols. In this
context, passive testing techniques are used whenever
the system under test cannot be interrupted or access
to its interfaces is unavailable. Under such
conditions, communication traces are extracted from
points of observation and compared to the expected
behavior formally specified as properties. Since most
works on the subject come from a formal model context,
they are optimized for testing the control part of the
communication with a secondary focus on the data parts.
In the current work, we provide a data-centric approach
for black-box testing of network protocols. A formalism
is provided to express complex properties in a
bottom-up fashion starting from expected data relations
in messages. A novel algorithm is provided for
evaluation of properties in protocol traces.
Experimental results on Session Initiation Protocol
(SIP) traces for IP Multimedia Subsystem (IMS) services
are provided.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Checconi:2013:QEP,
author = "Fabio Checconi and Luigi Rizzo and Paolo Valente",
title = "{QFQ}: efficient packet scheduling with tight
guarantees",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "802--816",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2215881",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Packet scheduling, together with classification, is
one of the most expensive processing steps in systems
providing tight bandwidth and delay guarantees at high
packet rates. Schedulers with near-optimal service
guarantees and O(1) time complexity have been proposed
in the past, using techniques such as timestamp
rounding and flow grouping to keep their execution time
small. However, even the two best proposals in this
family have a per-packet cost component that is linear
either in the number of groups or in the length of the
packet being transmitted. Furthermore, no studies are
available on the actual execution time of these
algorithms. In this paper we make two contributions.
First, we present Quick Fair Queueing (QFQ), a new O
(1) scheduler that provides near-optimal guarantees and
is the first to achieve that goal with a truly constant
cost also with respect to the number of groups and the
packet length. The QFQ algorithm has no loops and uses
very simple instructions and data structures that
contribute to its speed of operation. Second, we have
developed production-quality implementations of QFQ and
of its closest competitors, which we use to present a
detailed comparative performance analysis of the
various algorithms. Experiments show that QFQ fulfills
our expectations, outperforming the other algorithms in
the same class. In absolute terms, even on a low-end
workstation, QFQ takes about 110 ns for an
enqueue()/dequeue() pair (only twice the time of DRR,
but with much better service guarantees).",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2013:SCB,
author = "Tao Li and Shigang Chen and Wen Luo and Ming Zhang and
Yan Qiao",
title = "Spreader classification based on optimal dynamic bit
sharing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "817--830",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2218255",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Spreader classification is an online traffic
measurement function that has many important
applications. In order to keep up with ever-higher line
speed, the recent research trend is to implement such
functions in fast but small on-die SRAM. However, the
mismatch between the huge amount of Internet traffic to
be monitored and limited on-die memory space presents a
significant technical challenge. In this paper, we
propose an Efficient Spreader Classification (ESC)
scheme based on dynamic bit sharing, a compact
information storage method. We design a maximum
likelihood estimation method to extract per-source
information from the compact storage and determine the
heavy spreaders. Our new scheme ensures that false
positive/negative ratios are bounded. Moreover, given
an arbitrary set of bounds, we develop a systematic
approach to determine the optimal system parameters
that minimize the amount of memory needed to meet the
bounds. Experiments based on a real Internet traffic
trace demonstrate that the proposed spreader
classification scheme reduces memory consumption by
3-20 times when compared to the best existing work. We
also investigate a new multi-objective spreader
classification problem and extend our classification
scheme to solve it.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2013:LBA,
author = "Longbo Huang and Scott Moeller and Michael J. Neely
and Bhaskar Krishnamachari",
title = "{LIFO}-backpressure achieves near-optimal
utility-delay tradeoff",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "831--844",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226215",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There has been considerable work developing a
stochastic network utility maximization framework using
Backpressure algorithms, also known as MaxWeight. A key
open problem has been the development of
utility-optimal algorithms that are also
delay-efficient. In this paper, we show that the
Backpressure algorithm, when combined with the
last-in-first-out (LIFO) queueing discipline (called
LIFO-Backpressure), is able to achieve a utility that
is within O(1/V) of the optimal value, for any scalar V
\geq 1, while maintaining an average delay of O ([log(
V )]$^2$ ) for all but a tiny fraction of the network
traffic. This result holds for a general class of
problems with Markovian dynamics. Remarkably, the
performance of LIFO-Backpressure can be achieved by
simply changing the queueing discipline; it requires no
other modifications of the original Backpressure
algorithm. We validate the results through empirical
measurements from a sensor network testbed, which show
a good match between theory and practice. Because some
packets may stay in the queues for a very long time
under LIFO-Backpressure, we further develop the
LIFO$^p$ -Backpressure algorithm, which generalizes
LIFO-Backpressure by allowing interleaving between
first-in-first-out (FIFO) and LIFO. We show that
LIFO$^p$ -Backpressure also achieves the same O(1/V)
close-to-optimal utility performance and guarantees an
average delay of O ([log( V )]$^2$ ) for the packets
that are served during the LIFO period.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{CastroFernandes:2013:ERA,
author = "Natalia {Castro Fernandes} and Marcelo {Duffles Donato
Moreira} and Otto Carlos {Muniz Bandeira Duarte}",
title = "An efficient and robust addressing protocol for node
autoconfiguration in ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "845--856",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227977",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Address assignment is a key challenge in ad hoc
networks due to the lack of infrastructure. Autonomous
addressing protocols require a distributed and
self-managed mechanism to avoid address collisions in a
dynamic network with fading channels, frequent
partitions, and joining/leaving nodes. We propose and
analyze a lightweight protocol that configures mobile
ad hoc nodes based on a distributed address database
stored in filters that reduces the control load and
makes the proposal robust to packet losses and network
partitions.We evaluate the performance of our protocol,
considering joining nodes, partition merging events,
and network initialization. Simulation results show
that our protocol resolves all the address collisions
and also reduces the control traffic when compared to
previously proposed protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2013:CDP,
author = "Fei Chen and Bezawada Bruhadeshwar and Alex X. Liu",
title = "Cross-domain privacy-preserving cooperative firewall
optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "857--868",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2217985",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Firewalls have been widely deployed on the Internet
for securing private networks. A firewall checks each
incoming or outgoing packet to decide whether to accept
or discard the packet based on its policy. Optimizing
firewall policies is crucial for improving network
performance. Prior work on firewall optimization
focuses on either intrafirewall or interfirewall
optimization within one administrative domain where the
privacy of firewall policies is not a concern. This
paper explores interfirewall optimization across
administrative domains for the first time. The key
technical challenge is that firewall policies cannot be
shared across domains because a firewall policy
contains confidential information and even potential
security holes, which can be exploited by attackers. In
this paper, we propose the first cross-domain
privacy-preserving cooperative firewall policy
optimization protocol. Specifically, for any two
adjacent firewalls belonging to two different
administrative domains, our protocol can identify in
each firewall the rules that can be removed because of
the other firewall. The optimization process involves
cooperative computation between the two firewalls
without any party disclosing its policy to the other.
We implemented our protocol and conducted extensive
experiments. The results on real firewall policies show
that our protocol can remove as many as 49\% of the
rules in a firewall, whereas the average is 19.4\%. The
communication cost is less than a few hundred
kilobytes. Our protocol incurs no extra online packet
processing overhead, and the offline processing time is
less than a few hundred seconds.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Premnath:2013:BOB,
author = "Sriram N. Premnath and Daryl Wasden and Sneha K.
Kasera and Neal Patwari and Behrouz Farhang-Boroujeny",
title = "Beyond {OFDM}: best-effort dynamic spectrum access
using filterbank multicarrier",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "869--882",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2213344",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Orthogonal frequency division multiplexing (OFDM),
widely recommended for sharing the spectrum among
different nodes in a dynamic spectrum access network,
imposes tight timing and frequency synchronization
requirements. We examine the use of filterbank
multicarrier (FBMC), a somewhat lesser known and
understood alternative, for dynamic spectrum access.
FBMC promises very low out-of-band energy of each
subcarrier signal when compared to OFDM. In order to
fully understand and evaluate the promise of FBMC, we
first examine the use of special pulse-shaping filters
of the FBMC PHY layer in reliably transmitting data
packets at a very high rate. Next, to understand the
impact of FBMC beyond the PHY layer, we devise a
distributed and adaptive medium access control (MAC)
protocol that coordinates data packet traffic among the
different nodes in the network in a best-effort manner.
Using extensive simulations, we show that FBMC
consistently achieves at least an order of magnitude
performance improvement over OFDM in several aspects
including packet transmission delays, channel access
delays, and effective data transmission rate available
to each node in static, indoor settings. Using
measurements of power spectral density and high data
rate transmissions from a transceiver that we build
using our National Instruments hardware platform, we
show that while FBMC can decode/distinguish all the
received symbols without any errors, OFDM cannot.
Finally, we also examine the use of FBMC in a vehicular
network setup. We find that FBMC achieves an order of
magnitude performance improvement over large distances
in this setup as well. Furthermore, in the case of
multihop vehicular networks, FBMC can achieve about 20$
\times $ smaller end-to-end data packet delivery delays
and relatively low packet drop probabilities. In
summary, FBMC offers a much higher performing
alternative to OFDM for networks that dynamically share
the spectrum among multiple nodes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fogue:2013:ASB,
author = "Manuel Fogue and Piedad Garrido and Francisco J.
Martinez and Juan-Carlos Cano and Carlos T. Calafate
and Pietro Manzoni",
title = "An adaptive system based on roadmap profiling to
enhance warning message dissemination in {VANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "883--895",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2212206",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In recent years, new applications, architectures, and
technologies have been proposed for vehicular ad hoc
networks (VANETs). Regarding traffic safety
applications for VANETs, warning messages have to be
quickly and smartly disseminated in order to reduce the
required dissemination time and to increase the number
of vehicles receiving the traffic warning information.
In the past, several approaches have been proposed to
improve the alert dissemination process in multihop
wireless networks, but none of them were tested in real
urban scenarios, adapting its behavior to the
propagation features of the scenario. In this paper, we
present the Profile-driven Adaptive Warning
Dissemination Scheme (PAWDS) designed to improve the
warning message dissemination process. With respect to
previous proposals, our proposed scheme uses a mapping
technique based on adapting the dissemination strategy
according to both the characteristics of the street
area where the vehicles are moving and the density of
vehicles in the target scenario. Our algorithm reported
a noticeable improvement in the performance of alert
dissemination processes in scenarios based on real city
maps.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Arslan:2013:AAC,
author = "Mustafa Y. Arslan and Konstantinos Pelechrinis and
Ioannis Broustis and Shailendra Singh and Srikanth V.
Krishnamurthy and Sateesh Addepalli and Konstantina
Papagiannaki",
title = "{ACORN}: an auto-configuration framework for {802.11n
WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "896--909",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2218125",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The wide channels feature combines two adjacent
channels to form a new, wider channel to facilitate
high-data-rate transmissions in
multiple-input-multiple-output (MIMO)-based IEEE
802.11n networks. Using a wider channel can exacerbate
interference effects. Furthermore, contrary to what has
been reported by prior studies, we find that wide
channels do not always provide benefits in isolation
(i.e., one link without interference) and can even
degrade performance. We conduct an in-depth,
experimental study to understand the implications of
wide channels on throughput performance. Based on our
measurements, we design an auto-configuration framework
called ACORN for enterprise 802.11n WLANs. ACORN
integrates the functions of user association and
channel allocation since our study reveals that they
are tightly coupled when wide channels are used. We
show that the channel allocation problem with the
constraints of wide channels is NP-complete. Thus,
ACORN uses an algorithm that provides a worst-case
approximation ratio of $ O(1 / \Delta + 1) $, with $
\Delta $ being the maximum node degree in the network.
We implement ACORN on our 802.11n testbed. Our
evaluations show that ACORN: (1) outperforms previous
approaches that are agnostic to wide channels
constraints; it provides per-AP throughput gains
ranging from $ 1.5 \times $ to $ 6 \times $ and (2) in
practice, its channel allocation module achieves an
approximation ratio much better than the theoretically
predicted $ O(1 / \Delta + 1) $.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Han:2013:DCA,
author = "Kai Han and Yang Liu and Jun Luo",
title = "Duty-cycle-aware minimum-energy multicasting in
wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "910--923",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2212452",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In duty-cycled wireless sensor networks, the nodes
switch between active and dormant states, and each node
may determine its active/dormant schedule
independently. This complicates the Minimum-Energy
Multicasting (MEM) problem, which was primarily studied
in always-active wireless ad hoc networks. In this
paper, we study the duty-cycle-aware MEM problem in
wireless sensor networks both for one-to-many
multicasting and for all-to-all multicasting. In the
case of one-to-many multicasting, we present a
formalization of the Minimum-Energy Multicast Tree
Construction and Scheduling (MEMTCS) problem. We prove
that the MEMTCS problem is NP-hard, and it is unlikely
to have an approximation algorithm with a performance
ratio of $ (1 - o(1)) $ in $ \Delta $, where $ \Delta $
is the maximum node degree in a network. We propose a
polynomial-time approximation algorithm for the MEMTCS
problem with a performance ratio of $ O(H(\Delta + 1))
$, where $ H(c) $ is the harmonic number. In the case
of all-to-all multicasting, we prove that the
Minimum-Energy Multicast Backbone Construction and
Scheduling (MEMBCS) problem is also NP-hard and present
an approximation algorithm for it, which has the same
approximation ratio as that of the proposed algorithm
for the MEMTCS problem. We also provide a distributed
implementation of our algorithms, as well as a simple
but efficient collision-free scheduling scheme to avoid
packet loss. Finally, we perform extensive simulations,
and the results demonstrate that our algorithms
significantly outperform other known algorithms in
terms of the total transmission energy cost, without
sacrificing much of the delay performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zheng:2013:FTS,
author = "Yuanqing Zheng and Mo Li",
title = "Fast tag searching protocol for large-scale {RFID}
systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "924--934",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2212454",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Fast searching a particular subset in a large number
of products attached with radio frequency
identification (RFID) tags is of practical importance
for a variety of applications, but not yet thoroughly
investigated. Since the cardinality of the products can
be extremely large, collecting the tag information
directly from each of those tags could be highly
inefficient. To address the tag searching efficiency in
large-scale RFID systems, this paper proposes several
algorithms to meet the stringent delay requirement in
developing fast tag searching protocols. We formally
formulate the tag searching problem in large-scale RFID
systems. We propose utilizing compact approximators to
efficiently aggregate a large volume of RFID tag
information and exchange such information with a
two-phase approximation protocol. By estimating the
intersection of two compact approximators, the proposed
two-phase compact approximator-based tag searching
protocol significantly reduces the searching time
compared to all possible solutions we can directly
borrow from existing studies. We further introduce a
scalable cardinality range estimation method that
provides inexpensive input for our tag searching
protocol. We conduct comprehensive simulations to
validate our design. The results demonstrate that the
proposed tag searching protocol is highly efficient in
terms of both time efficiency and transmission
overhead, leading to good applicability and scalability
for large-scale RFID systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altman:2013:PIM,
author = "Eitan Altman and Philippe Nain and Adam Shwartz and
Yuedong Xu",
title = "Predicting the impact of measures against {P2P}
networks: transient behavior and phase transition",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "935--949",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2217505",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The paper has two objectives. The first is to study
rigorously the transient behavior of some peer-to-peer
(P2P) networks whenever information is replicated and
disseminated according to epidemic-like dynamics. The
second is to use the insight gained from the previous
analysis in order to predict how efficient are measures
taken against P2P networks. We first introduce a
stochastic model that extends a classical epidemic
model and characterize the P2P swarm behavior in
presence of free-riding peers. We then study a second
model in which a peer initiates a contact with another
peer chosen randomly. In both cases, the network is
shown to exhibit phase transitions: A small change in
the parameters causes a large change in the behavior of
the network. We show, in particular, how phase
transitions affect measures of content providers
against P2P networks that distribute nonauthorized
music, books, or articles and what is the efficiency of
countermeasures. In addition, our analytical framework
can be generalized to characterize the heterogeneity of
cooperative peers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2013:RBW,
author = "Tae-Suk Kim and Ioannis Broustis and Serdar Vural and
Dimitris Syrivelis and Shailendra Singh and Srikanth V.
Krishnamurthy and Thomas F. {La Porta}",
title = "Realizing the benefits of wireless network coding in
multirate settings",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "950--962",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2214487",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network coding has been proposed as a technique that
can potentially increase the transport capacity of a
wireless network via mixing data packets at
intermediate routers. However, most previous studies
either assume a fixed transmission rate or do not
consider the impact of using diverse rates on the
network coding gain. Since in many cases, network
coding implicitly relies on overhearing, the choice of
the transmission rate has a big impact on the
achievable gains. The use of higher rates works in
favor of increasing the native throughput. However, it
may in many cases work against effective overhearing.
In other words, there is a tension between the
achievable network coding gain and the inherent rate
gain possible on a link. In this paper, our goal is to
drive the network toward achieving the best tradeoff
between these two contradictory effects. We design a
distributed framework that: (1) facilitates the choice
of the best rate on each link while considering the
need for overhearing; and (2) dictates the choice of
which decoding recipient will acknowledge the reception
of an encoded packet. We demonstrate that both of these
features contribute significantly toward gains in
throughput. We extensively simulate our framework in a
variety of topological settings. We also fully
implement it on real hardware and demonstrate its
applicability and performance gains via
proof-of-concept experiments on our wireless testbed.
We show that our framework yields throughput gains of
up to 390\% as compared to what is achieved in a
rate-unaware network coding framework.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2013:DCL,
author = "Yilin Shen and Nam P. Nguyen and Ying Xuan and My T.
Thai",
title = "On the discovery of critical links and nodes for
assessing network vulnerability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "963--973",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2215882",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The assessment of network vulnerability is of great
importance in the presence of unexpected disruptive
events or adversarial attacks targeting on critical
network links and nodes. In this paper, we study
Critical Link Disruptor (CLD) and Critical Node
Disruptor (CND) optimization problems to identify
critical links and nodes in a network whose removals
maximally destroy the network's functions. We provide a
comprehensive complexity analysis of CLD and CND on
general graphs and show that they still remain
NP-complete even on unit disk graphs and power-law
graphs. Furthermore, the CND problem is shown NP-hard
to be approximated within $ \Omega (n - k / n^\epsilon)
$ on general graphs with $n$ vertices and $k$ critical
nodes. Despite the intractability of these problems, we
propose HILPR, a novel LP-based rounding algorithm, for
efficiently solving CLD and CND problems in a timely
manner. The effectiveness of our solutions is validated
on various synthetic and real-world networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Moazzez-Estanjini:2013:SMN,
author = "Reza Moazzez-Estanjini and Jing Wang and Ioannis Ch.
Paschalidis",
title = "Scheduling mobile nodes for cooperative data transport
in sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "974--989",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2216897",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Message ferrying has been shown to be an effective
approach to support routing in sparse ad hoc or sensor
networks. Considering a generic network model where
each node in the network wishes to send data to some
(or possibly all) other nodes with known (and possibly
different) rates, we propose three schemes enabling
multiple ferries to coordinate in collecting and
delivering the data. We analyze the performance of each
scheme and establish bounds on the average and
worst-case delay. The latter bounds are useful in
offering performance guarantees. We establish that
under one of our schemes, constant per-node throughput
is achievable within constant maximum (worst-case)
delay as the network size grows. Using simulation, we
compare our proposed schemes with an alternative, the
Ferry Relaying algorithm proposed earlier in the
literature. The results show that our schemes perform
better and provide guidance on which scheme to use
given performance preferences and the number of
available ferries.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vissicchio:2013:INA,
author = "Stefano Vissicchio and Laurent Vanbever and Cristel
Pelsser and Luca Cittadini and Pierre Francois and
Olivier Bonaventure",
title = "Improving network agility with seamless {BGP}
reconfigurations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "990--1002",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2217506",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The network infrastructure of Internet service
providers (ISPs) undergoes constant evolution. Whenever
new requirements arise (e.g., the deployment of a new
Point of Presence or a change in the business
relationship with a neighboring ISP), operators need to
change the configuration of the network. Due to the
complexity of the Border Gateway Protocol (BGP) and the
lack of methodologies and tools, maintaining service
availability during reconfigurations that involve BGP
is a challenge for operators. In this paper, we show
that the current best practices to reconfigure BGP do
not provide guarantees with respect to traffic
disruptions. Then, we study the problem of finding an
operational ordering of BGP reconfiguration steps that
guarantees no packet loss. Unfortunately, finding such
an operational ordering, when it exists, is
computationally hard. To enable lossless
reconfigurations, we propose a framework that extends
current features of carrier-grade routers to run two
BGP control planes in parallel. We present a prototype
implementation and show the effectiveness of our
framework through a case study.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Paris:2013:CLM,
author = "Stefano Paris and Cristina Nita-Rotaru and Fabio
Martignon and Antonio Capone",
title = "Cross-layer metrics for reliable routing in wireless
mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "3",
pages = "1003--1016",
month = jun,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230337",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:15 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless mesh networks (WMNs) have emerged as a
flexible and low-cost network infrastructure, where
heterogeneous mesh routers managed by different users
collaborate to extend network coverage. This paper
proposes a novel routing metric, Expected Forwarded
Counter (EFW), and two further variants, to cope with
the problem of selfish behavior (i.e., packet dropping)
of mesh routers in a WMN. EFW combines, in a
cross-layer fashion, routing-layer observations of
forwarding behavior with MAC-layer measurements of
wireless link quality to select the most reliable and
high-performance path. We evaluate the proposed metrics
both through simulations and real-life deployments on
two different wireless testbeds, performing a
comparative analysis with On-Demand Secure Byzantine
Resilient Routing (ODSBR) Protocol and Expected
Transmission Counter (ETX). The results show that our
cross-layer metrics accurately capture the path
reliability and considerably increase the WMN
performance, even when a high percentage of network
nodes misbehave.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2013:HRC,
author = "Kaidi D. Huang and Ken R. Duffy and David Malone",
title = "{H-RCA}: {802.11} collision-aware rate control",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1021--1034",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2216891",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Rate control methodologies that are currently
available in IEEE 802.11 network cards seriously
underutilize network resources and, in addition,
per-second throughputs suffer from high variability. In
this paper, we introduce an algorithm, H-RCA, that
overcomes these shortcomings, giving substantially
higher, and less variable, throughput. The approach
solely uses information already available at the
driver-level to function and can be implemented on
802.11e commodity hardware. H-RCA's design objective is
to minimize the average time each packet spends on the
medium (including retries) in order to maximize total
network throughput. It uses a development of a recently
proposed estimation scheme to distinguish transmission
failures due to collisions from those caused by channel
noise. It employs an estimate of the packet loss ratio
due to noise in assessing whether it is appropriate to
change rate. We demonstrate experimentally that packet
loss ratio is not necessarily a monotonic increasing
function of rate; this is accounted for in H-RCA's
design. A s H-RCA statistically separates noise losses
from those caused by collisions, ns-2 simulations show
that it is robust to changing environments. H-RCA does
not require specific hardware support nor any change to
the IEEE 802.11 protocol. This point is substantiated
with results from an experimental implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sen:2013:DIA,
author = "Sayandeep Sen and Tan Zhang and Syed Gilani and
Shreesha Srinath and Suman Banerjee and Sateesh
Addepalli",
title = "Design and implementation of an ``approximate''
communication system for wireless media applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1035--1048",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226470",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "All practical wireless communication systems are prone
to errors. At the symbol level, such wireless errors
have a well-defined structure: When a receiver decodes
a symbol erroneously, it is more likely that the
decoded symbol is a good ``approximation'' of the
transmitted symbol than a randomly chosen symbol among
all possible transmitted symbols. Based on this
property, we define approximate communication, a method
that exploits this error structure to natively provide
unequal error protection to data bits. Unlike
traditional [forward error correction (FEC)-based]
mechanisms of unequal error protection that consume
additional network and spectrum resources to encode
redundant data, the approximate communication technique
achieves this property at the PHY layer without
consuming any additional network or spectrum resources
(apart from a minimal signaling overhead). Approximate
communication is particularly useful to media delivery
applications that can benefit significantly from
unequal error protection of data bits. We show the
usefulness of this method to such applications by
designing and implementing an end-to-end media delivery
system, called Apex. Our Software Defined Radio
(SDR)-based experiments reveal that Apex can improve
video quality by 5-20 dB [peak signal-to-noise ratio
(PSNR)] across a diverse set of wireless conditions
when compared to traditional approaches. We believe
that mechanisms such as Apex can be a cornerstone in
designing future wireless media delivery systems under
any error-prone channel condition.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Srivastava:2013:BPL,
author = "Rahul Srivastava and Can Emre Koksal",
title = "Basic performance limits and tradeoffs in
energy-harvesting sensor nodes with finite data and
energy storage",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1049--1062",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2218123",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As many sensor network applications require deployment
in remote and hard-to-reach areas, it is critical to
ensure that such networks are capable of operating
unattended for long durations. Consequently, the
concept of using nodes with energy replenishment
capabilities has been gaining popularity. However, new
techniques and protocols must be developed to maximize
the performance of sensor networks with energy
replenishment. Here, we analyze limits of the
performance of sensor nodes with limited energy, being
replenished at a variable rate. We provide a simple
localized energy management scheme that achieves a
performance close to that with an unlimited energy
source and at the same time keeps the probability of
complete battery discharge low. Based on the insights
developed, we address the problem of energy management
for energy-replenishing nodes with finite battery and
finite data buffer capacities. To this end, we give an
energy management scheme that achieves the optimal
utility asymptotically while keeping both the battery
discharge and data loss probabilities low.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ghaderi:2013:IAP,
author = "Javad Ghaderi and R. Srikant",
title = "The impact of access probabilities on the delay
performance of {Q--CSMA} algorithms in wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1063--1075",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2215964",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "It has been recently shown that queue-based carrier
sense multiple access (CSMA) algorithms are
throughput-optimal. In these algorithms, each link of
the wireless network has two parameters: a transmission
probability and an access probability. The transmission
probability of each link is chosen as an appropriate
function of its queue length, however the access
probabilities are simply regarded as some random
numbers since they do not play any role in establishing
the network stability. In this paper, we show that the
access probabilities control the mixing time of the
CSMA Markov chain and, as a result, affect the delay
performance of the CSMA. In particular, we derive
formulas that relate the mixing time to access
probabilities and use these to develop the following
guideline for choosing access probabilities: Each link
$i$ should choose its access probability equal to $ 1 /
(d_i + 1) $, where $ d_i $ is the number of links that
interfere with link $i$. Simulation results show that
this choice of access probabilities results in good
delay performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khakpour:2013:ITA,
author = "Amir R. Khakpour and Alex X. Liu",
title = "An information-theoretical approach to high-speed flow
nature identification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1076--1089",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2219591",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper concerns the fundamental problem of
identifying the content nature of a flow--namely text,
binary, or encrypted--for the first time. We propose
Iustitia, a framework for identifying flow nature on
the fly. The key observation behind Iustitia is that
text flows have the lowest entropy and encrypted flows
have the highest entropy, while the entropy of binary
flows stands in between. We further extend Iustitia for
the finer-grained classification of binary flows so
that we can differentiate different types of binary
flows (such as image, video, and executables) and even
the file formats (such as JPEG and GIF for images, MPEG
and AVI for videos) carried by binary flows. The basic
idea of Iustitia is to classify flows using machine
learning techniques where a feature is the entropy of
every certain number of consecutive bytes. Our
experimental results show that the classification can
be done with high speed and high accuracy. On average,
Iustitia can classify flows with 88.27\% of accuracy
using a buffer size of 1 K with a classification time
of less than 10\% of packet interarrival time for
91.2\% of flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2013:MRG,
author = "Xiaoming Wang and Xiaoyong Li and Dmitri Loguinov",
title = "Modeling residual-geometric flow sampling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1090--1103",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2231435",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic monitoring and estimation of flow parameters
in high-speed routers have recently become challenging
as the Internet grew in both scale and complexity. In
this paper, we focus on a family of flow-size
estimation algorithms we call Residual-Geometric
Sampling (RGS), which generates a random point within
each flow according to a geometric random variable and
records all remaining packets in a flow counter. Our
analytical investigation shows that previous estimation
algorithms based on this method exhibit bias in
recovering flow statistics from the sampled
measurements. To address this problem, we derive a
novel set of unbiased estimators for RGS, validate them
using real Internet traces, and show that they provide
an accurate and scalable solution to Internet traffic
monitoring.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2013:PMS,
author = "Tsern-Huei Lee and Nai-Lun Huang",
title = "A pattern-matching scheme with high throughput
performance and low memory requirement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1104--1116",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2224881",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Pattern-matching techniques have recently been applied
to network security applications such as intrusion
detection, virus protection, and spam filters. The
widely used Aho--Corasick (AC) algorithm can
simultaneously match multiple patterns while providing
a worst-case performance guarantee. However, as
transmission technologies improve, the AC algorithm
cannot keep up with transmission speeds in high-speed
networks. Moreover, it may require a huge amount of
space to store a two-dimensional state transition table
when the total length of patterns is large. In this
paper, we present a pattern-matching architecture
consisting of a stateful pre-filter and an AC-based
verification engine. The stateful pre-filter is optimal
in the sense that it is equivalent to utilizing all
previous query results. In addition, the filter can be
easily realized with bitmaps and simple bitwise-AND and
shift operations. The size of the two-dimensional state
transition table in our proposed architecture is
proportional to the number of patterns, as opposed to
the total length of patterns in previous designs. Our
proposed architecture achieves a significant
improvement in both throughput performance and memory
usage.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2013:UOS,
author = "Longbo Huang and Michael J. Neely",
title = "Utility optimal scheduling in energy-harvesting
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1117--1130",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230336",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we show how to achieve close-to-optimal
utility performance in energy-harvesting networks with
only finite capacity energy storage devices. In these
networks, nodes are capable of harvesting energy from
the environment. The amount of energy that can be
harvested is time-varying and evolves according to some
probability law.We develop an online algorithm, called
the Energy-limited Scheduling Algorithm (ESA), which
jointly manages the energy and makes power allocation
decisions for packet transmissions. ESA only has to
keep track of the amount of energy left at the network
nodes and does not require any knowledge of the
harvestable energy process. We show that ESA achieves a
utility that is within {$ O (\epsilon) $} of the
optimal, for any $ \epsilon > 0 $, while ensuring that
the network congestion and the required capacity of the
energy storage devices are deterministically
upper-bounded by bounds of size {$ O(1 / \epsilon) $}.
We then also develop the Modified-ESA (MESA) algorithm
to achieve the same {$ O(\epsilon) $} close-to-utility
performance, with the average network congestion and
the required capacity of the energy storage devices
being only {$ O([\log (1 / \epsilon)]^2) $}, which is
close to the theoretical lower bound {$ O(\log (1 /
\epsilon)) $}.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karbasi:2013:RLI,
author = "Amin Karbasi and Sewoong Oh",
title = "Robust localization from incomplete local
information",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1131--1144",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2220378",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of localizing wireless devices
in an ad hoc network embedded in a d -dimensional
Euclidean space. Obtaining a good estimate of where
wireless devices are located is crucial in wireless
network applications including environment monitoring,
geographic routing, and topology control. When the
positions of the devices are unknown and only local
distance information is given, we need to infer the
positions from these local distance measurements. This
problem is particularly challenging when we only have
access to measurements that have limited accuracy and
are incomplete. We consider the extreme case of this
limitation on the available information, namely only
the connectivity information is available, i.e., we
only know whether a pair of nodes is within a fixed
detection range of each other or not, and no
information is known about how far apart they are.
Furthermore, to account for detection failures, we
assume that even if a pair of devices are within the
detection range, they fail to detect the presence of
one another with some probability, and this probability
of failure depends on how far apart those devices are.
Given this limited information, we investigate the
performance of a centralized positioning algorithm
MDS-MAP introduced by Shang et al. and a distributed
positioning algorithm HOP-TERRAIN introduced by
Savarese et al. In particular, for a network consisting
of n devices positioned randomly, we provide a bound on
the resulting error for both algorithms. We show that
the error is bounded, decreasing at a rate that is
proportional to R Critical/ R, where R Critical is the
critical detection range when the resulting random
network starts to be connected, and R is the detection
range of each device.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lopez-Perez:2013:DCR,
author = "David L{\'o}pez-P{\'e}rez and Xiaoli Chu and
Athanasios V. Vasilakos and Holger Claussen",
title = "On distributed and coordinated resource allocation for
interference mitigation in self-organizing {LTE}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1145--1158",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2218124",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose a distributed and coordinated radio
resource allocation algorithm for orthogonal frequency
division multiple access (OFDMA)-based cellular
networks to self-organize efficient and stable
frequency reuse patterns. In the proposed radio
resource allocation algorithm, each cell independently
and dynamically allocates modulation and coding scheme
(MCS), resource block (RB), and transmit power to its
users in a way that its total downlink (DL) transmit
power is minimized, while users' throughput demands are
satisfied. Moreover, each cell informs neighboring
cells of the RBs that have been scheduled for its
cell-edge users' DL transmissions through message
passing. Accordingly, the neighboring cells abstain
from assigning high transmit powers to the specified
RBs. Extensive simulation results attempt to
demonstrate that DL power control on a per-RB basis may
play a key role in future networks, and show that the
distributed minimization of DL transmit power at each
cell, supported by intercell interference coordination,
is able to provide a 20\% improvement of network
throughput, considerably reduce the number of user
outages, and significantly enhance spatial reuse, as
compared to cutting-edge resource allocation schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sarkar:2013:DFT,
author = "Rik Sarkar and Jie Gao",
title = "Differential forms for target tracking and aggregate
queries in distributed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1159--1172",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2220857",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Consider mobile targets in a plane and their movements
being monitored by a network such as a field of
sensors. We develop distributed algorithms for
in-network tracking and range queries for aggregated
data (for example, returning the number of targets
within any user given region). Our scheme stores the
target detection information locally in the network and
answers a query by examining the perimeter of the given
range. The cost of updating data about mobile targets
is proportional to the target displacement. The key
insight is to maintain in the sensor network a function
with respect to the target detection data on the graph
edges that is a differential form such that the
integral of this form along any closed curve C gives
the integral within the region bounded by C. The
differential form has great flexibility, making it
appropriate for tracking mobile targets. The basic
range query can be used to find a nearby target or any
given identifiable target with cost O(d), where d is
the distance to the target in question. Dynamic
insertion, deletion, coverage holes, and mobility of
sensor nodes can be handled with only local operations,
making the scheme suitable for a highly dynamic
network. It is extremely robust and capable of
tolerating errors in sensing and target localization.
Targets do not need to be identified for the tracking,
thus user privacy can be preserved. In this paper, we
only elaborate the advantages of differential forms in
tracking of mobile targets. Similar routines can be
applied for organizing many other types of
information--for example, streaming scalar sensor data
(such as temperature data field)--to support efficient
range queries. We demonstrate through analysis and
simulations that this scheme compares favorably to
existing schemes that use location services for
answering aggregate range queries of target detection
data.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Guan:2013:JOR,
author = "Zhangyu Guan and Tommaso Melodia and Dongfeng Yuan",
title = "Jointly optimal rate control and relay selection for
cooperative wireless video streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1173--1186",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2248020",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Physical-layer cooperation allows leveraging the
spatial diversity of wireless channels without
requiring multiple antennas on a single device.
However, most research in this field focuses on
optimizing physical-layer metrics, with little
consideration for network-wide and application-specific
performance measures. This paper studies cross-layer
design techniques for video streaming over cooperative
networks. The problem of joint rate control, relay
selection, and power allocation is formulated as a
mixed-integer nonlinear problem, with the objective of
maximizing the sum peak signal-to-noise ratio (PSNR) of
a set of concurrent video sessions. A global
optimization algorithm based on the branch and bound
framework and on convex relaxation of nonconvex
constraints is then proposed to solve the problem. The
proposed algorithm can provide a theoretical upper
bound on the achievable video quality and is shown to
provably converge to the optimal solution. In addition,
it is shown that cooperative relaying allows nodes to
save energy without leading to a perceivable decrease
in video quality. Based on this observation, an
uncoordinated, distributed, and localized
low-complexity algorithm is designed, for which we
derive conditions for convergence to a Nash equilibrium
(NE) of relay selection. The distributed algorithm is
also shown to achieve performance comparable in
practice to the optimal solution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2013:MLV,
author = "Liang Zhang and Shigang Chen and Ying Jian and Yuguang
Fang and Zhen Mo",
title = "Maximizing lifetime vector in wireless sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1187--1200",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227063",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Maximizing the lifetime of a sensor network has been a
subject of intensive study. However, much prior work
defines the network lifetime as the time before the
first data-generating sensor in the network runs out of
energy or is not reachable to the sink due to network
partition. The problem is that even though one sensor
is out of operation, the rest of the network may well
remain operational, with other sensors generating
useful data and delivering those data to the sink.
Hence, instead of just maximizing the time before the
first sensor is out of operation, we should maximize
the lifetime vector of the network, consisting of the
lifetimes of all sensors, sorted in ascending order.
For this problem, there exists only a centralized
algorithm that solves a series of linear programming
problems with high-order complexities. This paper
proposes a fully distributed algorithm that runs
iteratively. Each iteration produces a lifetime vector
that is better than the vector produced by the previous
iteration. Instead of giving the optimal result in one
shot after lengthy computation, the proposed
distributed algorithm has a result at any time, and the
more time spent gives the better result.We show that
when the algorithm stabilizes, its result produces the
maximum lifetime vector. Furthermore, simulations
demonstrate that the algorithm is able to converge
rapidly toward the maximum lifetime vector with low
overhead.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chang:2013:EGC,
author = "Yeim-Kuan Chang and Cheng-Chien Su and Yung-Chieh Lin
and Sun-Yuan Hsieh",
title = "Efficient gray-code-based range encoding schemes for
packet classification in {TCAM}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1201--1214",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2220566",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An efficient ternary content addressable memory (TCAM)
encoding scheme using a binary reflected Gray code
(BRGC) and the concept of elementary intervals is
presented for efficiently storing arbitrary ranges in
TCAM. The proposed layered BRGC range encoding scheme
(L-BRGC) groups ranges into BRGC range sets in which
each range can be encoded into a single ternary vector.
The results of experiments performed on real-life and
synthesized rule tables show that L-BRGC consumes less
TCAM than all the existing range encoding schemes for
all rule tables, except that the direct conversion
scheme (EIGC) using elementary intervals and BRGC codes
performs best for a small real-life ACL rule table.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2013:FSD,
author = "Xinzhou Wu and Saurabha Tavildar and Sanjay Shakkottai
and Tom Richardson and Junyi Li and Rajiv Laroia and
Aleksandar Jovicic",
title = "{FlashLinQ}: a synchronous distributed scheduler for
peer-to-peer ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1215--1228",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2264633",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper proposes FlashLinQ--a synchronous
peer-to-peer wireless PHY/MAC network architecture.
FlashLinQ leverages the fine-grained parallel channel
access offered by OFDM and incorporates an analog
energy-level-based signaling scheme that enables
signal-to-interference ratio (SIR)-based distributed
scheduling. This new signaling mechanism, and the
concomitant scheduling algorithm, enables efficient
channel-aware spatial resource allocation, leading to
significant gains over a CSMA/CA system using RTS/CTS.
FlashLinQ is a complete system architecture including:
(1) timing and frequency synchronization derived from
cellular spectrum; (2) peer discovery; (3) link
management; and (4) channel-aware distributed power,
data rate, and link scheduling. FlashLinQ has been
implemented for operation over licensed spectrum on a
digital signal processor/field-programmable gate array
(DSP/FPGA) platform. In this paper, we present
FlashLinQ performance results derived from both
measurements and simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hsu:2013:EST,
author = "Chih-Cheng Hsu and Ming-Shing Kuo and Cheng-Fu Chou
and Kate Ching-Ju Lin",
title = "The elimination of spatial-temporal uncertainty in
underwater sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1229--1242",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2220155",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Since data in underwater sensor networks (UWSNs) is
transmitted by acoustic signals, the characteristics of
a UWSN are different from those of a terrestrial sensor
network. Specifically, due to the high propagation
delay of acoustic signals in UWSNs, referred as
spatial-temporal uncertainty, current terrestrial MAC
schemes do not work well in UWSNs. Hence, we consider
spatial-temporal uncertainty in the design of an
energy-efficient TDMA-based MAC protocol for UWSNs. We
first translate the TDMA-based scheduling problem in
UWSNs into a special vertex-coloring problem in the
context of a spatial-temporal conflict graph (ST-CG)
that describes explicitly the conflict delays among
transmission links. With the help of the ST-CG, we
propose two novel heuristic approaches: (1) the
traffic-based one-step trial approach (TOTA) to solve
the coloring problem in a centralized fashion; and for
scalability, (2) the distributed traffic-based one-step
trial approach (DTOTA) to assign the data schedule for
tree-based routing structures in a distributed manner.
In addition, a mixed integer linear programming (MILP)
model is derived to obtain a theoretical bound for the
TDMA-based scheduling problem in UWSNs. Finally, a
comprehensive performance study is presented, showing
that both TOTA and DTOTA guarantee collision-free
transmission. They thus outperform existing MAC schemes
such as S-MAC, ECDiG, and T-Lohi in terms of network
throughput and energy consumption.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2013:EOS,
author = "Zhenghao Zhang and Steven Bronson and Jin Xie and Wei
Hu",
title = "Employing the one-sender-multiple-receiver technique
in wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1243--1255",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2222436",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the
One-Sender-Multiple-Receiver (OSMR) transmission
technique, which allows one sender to send to multiple
receivers simultaneously by utilizing multiple antennas
at the sender. To study the physical-layer
characteristics of OSMR, we implement a prototype OSMR
transmitter/receiver with GNU software defined radio
and conduct experiments in a university building. Our
results are positive and show that wireless channels
allow OSMR for a significant percentage of the time.
Motivated by our physical-layer study, we propose
extensions to the 802.11 MAC protocol to support OSMR
transmission, which is backward-compatible with
existing 802.11 devices. We also note that the access
point (AP) needs a packet scheduling algorithm to
efficiently exploit OSMR. We show that the scheduling
problem without considering the packet transmission
overhead can be formalized as a linear programming
problem, but the scheduling problem considering the
overhead is NP-hard. We then propose a practical
scheduler based on a two-phase algorithm that can also
handle channel fluctuations. We test the proposed
protocol and algorithm with simulations driven by
traffic traces collected from wireless LANs and
channel-state traces collected from our experiments,
and the results show that OSMR significantly improves
the downlink performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lakshminarayana:2013:MMI,
author = "Subhash Lakshminarayana and Atilla Eryilmaz",
title = "Multirate multicasting with intralayer network
coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1256--1269",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226909",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multirate multicasting is a generalization of
single-rate multicasting to prevent destinations with
good connections from being limited by the capacity of
bottleneck connections. While multirate multicasting
has been traditionally performed over fixed trees,
advances in network coding theory have enabled higher
throughput and have helped us move beyond the
restriction of tree structures for routing the
multicast data. In this paper, we address the questions
of optimal rate allocation and low-complexity network
coding solutions to the problem of multirate
multicasting in general multihop networks. Our work
considers intralayer network coding capabilities, where
the session is conceptually divided into layers
optimally and coding is performed across packets
belonging to the same layer. Our approach differs from
earlier works in this domain in its separation of the
problem into rate allocation and content distribution
items, which allows a number of optimization and
graphical techniques in their solution. Noting the
complexities involved in the optimal rate allocation
and content distribution solutions, we then propose and
investigate two novel approaches for reducing the
complexity of the original scheme for more practical
implementation based on a layered multicasting
mechanism and nested optimization approach. We
demonstrate the implementation advantages of these
low-complexity schemes via extensive numerical
studies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ji:2013:DDC,
author = "Shouling Ji and Zhipeng Cai",
title = "Distributed data collection in large-scale
asynchronous wireless sensor networks under the
generalized physical interference model",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1270--1283",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2221165",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless sensor networks (WSNs) are more likely to be
distributed asynchronous systems. In this paper, we
investigate the achievable data collection capacity of
realistic distributed asynchronous WSNs. Our main
contributions include five aspects. First, to avoid
data transmission interference, we derive an R o-proper
carrier-sensing range ( R o --- PCR) under the
generalized physical interference model, where R o is
the satisfied threshold of data receiving rate. Taking
R o --- PCR as its carrier-sensing range, any sensor
node can initiate a data transmission with a guaranteed
data receiving rate. Second, based on R o --- PCR, we
propose a Distributed Data Collection (DDC) algorithm
with fairness consideration. Theoretical analysis of
DDC surprisingly shows that its achievable network
capacity is order-optimal and independent of network
size. Thus, DDC is scalable. Third, we discuss how to
apply R o --- PCR to the distributed data aggregation
problem and propose a Distributed Data Aggregation
(DDA) algorithm. The delay performance of DDA is also
analyzed. Fourth, to be more general, we study the
delay and capacity of DDC and DDA under the Poisson
node distribution model. The analysis demonstrates that
DDC is also scalable and order-optimal under the
Poisson distribution model. Finally, we conduct
extensive simulations to validate the performance of
DDC and DDA.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Himura:2013:SGB,
author = "Yosuke Himura and Kensuke Fukuda and Kenjiro Cho and
Pierre Borgnat and Patrice Abry and Hiroshi Esaki",
title = "Synoptic graphlet: bridging the gap between supervised
and unsupervised profiling of host-level network
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1284--1297",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226603",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "End-host profiling by analyzing network traffic comes
out as a major stake in traffic engineering. Graphlet
constitutes an efficient and common framework for
interpreting host behaviors, which essentially consists
of a visual representation as a graph. However,
graphlet analyses face the issues of choosing between
supervised and unsupervised approaches. The former can
analyze a priori defined behaviors but is blind to
undefined classes, while the latter can discover new
behaviors at the cost of difficult a posteriori
interpretation. This paper aims at bridging the gap
between the two. First, to handle unknown classes,
unsupervised clustering is originally revisited by
extracting a set of graphlet-inspired attributes for
each host. Second, to recover interpretability for each
resulting cluster, a synoptic graphlet, defined as a
visual graphlet obtained by mapping from a cluster, is
newly developed. Comparisons against supervised
graphlet-based, port-based, and payload-based
classifiers with two datasets demonstrate the
effectiveness of the unsupervised clustering of
graphlets and the relevance of the a posteriori
interpretation through synoptic graphlets. This
development is further complemented by studying
evolutionary tree of synoptic graphlets, which
quantifies the growth of graphlets when increasing the
number of inspected packets per host.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Duffy:2013:DCS,
author = "Ken R. Duffy and Charles Bordenave and Douglas J.
Leith",
title = "Decentralized constraint satisfaction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1298--1308",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2222923",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We show that several important resource allocation
problems in wireless networks fit within the common
framework of constraint satisfaction problems (CSPs).
Inspired by the requirements of these applications,
where variables are located at distinct network devices
that may not be able to communicate but may interfere,
we define natural criteria that a CSP solver must
possess in order to be practical. We term these
algorithms decentralized CSP solvers. The best known
CSP solvers were designed for centralized problems and
do not meet these criteria. We introduce a stochastic
decentralized CSP solver, proving that it will find a
solution in almost surely finite time, should one
exist, and also showing it has many practically
desirable properties. We benchmark the algorithm's
performance on a well-studied class of CSPs, random
k-SAT, illustrating that the time the algorithm takes
to find a satisfying assignment is competitive with
stochastic centralized solvers on problems with order a
thousand variables despite its decentralized nature. We
demonstrate the solver's practical utility for the
problems that motivated its introduction by using it to
find a noninterfering channel allocation for a network
formed from data from downtown Manhattan.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vehel:2013:LDM,
author = "Jacques L{\'e}vy V{\'e}hel and Michal Rams",
title = "Large deviation multifractal analysis of a class of
additive processes with correlated nonstationary
increments",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1309--1321",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2229469",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a family of stochastic processes built
from infinite sums of independent positive random
functions on R +. Each of these functions increases
linearly between two consecutive negative jumps, with
the jump points following a Poisson point process on
R+. The motivation for studying these processes stems
from the fact that they constitute simplified models
for TCP traffic. Such processes bear some analogy with
L{\'e}vy processes, but are more complex since their
increments are neither stationary nor independent. In
the work of Barral and L{\'e}vy V{\'e}hel, the
Hausdorff multifractal spectrum of these processes was
computed. We are interested here in their Large
Deviation and Legendre multifractal spectra. These
``statistical'' spectra are seen to give, in this case,
a richer information than the ``geometrical'' Hausdorff
spectrum. In addition, our results provide a firm
theoretical basis for the empirical discovery of the
multifractal nature of TCP traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Caragiannis:2013:EIM,
author = "Ioannis Caragiannis and Michele Flammini and Luca
Moscardelli",
title = "An exponential improvement on the {MST} heuristic for
minimum energy broadcasting in ad hoc wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1322--1331",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2223483",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a new approximation algorithm for the
Minimum Energy Broadcast Routing (MEBR) problem in ad
hoc wireless networks that achieves an exponentially
better approximation factor compared to the well-known
Minimum Spanning Tree (MST) heuristic. Namely, for any
instance where a minimum spanning tree of the set of
stations is guaranteed to cost at most \rho \geq 2
times the cost of an optimal solution for MEBR, we
prove that our algorithm achieves an approximation
ratio bounded by 2 \ln \rho --- 2 \ln 2 +2. This result
is particularly relevant for its consequences on
Euclidean instances where we significantly improve
previous results. In this respect, our experimental
analysis confirms the better performance of the
algorithm also in practice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Galluccio:2013:GMG,
author = "Laura Galluccio and Giacomo Morabito and Sergio
Palazzo",
title = "{GEographic Multicast (GEM)} for dense wireless
networks: protocol design and performance analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "4",
pages = "1332--1346",
month = aug,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2236351",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Mon Sep 9 17:27:57 MDT 2013",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multicast is necessary in several wireless multihop
communication scenarios. Accordingly, it has received a
lot of attention in the past, and several multicast
protocols have been proposed. Nevertheless, traditional
solutions typically incur poor efficiency when there is
a large number of nodes, topology changes occur
frequently, and/or the traffic load is low. Geographic
multicast has been recently exploited to solve the
problems mentioned above. However, these solutions
require exchange of topology information that, again,
can lead to excessive overhead. In this paper, we
propose a new geographic multicast protocol denoted as
GEM, which is inspired by the Euclidean Steiner Tree
(EST) theory and does not require any information
exchange for routing purposes. Therefore, it is very
efficient and scalable in wireless networking scenarios
where other schemes achieve low performance, especially
in terms of energy consumption. In this paper, we also
derive some key properties of GEM that allow us to
characterize the protocol performance. As a major
contribution, we show that these properties are quite
general and apply to a wide range of algorithms
inspired by the EST. Simulation results assess the
derived properties and confirm the effectiveness of the
proposed GEM scheme.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aryafar:2013:SCC,
author = "Ehsan Aryafar and Theodoros Salonidis and Jingpu Shi
and Edward Knightly",
title = "Synchronized {CSMA} contention: model, implementation,
and evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1349--1362",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2228225",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A class of carrier sense multiple access (CSMA)
protocols used in a broad range of wireless
applications uses synchronized contention where nodes
periodically contend at intervals of fixed duration.
While several models exist for asynchronous CSMA
contention used in protocols like IEEE 802.11 MAC, no
model exists for synchronized CSMA contention that also
incorporates realistic factors like clock drifts. In
this paper, we introduce a model that quantifies the
interplay of clock drifts with contention window size,
control packet size, and carrier sense regulated by
usage of guard time. Using a field programmable gate
array (FPGA)-based MAC protocol implementation and
controlled experiments on a wireless testbed, we
evaluate the model predictions on the isolated and
combined impact of these key performance factors to
per-flow throughput and fairness properties in both
single-hop and multihop networks. Our model and
experimental evaluation reveal conditions on protocol
parameters under which the throughput of certain flows
can exponentially decrease; while at the same time, it
enables solutions that can offset such problems in a
predictable manner.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cello:2013:OCC,
author = "Marco Cello and Giorgio Gnecco and Mario Marchese and
Marcello Sanguineti",
title = "Optimality conditions for coordinate-convex policies
in {CAC} with nonlinear feasibility boundaries",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1363--1377",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2222924",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Optimality conditions for Call Admission Control (CAC)
problems with nonlinearly constrained feasibility
regions and K classes of users are derived. The adopted
model is a generalized stochastic knapsack, with
exponentially distributed interarrival times of the
objects. Call admission strategies are restricted to
the family of Coordinate-Convex (CC) policies. For $ K
= 2 $ classes of users, both general structural
properties of the optimal CC policies and structural
properties that depend on the revenue ratio are
investigated. Then, the analysis is extended to the
case $ K > 2 $. The theoretical results are exploited
to narrow the set of admissible solutions to the
associated knapsack problem, i.e., the set of CC
policies to which an optimal one belongs. With respect
to results available in the literature, less
restrictive conditions on the optimality of the
complete-sharing policy are obtained. To illustrate the
role played by the theoretical results on the
combinatorial CAC problem, simulation results are
presented, which show how the number of candidate
optimal CC policies dramatically decreases as the
derived optimality conditions are imposed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2013:DRS,
author = "Minghong Lin and Adam Wierman and Lachlan L. H. Andrew
and Eno Thereska",
title = "Dynamic right-sizing for power-proportional data
centers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1378--1391",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226216",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Power consumption imposes a significant cost for data
centers implementing cloud services, yet much of that
power is used to maintain excess service capacity
during periods of low load. This paper investigates how
much can be saved by dynamically ``right-sizing'' the
data center by turning off servers during such periods
and how to achieve that saving via an online algorithm.
We propose a very general model and prove that the
optimal offline algorithm for dynamic right-sizing has
a simple structure when viewed in reverse time, and
this structure is exploited to develop a new ``lazy''
online algorithm, which is proven to be 3-competitive.
We validate the algorithm using traces from two real
data-center workloads and show that significant cost
savings are possible. Additionally, we contrast this
new algorithm with the more traditional approach of
receding horizon control.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jindal:2013:ECC,
author = "Apoorva Jindal and Konstantinos Psounis",
title = "On the efficiency of {CSMA-CA} scheduling in wireless
multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1392--1406",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2225843",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper establishes that random access scheduling
schemes, and more specifically CSMA-CA, yield
exceptionally good performance in the context of
wireless multihop networks. While it is believed that
CSMA-CA performs significantly worse than optimal, this
belief is usually based on experiments that use rate
allocation mechanisms that grossly underutilize the
available capacity that random access provides. To
establish our thesis, we first compare the achievable
rate region of CSMA-CA and optimal in a number of
carefully constructed multihop topologies and find that
CSMA-CA is always within 48\% of the optimal. Motivated
by this result, we next characterize the worst-case
performance of CSMA-CA in neighborhood topologies
representing the congested regions of larger multihop
topologies by deriving the neighborhood topology that
yields the worst-case throughput ratio for CSMA-CA and
find that in neighborhood topologies with less than 20
edges: (1) CSMA-CA is never worse than 16\% of the
optimal when ignoring physical-layer constraints; and
(2) in any realistic topology with geometric
constraints due to the physical layer, CSMA-CA is never
worse than 30\% of the optimal. Considering that
maximal scheduling achieves much lower bounds than the
above, and greedy maximal scheduling, which is one of
the best known distributed approximation of an optimal
scheduler, achieves similar worst-case bounds, CSMA-CA
is surprisingly efficient.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2013:BNC,
author = "Xiaolan Zhang and Giovanni Neglia and Jim Kurose and
Don Towsley and Haixiang Wang",
title = "Benefits of network coding for unicast application in
disruption-tolerant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1407--1420",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2224369",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the benefits of applying
a form of network coding known as random linear coding
(RLC) to unicast applications in disruption-tolerant
networks (DTNs). Under RLC, nodes store and forward
random linear combinations of packets as they encounter
each other. For the case of a single group of packets
originating from the same source and destined for the
same destination, we prove a lower bound on the
probability that the RLC scheme achieves the minimum
time to deliver the group of packets. Although RLC
significantly reduces group delivery delays, it fares
worse in terms of average packet delivery delay and
network transmissions. When replication control is
employed, RLC schemes reduce group delivery delays
without increasing the number of transmissions. In
general, the benefits achieved by RLC are more
significant under stringent resource (bandwidth and
buffer) constraints, limited signaling, highly dynamic
networks, and when applied to packets in the same flow.
For more practical settings with multiple continuous
flows in the network, we show the importance of
deploying RLC schemes with a carefully tuned
replication control in order to achieve reduction in
average delay, which is observed to be as large as 20\%
when buffer space is constrained.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cuevas:2013:UIC,
author = "Rub{\'e}n Cuevas and Michal Kryczka and Angel Cuevas
and Sebastian Kaune and Carmen Guerrero and Reza
Rejaie",
title = "Unveiling the incentives for content publishing in
popular {BitTorrent} portals",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1421--1435",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2228224",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "BitTorrent is the most popular peer-to-peer (P2P)
content delivery application where individual users
share various types of content with tens of thousands
of other users. The growing popularity of BitTorrent is
primarily due to the availability of valuable content
without any cost for the consumers. However, apart from
the required resources, publishing valuable (and often
copyrighted) content has serious legal implications for
the users who publish the material. This raises the
question that whether (at least major) content
publishers behave in an altruistic fashion or have
other motives such as financial incentives. In this
paper, we identify the content publishers of more than
55 K torrents in two major BitTorrent portals and
examine their characteristics. We discover that around
100 publishers are responsible for publishing 67\% of
the content, which corresponds to 75\% of the
downloads. Our investigation reveals several key
insights about major publishers. First, antipiracy
agencies and malicious users publish ``fake'' files to
protect copyrighted content and spread malware,
respectively. Second, excluding the fake publishers,
content publishing in major BitTorrent portals appears
to be largely driven by companies that try to attract
consumers to their own Web sites for financial gain.
Finally, we demonstrate that profit-driven publishers
attract more loyal consumers than altruistic top
publishers, whereas the latter have a larger fraction
of loyal consumers with a higher degree of loyalty than
the former.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gatmir-Motahari:2013:TCB,
author = "Sara Gatmir-Motahari and Hui Zang and Phyllis
Reuther",
title = "Time-clustering-based place prediction for wireless
subscribers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1436--1446",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2225443",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many of today's applications such as cellular network
management, prediction and control of the spread of
biological and mobile viruses, etc., depend on the
modeling and prediction of human locations. However,
having widespread wireless localization technology,
such as pervasive cell-tower/GPS location estimation
available for only the last few years, many factors
that impact human mobility patterns remain under
researched. Further more, many industries including
telecom providers are still in need of low-cost and
simple location/place prediction methods that can be
implemented on a large scale. In this paper, we focus
on ``temporal factors'' and demonstrate that they
significantly impact randomness, size, and probability
distribution of people's movements. We also use this
information to make simple and inexpensive prediction
models for subscribers' visited places. We monitored
individuals for a month and divided days and hours into
segments for each user to obtain probability
distribution of their places for each segment of time
intervals and observed major improvement in future
``time-based'' predictions of their location compared
to when temporal factors were not considered. In
addition to quantifying the improvement in place
prediction, we show that significant improvements can
actually be achieved through an intuitive division of
time intervals with no added computational
complexity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Arslan:2013:RMS,
author = "Mustafa Y. Arslan and Jongwon Yoon and Karthikeyan
Sundaresan and Srikanth V. Krishnamurthy and Suman
Banerjee",
title = "A resource management system for interference
mitigation in enterprise {OFDMA} femtocells",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1447--1460",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2226245",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To meet the capacity demands from ever-increasing
mobile data usage, mobile network operators are moving
toward smaller cell structures. These small cells,
called femtocells, use sophisticated air interface
technologies such as orthogonal frequency division
multiple access (OFDMA). While femtocells are expected
to provide numerous benefits such as energy efficiency
and better throughput, the interference resulting from
their dense deployments prevents such benefits from
being harnessed in practice. Thus, there is an evident
need for a resource management solution to mitigate the
interference that occurs between collocated femtocells.
In this paper, we design and implement one of the first
resource management systems, FERMI, for OFDMA-based
femtocell networks. As part of its design, FERMI: (1)
provides resource isolation in the frequency domain (as
opposed to time) to leverage power pooling across cells
to improve capacity; (2) uses measurement-driven
triggers to intelligently distinguish clients that
require just link adaptation from those that require
resource isolation; (3) incorporates mechanisms that
enable the joint scheduling of both types of clients in
the same frame; and (4) employs efficient, scalable
algorithms to determine a fair resource allocation
across the entire network with high utilization and low
overhead. We implement FERMI on a prototype four-cell
WiMAX femtocell testbed and show that it yields
significant gains over conventional approaches.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2013:ADF,
author = "Reuven Cohen and Ilia Nudelman and Gleb Polevoy",
title = "On the admission of dependent flows in powerful sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1461--1471",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227792",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we define and study a new problem,
referred to as the Dependent Unsplittable Flow Problem
(D-UFP). We present and discuss this problem in the
context of large-scale powerful (radar/camera) sensor
networks, but we believe it has important applications
on the admission of large flows in other networks as
well. In order to optimize the selection of flows
transmitted to the gateway, D-UFP takes into account
possible dependencies between flows. We show that D-UFP
is more difficult than NP-hard problems for which no
good approximation is known. Then, we address two
special cases of this problem: the case where all the
sensors have a shared channel and the case where the
sensors form a mesh and route to the gateway over a
spanning tree.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gomaa:2013:EIC,
author = "Hazem Gomaa and Geoffrey G. Messier and Carey
Williamson and Robert Davies",
title = "Estimating instantaneous cache hit ratio using
{Markov} chain analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1472--1483",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227338",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper introduces a novel analytical model for
estimating the cache hit ratio as a function of time.
The cache may not reach the steady-state hit ratio when
the number of Web objects, object popularity, and/or
caching resources themselves are subject to change.
Hence, the only way to quantify the hit ratio
experienced by Web users is to calculate the
instantaneous hit ratio. The proposed analysis
considers a single Web cache with infinite or finite
capacity. For a cache with finite capacity, two
replacement policies are considered: Least Recently
Used (LRU) and First-In-First-Out (FIFO). Based on the
insights from the proposed analytical model, we propose
a new replacement policy, called Frequency-Based-FIFO
(FB-FIFO). The results show that FB-FIFO outperforms
both LRU and FIFO, assuming that the number of Web
objects is fixed. Assuming that new popular objects are
generated periodically, the results show that FB-FIFO
adapts faster than LRU and FIFO to the changes in the
popularity of the cached objects when the cache
capacity is large relative to the number of newly
generated objects.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Filippini:2013:NOR,
author = "Ilario Filippini and Eylem Ekici and Matteo Cesana",
title = "A new outlook on routing in cognitive radio networks:
minimum-maintenance-cost routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1484--1498",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2236569",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio networks (CRNs) are composed of
frequency-agile radio devices that allow licensed
(primary) and unlicensed (secondary) users to coexist,
where secondary users opportunistically access channels
without interfering with the operation of primary ones.
From the perspective of secondary users, spectrum
availability is a time-varying network resource over
which multihop end-to-end connections must be
maintained. In this paper, a theoretical outlook on the
problem of routing secondary user flows in a CRN is
provided. The investigation aims to characterize
optimal sequences of routes over which a secondary flow
is maintained. The optimality is defined according to a
novel metric that considers the maintenance cost of a
route as channels, and/or links must be switched due to
the primary user activity. Different from the
traditional notion of route stability, the proposed
approach considers subsequent path selections, as well.
The problem is formulated as an integer programming
optimization model. Properties of the problem are also
formally introduced and leveraged to design a heuristic
algorithm when information on primary user activity is
not complete. Numerical results are presented to assess
the optimality gap of the heuristic routing algorithm
in realistic CRN scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2013:CQF,
author = "Wei Wang and Donghyun Kim and Min Kyung An and Wei Gao
and Xianyue Li and Zhao Zhang and Weili Wu",
title = "On construction of quality fault-tolerant virtual
backbone in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1499--1510",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227791",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the problem of computing
quality fault-tolerant virtual backbone in homogeneous
wireless network, which is defined as the k -connected
m -dominating set problem in a unit disk graph. This
problem is NP-hard, and thus many efforts have been
made to find a constant factor approximation algorithm
for it, but never succeeded so far with arbitrary k
\geq 3 and m \geq 1 pair. We propose a new strategy for
computing a smaller-size 3-connected m -dominating set
in a unit disk graph with any m \geq 1. We show the
approximation ratio of our algorithm is constant and
its running time is polynomial. We also conduct a
simulation to examine the average performance of our
algorithm. Our result implies that while there exists a
constant factor approximation algorithm for the k
-connected m -dominating set problem with arbitrary k
\leq 3 and m \geq 1 pair, the k -connected m
-dominating set problem is still open with k > 3.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liao:2013:DDM,
author = "Yongjun Liao and Wei Du and Pierre Geurts and Guy
Leduc",
title = "{DMFSGD}: a decentralized matrix factorization
algorithm for network distance prediction",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1511--1524",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2228881",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The knowledge of end-to-end network distances is
essential to many Internet applications. As active
probing of all pairwise distances is infeasible in
large-scale networks, a natural idea is to measure a
few pairs and to predict the other ones without
actually measuring them. This paper formulates the
prediction problem as matrix completion where the
unknown entries in a pairwise distance matrix
constructed from a network are to be predicted. By
assuming that the distance matrix has low-rank
characteristics, the problem is solvable by low-rank
approximation based on matrix factorization. The new
formulation circumvents the well-known drawbacks of
existing approaches based on Euclidean embedding. A new
algorithm, so-called Decentralized Matrix Factorization
by Stochastic Gradient Descent (DMFSGD), is proposed.
By letting network nodes exchange messages with each
other, the algorithm is fully decentralized and only
requires each node to collect and to process local
measurements, with neither explicit matrix
constructions nor special nodes such as landmarks and
central servers. In addition, we compared
comprehensively matrix factorization and Euclidean
embedding to demonstrate the suitability of the former
on network distance prediction. We further studied the
incorporation of a robust loss function and of
nonnegativity constraints. Extensive experiments on
various publicly available datasets of network delays
show not only the scalability and the accuracy of our
approach, but also its usability in real Internet
applications.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Agarwal:2013:RWN,
author = "Pankaj K. Agarwal and Alon Efrat and Shashidhara K.
Ganjugunte and David Hay and Swaminathan Sankararaman
and Gil Zussman",
title = "The resilience of {WDM} networks to probabilistic
geographical failures",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1525--1538",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2232111",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Telecommunications networks, and in particular optical
WDM networks, are vulnerable to large-scale failures in
their physical infrastructure, resulting from physical
attacks (such as an electromagnetic pulse attack) or
natural disasters (such as solar flares, earthquakes,
and floods). Such events happen at specific
geographical locations and disrupt specific parts of
the network, but their effects cannot be determined
exactly in advance. Therefore, we provide a unified
framework to model network vulnerability when the event
has a probabilistic nature, defined by an arbitrary
probability density function. Our framework captures
scenarios with a number of simultaneous attacks, when
network components consist of several dependent
subcomponents, and in which either a 1 + 1 or a 1:1
protection plan is in place. We use computational
geometric tools to provide efficient algorithms to
identify vulnerable points within the network under
various metrics. Then, we obtain numerical results for
specific backbone networks, demonstrating the
applicability of our algorithms to real-world
scenarios. Our novel approach allows to identify
locations that require additional protection efforts
(e.g., equipment shielding). Overall, the paper
demonstrates that using computational geometric
techniques can significantly contribute to our
understanding of network resilience.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ji:2013:DBB,
author = "Bo Ji and Changhee Joo and Ness B. Shroff",
title = "Delay-based back-pressure scheduling in multihop
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1539--1552",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227790",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Scheduling is a critical and challenging resource
allocation mechanism for multihop wireless networks. It
is well known that scheduling schemes that favor links
with larger queue length can achieve high throughput
performance. However, these queue-length-based schemes
could potentially suffer from large (even infinite)
packet delays due to the well-known last packet
problem, whereby packets belonging to some flows may be
excessively delayed due to lack of subsequent packet
arrivals. Delay-based schemes have the potential to
resolve this last packet problem by scheduling the link
based on the delay the packet has encountered. However,
characterizing throughput optimality of these
delay-based schemes has largely been an open problem in
multihop wireless networks (except in limited cases
where the traffic is single-hop). In this paper, we
investigate delay-based scheduling schemes for multihop
traffic scenarios with fixed routes. We develop a
scheduling scheme based on a new delay metric and show
that the proposed scheme achieves optimal throughput
performance. Furthermore, we conduct simulations to
support our analytical results and show that the
delay-based scheduler successfully removes excessive
packet delays, while it achieves the same throughput
region as the queue-length-based scheme.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Banchs:2013:GTA,
author = "Albert Banchs and Andres Garcia-Saavedra and Pablo
Serrano and Joerg Widmer",
title = "A game-theoretic approach to distributed opportunistic
scheduling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1553--1566",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2228500",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Distributed opportunistic scheduling (DOS) is
inherently more difficult than conventional
opportunistic scheduling due to the absence of a
central entity that knows the channel state of all
stations. With DOS, stations use random access to
contend for the channel and, upon winning a contention,
they measure the channel conditions. After measuring
the channel conditions, a station only transmits if the
channel quality is good; otherwise, it gives up the
transmission opportunity. The distributed nature of DOS
makes it vulnerable to selfish users: By deviating from
the protocol and using more transmission opportunities,
a selfish user can gain a greater share of wireless
resources at the expense of ``well-behaved'' users. In
this paper, we address the problem of selfishness in
DOS from a game-theoretic standpoint. We propose an
algorithm that satisfies the following properties: (1)
When all stations implement the algorithm, the wireless
network is driven to the optimal point of operation;
and (2) one or more selfish stations cannot obtain any
gain by deviating from the algorithm. The key idea of
the algorithm is to react to a selfish station by using
a more aggressive configuration that (indirectly)
punishes this station. We build on multivariable
control theory to design a mechanism for punishment
that is sufficiently severe to prevent selfish
behavior, yet not so severe as to render the system
unstable. We conduct a game-theoretic analysis based on
repeated games to show the algorithm's effectiveness
against selfish stations. These results are confirmed
by extensive simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2013:HFP,
author = "Myungjin Lee and Nick Duffield and Ramana Rao
Kompella",
title = "High-fidelity per-flow delay measurements with
reference latency interpolation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1567--1580",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2227793",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "New applications such as soft real-time data center
applications, algorithmic trading, and high-performance
computing require extremely low latency (in
microseconds) from networks. Network operators today
lack sufficient fine-grain measurement tools to detect,
localize, and repair delay spikes that cause
application service level agreement (SLA) violations. A
recently proposed solution called LDA provides a
scalable way to obtain latency, but only provides
aggregate measurements. However, debugging
application-specific problems requires per-flow
measurements since different flows may exhibit
significantly different characteristics even when they
are traversing the same link. To enable fine-grained
per-flow measurements in routers, we propose a new
scalable architecture called reference latency
interpolation (RLI) that is based on our observation
that packets potentially belonging to different flows
that are closely spaced to each other exhibit similar
delay properties. In our evaluation using simulations
over real traces, we show that while having small
overhead, RLI achieves a median relative error of 12\%
and one to two orders of magnitude higher accuracy than
previous per-flow measurement solutions. We also
observe RLI achieves as high accuracy as LDA in
aggregate latency estimation, and RLI outperforms LDA
in standard deviation estimation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sappidi:2013:MAT,
author = "Rajasekhar Sappidi and Andr{\'e} Girard and Catherine
Rosenberg",
title = "Maximum achievable throughput in a wireless sensor
network using in-network computation for statistical
functions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1581--1594",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230642",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many applications require the sink to compute a
function of the data collected by the sensors. Instead
of sending all the data to the sink, the intermediate
nodes could process the data they receive to
significantly reduce the volume of traffic transmitted:
this is known as in-network computation. Instead of
focusing on asymptotic results for large networks as is
the current practice, we are interested in explicitly
computing the maximum achievable throughput of a given
network when the sink is interested in the first M
statistical moments of the collected data. Here, the k
th statistical moment is defined as the expectation of
the k th power of the data. Flow models have been
routinely used in multihop wireless networks when there
is no in-network computation, and they are typically
tractable for relatively large networks. However,
deriving such models is not obvious when in-network
computation is allowed. We develop a discrete-time
model for the real-time network operation and perform
two transformations to obtain a flow model that keeps
the essence of in-network computation. This gives an
upper bound on the maximum achievable throughput. To
show its tightness, we derive a numerical lower bound
by computing a solution to the discrete-time model
based on the solution to the flow model. This lower
bound turns out to be close to the upper bound, proving
that the flow model is an excellent approximation to
the discrete-time model. We then provide several
engineering insights on these networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aryafar:2013:AAB,
author = "Ehsan Aryafar and Mohammad Ali Khojastepour and
Karthik Sundaresan and Sampath Rangarajan and Edward
Knightly",
title = "{ADAM}: an adaptive beamforming system for
multicasting in wireless {LANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1595--1608",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2228501",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present the design and implementation of ADAM, the
first adaptive beamforming-based multicast system and
experimental framework for indoor wireless
environments. ADAM addresses the joint problem of
adaptive beamformer design at the PHY layer and client
scheduling at the MAC layer by proposing efficient
algorithms that are amenable to practical
implementation. ADAM is implemented on a field
programmable gate array (FPGA) platform, and its
performance is compared against that of omnidirectional
and switched beamforming based multicast. Our
experimental results reveal that: (1) switched
multicast beamforming has limited gains in indoor
multipath environments, whose deficiencies can be
effectively overcome by ADAM to yield an average gain
of threefold; (2) the higher the dynamic range of the
discrete transmission rates employed by the MAC
hardware, the higher the gains in ADAM's performance,
yielding up to ninefold improvement over omni with the
802.11 rate table; and (3) finally, ADAM's performance
is susceptible to channel variations due to user
mobility and infrequent channel information feedback.
However, we show that training ADAM's signal-to-noise
ratio (SNR)-rate mapping to incorporate feedback rate
and coherence time significantly increases its
robustness to channel dynamics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sahneh:2013:GEM,
author = "Faryad Darabi Sahneh and Caterina Scoglio and Piet
{Van Mieghem}",
title = "Generalized epidemic mean-field model for spreading
processes over multilayer complex networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1609--1620",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2239658",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Mean-field deterministic epidemic models have been
successful in uncovering several important dynamic
properties of stochastic epidemic spreading processes
over complex networks. In particular, individual-based
epidemic models isolate the impact of the network
topology on spreading dynamics. In this paper, the
existing models are generalized to develop a class of
models that includes the spreading process in
multilayer complex networks. We provide a detailed
description of the stochastic process at the agent
level where the agents interact through different
layers, each represented by a graph. The set of
differential equations that describes the time
evolution of the state occupancy probabilities has an
exponentially growing state-space size in terms of the
number of the agents. Based on a mean-field type
approximation, we developed a set of nonlinear
differential equations that has linearly growing
state-space size. We find that the latter system,
referred to as the generalized epidemic mean-field
(GEMF) model, has a simple structure characterized by
the elements of the adjacency matrices of the network
layers and the Laplacian matrices of the transition
rate graphs. Finally, we present several examples of
epidemic models, including spreading of virus and
information in computer networks and spreading of
multiple pathogens in a host population.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2013:CDM,
author = "Kyunghan Lee and Yoora Kim and Song Chong and Injong
Rhee and Yung Yi and Ness B. Shroff",
title = "On the critical delays of mobile networks under
{L{\'e}vy} walks and {L{\'e}vy} flights",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1621--1635",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2229717",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Delay-capacity tradeoffs for mobile networks have been
analyzed through a number of research works. However,
L{\'e}vy mobility known to closely capture human
movement patterns has not been adopted in such work.
Understanding the delay-capacity tradeoff for a network
with L{\'e}vy mobility can provide important insights
into understanding the performance of real mobile
networks governed by human mobility. This paper
analytically derives an important point in the
delay-capacity tradeoff for L{\'e}vy mobility, known as
the critical delay. The critical delay is the minimum
delay required to achieve greater throughput than what
conventional static networks can possibly achieve
(i.e., $ O(1 / \sqrt n) $ per node in a network with n
nodes). The L{\'e}vy mobility includes L{\'e}vy flight
and L{\'e}vy walk whose step-size distributions
parametrized by $ \alpha \in (0, 2) $ are both
heavy-tailed while their times taken for the same step
size are different. Our proposed technique involves:
(1) analyzing the joint spatio-temporal probability
density function of a time-varying location of a node
for L{\'e}vy flight, and (2) characterizing an embedded
Markov process in L{\'e}vy walk, which is a semi-Markov
process. The results indicate that in L{\'e}vy walk,
there is a phase transition such that for $ \alpha \in
(0, 1) $, the critical delay is always $ \Theta (n^{ 1
/ 2 }) $, and for $ \alpha \in [1, 2] $ it is $ \Theta
(n^{\alpha / 2}) $. In contrast, L{\'e}vy flight has
the critical delay $ \Theta (n^{\alpha / 2}) $ for $
\alpha \in (0, 2) $.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kim:2013:TOC,
author = "Tae Hyun Kim and Jian Ni and R. Srikant and Nitin H.
Vaidya",
title = "Throughput-optimal {CSMA} with imperfect carrier
sensing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1636--1650",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2233495",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recently, it has been shown that a simple, distributed
backlog-based carrier-sense multiple access (CSMA)
algorithm is throughput-optimal. However, throughput
optimality is established under the perfect or ideal
carrier-sensing assumption, i.e., each link can
precisely sense the presence of other active links in
its neighborhood. In this paper, we investigate the
achievable throughput of the CSMA algorithm under
imperfect carrier sensing. Through the analysis on both
false positive and negative carrier sensing failures,
we show that CSMA can achieve an arbitrary fraction of
the capacity region if certain access probabilities are
set appropriately. To establish this result, we use the
perturbation theory of Markov chains.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khalili:2013:MPO,
author = "Ramin Khalili and Nicolas Gast and Miroslav Popovic
and Jean-Yves {Le Boudec}",
title = "{MPTCP} is not {Pareto}-optimal: performance issues
and a possible solution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1651--1665",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2274462",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multipath TCP (MPTCP) has been proposed recently as a
mechanism for transparently supporting multiple
connections to the application layer. It is under
discussion at the IETF. We nevertheless demonstrate
that the current MPTCP suffers from two problems: (P1)
Upgrading some TCP users to MPTCP can reduce the
throughput of others without any benefit to the
upgraded users, which is a symptom of not being
Pareto-optimal; and (P2) MPTCP users could be
excessively aggressive toward TCP users. We attribute
these problems to the linked-increases algorithm (LIA)
of MPTCP and, more specifically, to an excessive amount
of traffic transmitted over congested paths. The design
of LIA forces a tradeoff between optimal resource
pooling and responsiveness. We revisit the problem and
show that it is possible to provide these two
properties simultaneously. We implement the resulting
algorithm, called the opportunistic linked-increases
algorithm (OLIA), in the Linux kernel, and we study its
performance over our testbed by simulations and by
theoretical analysis. We prove that OLIA is
Pareto-optimal and satisfies the design goals of MPTCP.
Hence, it can avoid the problems P1 and P2. Our
measurements and simulations indicate that MPTCP with
OLIA is as responsive and nonflappy as MPTCP with LIA
and that it solves problems P1 and P2.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shin:2013:FCW,
author = "Ji-Yong Shin and Emin Gn Sirer and Hakim Weatherspoon
and Darko Kirovski",
title = "On the feasibility of completely wireless
datacenters",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "5",
pages = "1666--1679",
month = oct,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2274480",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:25 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Conventional datacenters, based on wired networks,
entail high wiring costs, suffer from performance
bottlenecks, and have low resilience to network
failures. In this paper, we investigate a radically new
methodology for building wire-free datacenters based on
emerging 60-GHz radio frequency (RF) technology. We
propose a novel rack design and a resulting network
topology inspired by Cayley graphs that provide a dense
interconnect. Our exploration of the resulting design
space shows that wireless datacenters built with this
methodology can potentially attain higher aggregate
bandwidth, lower latency, and substantially higher
fault tolerance than a conventional wired datacenter
while improving ease of construction and maintenance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Balan:2013:AED,
author = "Horia Vlad Balan and Ryan Rogalin and Antonios
Michaloliakos and Konstantinos Psounis and Giuseppe
Caire",
title = "{AirSync}: enabling distributed multiuser {MIMO} with
full spatial multiplexing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1681--1695",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230449",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The enormous success of advanced wireless devices is
pushing the demand for higher wireless data rates.
Denser spectrum reuse through the deployment of more
access points (APs) per square mile has the potential
to successfully meet such demand. In principle,
distributed multiuser multiple-input-multiple-output
(MU-MIMO) provides the best approach to infrastructure
density increase since several access points are
connected to a central server and operate as a large
distributed multiantenna access point. This ensures
that all transmitted signal power serves the purpose of
data transmission, rather than creating interference.
In practice, however, a number of implementation
difficulties must be addressed, the most significant of
which is aligning the phases of all jointly coordinated
APs. In this paper, we propose AirSync, a novel scheme
that provides timing and phase synchronization accurate
enough to enable distributed MU-MIMO. AirSync detects
the slot boundary such that all APs are
time-synchronous within a cyclic prefix (CP) of the
orthogonal frequency-division multiplexing (OFDM)
modulation and predicts the instantaneous carrier phase
correction along the transmit slot such that all
transmitters maintain their coherence, which is
necessary for multiuser beamforming. We have
implemented AirSync as a digital circuit in the field
programmable gate array (FPGA) of the WARP radio
platform. Our experimental testbed, comprising four APs
and four clients, shows that AirSync is able to achieve
timing synchronization within the OFDM CP and carrier
phase coherence within a few degrees. For the purpose
of demonstration, we have implemented two MU-MIMO
precoding schemes, Zero-Forcing Beamforming (ZFBF) and
Tomlinson-Harashima Precoding (THP). In both cases, our
system approaches the theoretical optimal multiplexing
gains. We also discuss aspects related to the MAC and
multiuser scheduling design, in relation to the
distributed MU-MIMO architecture. To the best of our
knowledge, AirSync offers the first realization of the
full distributed MU-MIMO multiplexing gain, namely the
ability to increase the number of active wireless
clients per time-frequency slot linearly with the
number of jointly coordinated APs, without reducing the
per client rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xue:2013:DGC,
author = "Dongyue Xue and Eylem Ekici",
title = "Delay-guaranteed cross-layer scheduling in multihop
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1696--1707",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230404",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a cross-layer scheduling
algorithm that achieves a throughput ``$ \epsilon
$-close'' to the optimal throughput in multihop
wireless networks with a tradeoff of $ O (1 / \epsilon)
$ in average end-to-end delay guarantees. The algorithm
guarantees finite buffer sizes and aims to solve a
joint congestion control, routing, and scheduling
problem in a multihop wireless network while satisfying
per-flow average end-to-end delay constraints and
minimum data rate requirements. This problem has been
solved for both backlogged as well as arbitrary arrival
rate systems. Moreover, we discuss the design of a
class of low-complexity suboptimal algorithms, effects
of delayed feedback on the optimal algorithm, and
extensions of the proposed algorithm to different
interference models with arbitrary link capacities.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Karaca:2013:OSP,
author = "Mehmet Karaca and Karim Khalil and Eylem Ekici and
Ozgur Ercetin",
title = "Optimal scheduling and power allocation in
cooperate-to-join cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1708--1721",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2230187",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, optimal resource allocation policies
are characterized for wireless cognitive networks under
the spectrum leasing model. We propose cooperative
schemes in which secondary users share the time-slot
with primary users in return for cooperation.
Cooperation is feasible only if the primary system's
performance is improved over the non-cooperative case.
First, we investigate a scheduling problem where
secondary users are interested in immediate rewards.
Here, we consider both infinite and finite backlog
cases. Then, we formulate another problem where the
secondary users are guaranteed a portion of the primary
utility, on a long-term basis, in return for
cooperation. Finally, we present a power allocation
problem where the goal is to maximize the expected net
benefit defined as utility minus cost of energy. Our
proposed scheduling policies are shown to outperform
non-cooperative scheduling policies, in terms of
expected utility and net benefit, for a given set of
feasible constraints. Based on Lyapunov optimization
techniques, we show that our schemes are arbitrarily
close to the optimal performance at the price of
reduced convergence rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiang:2013:CDA,
author = "Liu Xiang and Jun Luo and Catherine Rosenberg",
title = "Compressed data aggregation: energy-efficient and
high-fidelity data collection",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1722--1735",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2229716",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We focus on wireless sensor networks (WSNs) that
perform data collection with the objective of obtaining
the whole dataset at the sink (as opposed to a function
of the dataset). In this case, energy-efficient data
collection requires the use of data aggregation.
Whereas many data aggregation schemes have been
investigated, they either compromise the fidelity of
the recovered data or require complicated in-network
compressions. In this paper, we propose a novel data
aggregation scheme that exploits compressed sensing
(CS) to achieve both recovery fidelity and energy
efficiency in WSNs with arbitrary topology. We make use
of diffusion wavelets to find a sparse basis that
characterizes the spatial (and temporal) correlations
well on arbitrary WSNs, which enables straightforward
CS-based data aggregation as well as high-fidelity data
recovery at the sink. Based on this scheme, we
investigate the minimum-energy compressed data
aggregation problem. We first prove its
NP-completeness, and then propose a mixed integer
programming formulation along with a greedy heuristic
to solve it. We evaluate our scheme by extensive
simulations on both real datasets and synthetic
datasets. We demonstrate that our compressed data
aggregation scheme is capable of delivering data to the
sink with high fidelity while achieving significant
energy saving.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Srebrny:2013:NMD,
author = "Piotr H. Srebrny and Thomas Plagemann and Vera Goebel
and Andreas Mauthe",
title = "No more {D{\'e}j{\`a} Vu}: eliminating redundancy with
cachecast: feasibility and performance gains",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1736--1749",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2236104",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Due to the lack of multicast services in the Internet,
applications based on single-source,
multiple-destination transfers such as video
conferencing, IP radio, and IPTV must use unicast. This
type of traffic exhibits high redundancy with temporal
clustering of duplicated packets. The redundancy
originates from multiple transfers of the same data
chunk over the same link. We propose CacheCast, a
link-layer caching mechanism that eliminates the
redundant data transmissions using small caches on
links. CacheCast's underlying principles are simplicity
and reliability. It is a fully distributed and
incrementally deployable architecture. It consists of
small caches on links that act independently and a
server support that simplifies the link cache
operation. Our analysis indicates that transfers of the
same data to multiple destinations with CacheCast can
achieve near-multicast efficiency in terms of consumed
link bandwidth. The implementation of CacheCast proves
its feasibility, efficiency, and the improvements of
the server.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Baccarelli:2013:OSA,
author = "Enzo Baccarelli and Nicola Cordeschi and Valentina
Polli",
title = "Optimal self-adaptive {QoS} resource management in
interference-affected multicast wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1750--1759",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2237411",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we focus on the quality-of-service
(QoS)-constrained jointly optimal congestion control,
network coding, and adaptive distributed power control
for connectionless wireless networks affected by
multiple access interference (MAI). The goal is to
manage the available network resources, so as to
support multiple multicast sessions with QoS
requirements when intrasession network coding (NC) is
allowed. To cope with the nonconvex nature of the
resulting cross-layer optimization problem, we propose
a two-level decomposition that provides the means to
attain the optimal solution through suitable relaxed
convex versions of its comprising subproblems.
Sufficient conditions for the equivalence of the
primary nonconvex problem and its related convex
version are derived, occurrence of such conditions
investigated, and performance with respect to
conventional routing-based layered solutions analyzed.
Moreover, we develop a distributed algorithm to compute
the actual solution of the resource allocation problem
that quickly adapts to network time-evolutions.
Performance of this algorithm and its adaptivity are
evaluated in the presence of varying network/fading
conditions and noisy measurements.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leonard:2013:DIW,
author = "Derek Leonard and Dmitri Loguinov",
title = "Demystifying {Internet}-wide service discovery",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1760--1773",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2231434",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper develops a high-performance, Internet-wide
service discovery tool, which we call IRLscanner, whose
main design objectives have been to maximize politeness
at remote networks, allow scanning rates that achieve
coverage of the Internet in minutes/hours (rather than
weeks/months), and significantly reduce administrator
complaints. Using IRLscanner and 24-h scans, we perform
21 Internet-wide experiments using six different
protocols (i.e., DNS, HTTP, SMTP, EPMAP, ICMP, and UDP
ECHO), demonstrate the usefulness of ACK scans in
detecting live hosts behind stateless firewalls, and
undertake the first Internet-wide OS fingerprinting. In
addition, we analyze the feedback generated (e.g.,
complaints, IDS alarms) and suggest novel approaches
for reducing the amount of blowback during similar
studies, which should enable researchers to collect
valuable experimental data in the future with
significantly fewer hurdles.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Al-Kofahi:2013:SRS,
author = "Osameh M. Al-Kofahi and Ahmed E. Kamal",
title = "Scalable redundancy for sensors-to-sink
communication",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1774--1784",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2231878",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a new technique that uses
deterministic binary network coding in a distributed
manner to enhance the resiliency of sensor-to-base
information flow against packet loss. First, we show
how to use network coding to tolerate a single packet
loss by combining the data units from sensor nodes to
produce $ k + 1 $ combinations such that any $k$ of
them are solvable. After that, we extend the solution
to tolerate multiple losses. Moreover, we study the
coding efficiency issue and introduce the idea of
relative indexing to reduce the coding coefficients
overhead. To tolerate node or link failures, we
introduce a simple routing protocol that can find
maximally disjoint paths from the $k$ sensor nodes to
the base station (BS). We study the relationship
between the probability of successful recovery of all
data units at the BS, and the number of sources
protected together taking into consideration their hop
distance from the BS. From this study, we can decide on
the appropriate number of sources to be protected
together, so that the probability of successful
recovery is higher than a certain threshold. Finally,
we show through a simulation study that our approach is
highly scalable and performs better as the network size
increases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Joe-Wong:2013:MAF,
author = "Carlee Joe-Wong and Soumya Sen and Tian Lan and Mung
Chiang",
title = "Multiresource allocation: fairness-efficiency
tradeoffs in a unifying framework",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1785--1798",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2233213",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Quantifying the notion of fairness is underexplored
when there are multiple types of resources and users
request different ratios of the different resources. A
typical example is data centers processing jobs with
heterogeneous resource requirements on CPU, memory,
network bandwidth, etc. In such cases, a tradeoff
arises between equitability, or ``fairness,'' and
efficiency. This paper develops a unifying framework
addressing the fairness-efficiency tradeoff in light of
multiple types of resources. We develop two families of
fairness functions that provide different tradeoffs,
characterize the effect of user requests'
heterogeneity, and prove conditions under which these
fairness measures satisfy the Pareto efficiency,
sharing incentive, and envy-free properties. Intuitions
behind the analysis are explained in two visualizations
of multiresource allocation. We also investigate
people's fairness perceptions through an online survey
of allocation preferences.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2013:NCD,
author = "Zhijun Li and Guang Gong",
title = "On the node clone detection in wireless sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1799--1811",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2233750",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless sensor networks are vulnerable to the node
clone, and several distributed protocols have been
proposed to detect this attack. However, they require
too strong assumptions to be practical for large-scale,
randomly deployed sensor networks. In this paper, we
propose two novel node clone detection protocols with
different tradeoffs on network conditions and
performance. The first one is based on a distributed
hash table (DHT), by which a fully decentralized,
key-based caching and checking system is constructed to
catch cloned nodes effectively. The protocol
performance on efficient storage consumption and high
security level is theoretically deducted through a
probability model, and the resulting equations, with
necessary adjustments for real application, are
supported by the simulations. Although the DHT-based
protocol incurs similar communication cost as previous
approaches, it may be considered a little high for some
scenarios. To address this concern, our second
distributed detection protocol, named randomly directed
exploration, presents good communication performance
for dense sensor networks, by a probabilistic directed
forwarding technique along with random initial
direction and border determination. The simulation
results uphold the protocol design and show its
efficiency on communication overhead and satisfactory
detection probability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Singh:2013:OFD,
author = "Chandramani Singh and Eitan Altman and Anurag Kumar
and Rajesh Sundaresan",
title = "Optimal forwarding in delay-tolerant networks with
multiple destinations",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1812--1826",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2233494",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the tradeoff between delivery delay and
energy consumption in a delay-tolerant network in which
a message (or a file) has to be delivered to each of
several destinations by epidemic relaying. In addition
to the destinations, there are several other nodes in
the network that can assist in relaying the message. We
first assume that, at every instant, all the nodes know
the number of relays carrying the message and the
number of destinations that have received the message.
We formulate the problem as a controlled
continuous-time Markov chain and derive the optimal
closed-loop control (i.e., forwarding policy). However,
in practice, the intermittent connectivity in the
network implies that the nodes may not have the
required perfect knowledge of the system state. To
address this issue, we obtain an ordinary differential
equation (ODE) (i.e., a deterministic fluid)
approximation for the optimally controlled Markov
chain. This fluid approximation also yields an
asymptotically optimal open-loop policy. Finally, we
evaluate the performance of the deterministic policy
over finite networks. Numerical results show that this
policy performs close to the optimal closed-loop
policy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ouyang:2013:ATO,
author = "Ming Ouyang and Lei Ying",
title = "Approaching throughput optimality with limited
feedback in multichannel wireless downlink networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1827--1838",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2235459",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies the allocation of feedback
resources in the downlink of a frequency-division
duplex (FDD) multichannel wireless system. We consider
a downlink network with a single base station, $L$
shared channels, and $N$ mobile users. Throughput
optimal algorithms like MaxWeight in general require
the complete channel-state information (CSI) ($ N L $
link states) for scheduling. Acquiring the complete
CSI, however, is a prohibitive overhead in multichannel
networks when the number of users is large. In this
paper, we consider the scenario where the base station
allocates only a limited amount of uplink resources for
acquiring channel-state information. We first show that
to support a $ (1 - \epsilon) $ fraction of the full
throughput region (the throughput region with the
complete CSI), the base station needs to acquire at
least $ \Theta ((1 - \epsilon) L) $ link states at each
time-slot. We then propose a Weight-Based Feedback
allocation, named WBF, and show that WBF together with
MaxWeight scheduling achieves a $ (1 - \epsilon) $
fraction of the full throughput region by acquiring $
\Theta (L \log 1 / \epsilon) $ link states per
time-slot. For i.i.d. ON-OFF channels, we further prove
that $ \Theta (L \log 1 / \epsilon) $ link states per
time-slot is necessary for achieving a $ (1 - \epsilon)
$ fraction of the full throughput region.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fukushima:2013:MDR,
author = "Masaki Fukushima and Kohei Sugiyama and Teruyuki
Hasegawa and Toru Hasegawa and Akihiro Nakao",
title = "Minimum disclosure routing for network virtualization
and its experimental evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1839--1851",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2238950",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "Although the virtual collocation of service providers
(SPs) on top of infrastructure providers (InPs) via
network virtualization brings various benefits, we
posit that operational confidentiality has not been
considered in this network model. We extend and apply
the Secure Multiparty Computation (SMC) protocol to
solving Minimum Disclosure Routing (MDR), namely,
enabling an SP to route packets without disclosing
routing information to InPs. We implement the proposed
MDR protocol and evaluate its performance via
experiments by comparing it against the prediction
based on our analytical performance model. Our study
reveals that MDR can be securely achieved with marginal
latency overhead with regard to the convergence time in
well-engineered nonsecure routing algorithms. Our study
sheds light on the path for network virtualization to
be used to resolve the challenges for the ISPs of
today.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Laoutaris:2013:DTB,
author = "Nikolaos Laoutaris and Georgios Smaragdakis and Rade
Stanojevic and Pablo Rodriguez and Ravi Sundaram",
title = "Delay-tolerant bulk data transfers on the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1852--1865",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2237555",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many emerging scientific and industrial applications
require transferring multiple terabytes of data on a
daily basis. Examples include pushing scientific data
from particle accelerators/ colliders to laboratories
around the world, synchronizing datacenters across
continents, and replicating collections of
high-definition videos from events taking place at
different time-zones. A key property of all above
applications is their ability to tolerate delivery
delays ranging from a few hours to a few days. Such
delay-tolerant bulk (DTB) data are currently being
serviced mostly by the postal system using hard drives
and DVDs, or by expensive dedicated networks. In this
paper, we propose transmitting such data through
commercial ISPs by taking advantage of already-paid-for
off-peak bandwidth resulting from diurnal traffic
patterns and percentile pricing. We show that between
sender-receiver pairs with small time-zone difference,
simple source scheduling policies are able to take
advantage of most of the existing off-peak capacity.
When the time-zone difference increases, taking
advantage of the full capacity requires performing
store-and-forward through intermediate storage nodes.
We present an extensive evaluation of the two options
based on traffic data from 200+ links of a large
transit provider with points of presence (PoPs) at
three continents. Our results indicate that there
exists huge potential for performing multiterabyte
transfers on a daily basis at little or no additional
cost.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2013:PON,
author = "Richard T. B. Ma and Vishal Misra",
title = "The public option: a nonregulatory alternative to
network neutrality",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1866--1879",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2237412",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network neutrality and the role of regulation on the
Internet have been heavily debated in recent times.
Among the various definitions of network neutrality, we
focus on the one that prohibits paid prioritization of
content. We develop a model of the Internet ecosystem
in terms of three primary players: consumers, ISPs, and
content providers. We analyze this issue from the point
of view of the consumer and target the desired system
state that maximizes consumer utility. By analyzing
various structures of an ISP market, we obtain
different conclusions on the desirability of
regulation. We also introduce the notion of a Public
Option ISP, an ISP that carries traffic in a
network-neutral manner. We find: (1) in a monopolistic
scenario, network-neutral regulations might benefit
consumers, however the introduction of a Public Option
ISP is even better as it aligns the interests of the
monopolistic ISP with the consumer utility; and (2) in
an oligopolistic scenario, the presence of a Public
Option ISP is again preferable to network-neutral
regulations, although the presence of competing
nonneutral ISPs provides the most desirable situation
for the consumers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2013:ECI,
author = "Yin Wang and Yuan He and Xufei Mao and Yunhao Liu and
Xiang-Yang Li",
title = "Exploiting constructive interference for scalable
flooding in wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1880--1889",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2238951",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Constructive interference-based flooding (CIBF) is a
latency-optimal flooding protocol, which can realize
millisecond network flooding latency and submicrosecond
time synchronization accuracy, require no network state
information, and be adapted to topology changes.
However, constructive interference (CI) has a
precondition to function, i.e., the maximum temporal
displacement $ \Delta $ of concurrent packet
transmissions should be less than a given hardware
constrained threshold (e.g., $ 0.5 \micro $ s, for the
IEEE 802.15.4 radio). In this paper, we derive the
closed-form packet reception ratio (PRR) formula for
CIBF and theoretically disclose that CIBF suffers the
scalability problem. The packet reception performance
of intermediate nodes degrades significantly as the
density or the size of the network increases. We
analytically show that CIBF has a PRR lower bound
(94.5\%) in the grid topology. Based on this
observation, we propose the spine constructive
interference-based flooding (SCIF) protocol for an
arbitrary uniformly distributed topology. Extensive
simulations show that SCIF floods the entire network
much more reliably than the state-of-the-art Glossy
protocol does in high-density or large-scale networks.
We further explain the root cause of CI with waveform
analysis, which is mainly examined in simulations and
experiments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Triay:2013:ABP,
author = "Joan Triay and Cristina Cervell{\'o}-Pastor and Vinod
M. Vokkarane",
title = "Analytical blocking probability model for hybrid
immediate and advance reservations in optical {WDM}
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1890--1903",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2235857",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Immediate reservation (IR) and advance reservation
(AR) are the two main reservation mechanisms currently
implemented on large-scale scientific optical networks.
They can be used to satisfy both provisioning delay and
low blocking for delay-tolerant applications.
Therefore, it seems reasonable that future optical
network provisioning systems will provide both
mechanisms in hybrid IR/AR scenarios. Nonetheless, such
scenarios can increase the blocking of IR if no
quality-of-service (QoS) policies are implemented. A
solution could be to quantify such blocking performance
based on the current network load and implement
mechanisms that would act accordingly. However, current
blocking analytical models are not able to deal with
both IR and AR. In this paper, we propose an analytical
model to compute the network-wide blocking performance
of different IR/AR classes within the scope of a
multiservice framework for optical wavelength-division
multiplexing (WDM) networks. Specifically, we calculate
the blocking on two common optical network scenarios
using the fixed-point approximation analysis: on
wavelength conversion capable and wavelength-continuity
constrained networks. Performance results show that our
model provides good accuracy compared to simulation
results, even in a scenario with multiple reservation
classes defined by different book-ahead times.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2013:FAA,
author = "Huasen Wu and Chenxi Zhu and Richard J. La and Xin Liu
and Youguang Zhang",
title = "{FASA}: accelerated {S-ALOHA} using access history for
event-driven {M2M} communications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1904--1917",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2241076",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Supporting massive device transmission is challenging
in machine-to-machine (M2M) communications.
Particularly, in event-driven M2M communications, a
large number of devices become activated within a short
period of time, which in turn causes high radio
congestions and severe access delay. To address this
issue, we propose a Fast Adaptive S-ALOHA (FASA) scheme
for random access control of M2M communication systems
with bursty traffic. Instead of the observation in a
single slot, the statistics of consecutive idle and
collision slots are used in FASA to accelerate the
tracking process of network status that is critical for
optimizing S-ALOHA systems. With a design based on
drift analysis, the estimate of the number of the
active devices under FASA converges fast to the true
value. Furthermore, by examining the T-slot drifts, we
prove that the proposed FASA scheme is stable as long
as the average arrival rate is smaller than $ e^{-1} $,
in the sense that the Markov chain derived from the
scheme is geometrically ergodic. Simulation results
demonstrate that under highly bursty traffic, the
proposed FASA scheme outperforms traditional additive
schemes such as PB-ALOHA and achieves near-optimal
performance in reducing access delays. Moreover,
compared to multiplicative schemes, FASA shows its
robustness under heavy traffic load in addition to
better delay performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2013:RPA,
author = "William Wei-Liang Li and Yuan Shen and Ying Jun Zhang
and Moe Z. Win",
title = "Robust power allocation for energy-efficient
location-aware networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1918--1930",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2276063",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless location-aware networks, mobile nodes
(agents) typically obtain their positions using the
range measurements to the nodes with known positions.
Transmit power allocation not only affects network
lifetime and throughput, but also determines
localization accuracy. In this paper, we present an
optimization framework for robust power allocation in
network localization with imperfect knowledge of
network parameters. In particular, we formulate power
allocation problems to minimize localization errors for
a given power budget and show that such formulations
can be solved via conic programming. Moreover, we
design a distributed power allocation algorithm that
allows parallel computation among agents. The
simulation results show that the proposed schemes
significantly outperform uniform power allocation, and
the robust schemes outperform their non-robust
counterparts when the network parameters are subject to
uncertainty.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wolf:2013:HPC,
author = "Tilman Wolf and Sriram Natarajan and Kamlesh T.
Vasudevan",
title = "High-performance capabilities for $1$-hop containment
of network attacks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1931--1946",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2240463",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Capabilities-based networks present a fundamental
shift in the security design of network architectures.
Instead of permitting the transmission of packets from
any source to any destination, routers deny forwarding
by default. For a successful transmission, packets need
to positively identify themselves and their permissions
to the router. A major challenge for a high-performance
implementation of such a network is an efficient design
of the credentials that are carried in the packet and
the verification procedure on the router. We present a
capabilities system that uses packet credentials based
on Bloom filters. The credentials are of fixed length
(independent of the number of routers that are
traversed by the packet) and can be verified by routers
with a few simple operations. This high-performance
design of capabilities makes it feasible that traffic
is verified on every router in the network, and most
attack traffic can be contained within a single hop. We
present an analysis of our design and a practical
protocol implementation that can effectively limit
unauthorized traffic with only a small per-packet
overhead.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2013:GTA,
author = "Dejun Yang and Guoliang Xue and Xi Fang and
Satyajayant Misra and Jin Zhang",
title = "A game-theoretic approach to stable routing in max-min
fair networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1947--1959",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2247416",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a game-theoretic study of
the problem of routing in networks with max-min fair
congestion control at the link level. The problem is
formulated as a noncooperative game, in which each user
aims to maximize its own bandwidth by selecting its
routing path. We first prove the existence of Nash
equilibria. This is important, because at a Nash
equilibrium (NE), no user has any incentive to change
its routing strategy--leading to a stable state. In
addition, we investigate how the selfish behavior of
users may affect the performance of the network as a
whole. We next introduce a novel concept of observed
available bandwidth on each link. It allows a user to
find a path with maximum bandwidth under max-min fair
congestion control in polynomial time, when paths of
other users are fixed. We then present a game-based
algorithm to compute an NE and prove that by following
the natural game course, the network converges to an
NE. Extensive simulations show that the algorithm
converges to an NE within 10 iterations and also
achieves better fairness compared to other
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shafiq:2013:LSM,
author = "M. Zubair Shafiq and Lusheng Ji and Alex X. Liu and
Jeffrey Pang and Jia Wang",
title = "Large-scale measurement and characterization of
cellular machine-to-machine traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1960--1973",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2256431",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cellular network-based machine-to-machine (M2M)
communication is fast becoming a market-changing force
for a wide spectrum of businesses and applications such
as telematics, smart metering, point-of-sale terminals,
and home security and automation systems. In this
paper, we aim to answer the following important
question: Does traffic generated by M2M devices impose
new requirements and challenges for cellular network
design and management? To answer this question, we take
a first look at the characteristics of M2M traffic and
compare it to traditional smartphone traffic. We have
conducted our measurement analysis using a week-long
traffic trace collected from a tier-1 cellular network
in the US. We characterize M2M traffic from a wide
range of perspectives, including temporal dynamics,
device mobility, application usage, and network
performance. Our experimental results show that M2M
traffic exhibits significantly different patterns than
smartphone traffic inmultiple aspects. For instance,
M2M devices have a much larger ratio of
uplink-to-downlink traffic volume, their traffic
typically exhibits different diurnal patterns, they are
more likely to generate synchronized traffic resulting
in bursty aggregate traffic volumes, and are less
mobile compared to smartphones. On the other hand, we
also find that M2M devices are generally competing with
smartphones for network resources in co-located
geographical regions. These and other findings suggest
that better protocol design, more careful spectrum
allocation, and modified pricing schemes may be needed
to accommodate the rise of M2M devices.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2013:EPI,
author = "Tao Li and Shigang Chen and Yibei Ling",
title = "Efficient protocols for identifying the missing tags
in a large {RFID} system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1974--1987",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2245510",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Compared to the classical barcode system, radio
frequency identification (RFID) extends the operational
distance from inches to a number of feet (passive RFID
tags) or even hundreds of feet (active RFID tags).
Their wireless transmission, processing, and storage
capabilities enable them to support full automation of
many inventory management functions in industry. This
paper studies the practically important problem of
monitoring a large set of active RFID tags and
identifying the missing ones--the objects that the
missing tags are associated with are likely to be
missing as well. This monitoring function may need to
be executed frequently and therefore should be made
efficient in terms of execution time in order to avoid
disruption of normal inventory operations. Based on
probabilistic methods, we design a series of
missing-tag identification protocols that employ novel
techniques to reduce the execution time. Our best
protocol reduces the time for detecting the missing
tags by an order of magnitude when compared to existing
protocols.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Pei:2013:AAT,
author = "Guanhong Pei and Srinivasan Parthasarathy and Aravind
Srinivasan and Anil Kumar S. Vullikanti",
title = "Approximation algorithms for throughput maximization
in wireless networks with delay constraints",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "1988--2000",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2247415",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of throughput maximization in
multihop wireless networks with end-to-end delay
constraints for each session. This problem has received
much attention starting with the work of Grossglauser
and Tse (2002), and it has been shown that there is a
significant tradeoff between the end-to-end delays and
the total achievable rate. We develop algorithms to
compute such tradeoffs with provable performance
guarantees for arbitrary instances, with general
interference models. Given a target delay-bound $
\Delta (c) $ for each session $c$, our algorithm gives
a stable flow vector with a total throughput within a
factor of $ O(\log \Delta m / \log \Delta m) $ of the
maximum, so that the per-session (end-to-end) delay is
$ O(((\log \Delta m / \log \log \Delta m) \Delta
(c))^2) $, where $ \Delta m = \max c \{ \Delta (c) \}
$; note that these bounds depend only on the delays,
and not on the network size, and this is the first such
result, to our knowledge.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Krishnan:2013:VSQ,
author = "S. Shunmuga Krishnan and Ramesh K. Sitaraman",
title = "Video stream quality impacts viewer behavior:
inferring causality using quasi-experimental designs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "21",
number = "6",
pages = "2001--2014",
month = dec,
year = "2013",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2281542",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Feb 7 19:18:34 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The distribution of videos over the Internet is
drastically transforming how media is consumed and
monetized. Content providers, such as media outlets and
video subscription services, would like to ensure that
their videos do not fail, start up quickly, and play
without interruptions. In return for their investment
in video stream quality, content providers expect less
viewer abandonment, more viewer engagement, and a
greater fraction of repeat viewers, resulting in
greater revenues. The key question for a content
provider or a content delivery network (CDN) is whether
and to what extent changes in video quality can cause
changes in viewer behavior. Our work is the first to
establish a causal relationship between video quality
and viewer behavior, taking a step beyond purely
correlational studies. To establish causality, we use
Quasi-Experimental Designs, a novel technique adapted
from the medical and social sciences. We study the
impact of video stream quality on viewer behavior in a
scientific data-driven manner by using extensive traces
from Akamai's streaming network that include 23 million
views from 6.7 million unique viewers. We show that
viewers start to abandon a video if it takes more than
2 s to start up, with each incremental delay of 1 s
resulting in a 5.8\% increase in the abandonment rate.
Furthermore, we show that a moderate amount of
interruptions can decrease the average play time of a
viewer by a significant amount. A viewer who
experiences a rebuffer delay equal to 1\% of the video
duration plays 5\% less of the video in comparison to a
similar viewer who experienced no rebuffering. Finally,
we show that a viewer who experienced failure is 2.32\%
less likely to revisit the same site within a week than
a similar viewer who did not experience a failure.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2014:OAP,
author = "Shan-Hung Wu and Ming-Syan Chen and Chung-Min Chen",
title = "Optimally Adaptive Power-Saving Protocols for Ad Hoc
Networks Using the Hyper Quorum System",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "1--15",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2296614",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Quorum-based power-saving (QPS) protocols have been
proposed for ad hoc networks (e.g., IEEE 802.11 ad hoc
mode) to increase energy efficiency and prolong the
operational time of mobile stations. These protocols
assign to each station a cycle pattern that specifies
when the station should wake up (to transmit/receive
data) and sleep (to save battery power). In all
existing QPS protocols, the cycle length is either
identical for all stations or is restricted to certain
numbers (e.g., squares or primes). These restrictions
on cycle length severely limit the practical use of QPS
protocols as each individual station may want to select
a cycle length that is best suited for its own need (in
terms of remaining battery power, tolerable packet
delay, and drop ratio). In this paper, we propose the
notion of hyper quorum system (HQS) --- a
generalization of QPS that allows for arbitrary cycle
lengths. We describe algorithms to generate two
different classes of HQS given any set of arbitrary
cycle lengths as input. We also describe how to find
the optimal cycle length for a station to maximize
energy efficiency, subject to certain performance
constraints. We then present analytical and simulation
results that show the benefits of HQS-based
power-saving protocols over the existing QPS protocols.
The HQS protocols yield up to 41\% improvement in
energy efficiency under heavy traffic loads while
eliminating more than 90\% delay drops under light
traffic loads.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hur:2014:SDR,
author = "Junbeom Hur and Kyungtae Kang",
title = "Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "16--26",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2012.2210729",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Mobile nodes in military environments such as a
battlefield or a hostile region are likely to suffer
from intermittent network connectivity and frequent
partitions. Disruption-tolerant network (DTN)
technologies are becoming successful solutions that
allow wireless devices carried by soldiers to
communicate with each other and access the confidential
information or command reliably by exploiting external
storage nodes. Some of the most challenging issues in
this scenario are the enforcement of authorization
policies and the policies update for secure data
retrieval. Ciphertext-policy attribute-based encryption
(CP-ABE) is a promising cryptographic solution to the
access control issues. However, the problem of applying
CP-ABE in decentralized DTNs introduces several
security and privacy challenges with regard to the
attribute revocation, key escrow, and coordination of
attributes issued from different authorities. In this
paper, we propose a secure data retrieval scheme using
CP-ABE for decentralized DTNs where multiple key
authorities manage their attributes independently. We
demonstrate how to apply the proposed mechanism to
securely and efficiently manage the confidential data
distributed in the disruption-tolerant military
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tan:2014:RDB,
author = "Jian Tan and Swapna and Shroff",
title = "Retransmission Delays With Bounded Packets: Power-Law
Body and Exponential Tail",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "27--38",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2244907",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Retransmissions serve as the basic building block that
communication protocols use to achieve reliable data
transfer. Until recently, the number of retransmissions
was thought to follow a geometric (light-tailed)
distribution. However, recent work shows that when the
distribution of the packet sizes have infinite support,
retransmission-based protocols may result in
heavy-tailed delays and possibly zero throughput even
when the aforementioned distribution is light-tailed.
In reality, however, packet sizes are often bounded by
the maximum transmission unit (MTU), and thus the
aforementioned result merits a deeper investigation. To
that end, in this paper, we allow the distribution of
the packet size $L$ to have finite support. Under mild
conditions, we show that the transmission duration
distribution exhibits a transition from a power-law
main body to an exponential tail. The timescale to
observe the power-law main body is roughly equal to the
average transmission duration of the longest packet.
The power-law main body, if significant, may cause the
channel throughput to be very close to zero. These
theoretical findings provide an understanding on why
some empirical measurements suggest heavy tails. We use
these results to further highlight the engineering
implications of distributions with power-law main
bodies and light tails by analyzing two cases: (1) the
throughput of on-off channels with retransmissions,
where we show that even when packet sizes have small
means and bounded support the variability in their
sizes can greatly impact system performance; (2) the
distribution of the number of jobs in an $ M / M /
\infty $ queue with server failures. Here, we show that
retransmissions can cause long-range dependence and
quantify the impact of the maximum job sizes on the
long-range dependence.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zohar:2014:PPB,
author = "Eyal Zohar and Israel Cidon and Osnat Mokryn",
title = "{PACK}: Prediction-Based Cloud Bandwidth and Cost
Reduction System",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "39--51",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2240010",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present PACK (Predictive ACKs), a
novel end-to-end traffic redundancy elimination (TRE)
system, designed for cloud computing customers.
Cloud-based TRE needs to apply a judicious use of cloud
resources so that the bandwidth cost reduction combined
with the additional cost of TRE computation and storage
would be optimized. PACK's main advantage is its
capability of offloading the cloud-server TRE effort to
end-clients, thus minimizing the processing costs
induced by the TRE algorithm. Unlike previous
solutions, PACK does not require the server to
continuously maintain clients' status. This makes PACK
very suitable for pervasive computation environments
that combine client mobility and server migration to
maintain cloud elasticity. PACK is based on a novel TRE
technique, which allows the client to use newly
received chunks to identify previously received chunk
chains, which in turn can be used as reliable
predictors to future transmitted chunks. We present a
fully functional PACK implementation, transparent to
all TCP-based applications and network devices.
Finally, we analyze PACK benefits for cloud users,
using traffic traces from various sources.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cai:2014:SPT,
author = "Yan Cai and Xiaolin Wang and Weibo Gong and Don
Towsley",
title = "A Study on the Performance of a Three-Stage
Load-Balancing Switch",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "52--65",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2244906",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "There has been a great deal of interest recently in
load-balancing switches due to their simple
architecture and high forwarding bandwidth.
Nevertheless, the mis-sequencing problem of the
original load-balancing switch hinders the performance
of underlying TCP applications. Several load-balancing
switch designs have been proposed to address this
mis-sequencing issue. They solve this mis-sequencing
problem at the cost of either algorithmic complexity or
special hardware requirements. In this paper, we
address the mis-sequencing problem by introducing a
three-stage load-balancing switch architecture enhanced
with an output load-balancing mechanism. This
three-stage load-balancing switch achieves a high
forwarding capacity while preserving the order of
packets without the need of costly online scheduling
algorithms. Theoretical analyses and simulation results
show that this three-stage load-balancing switch
provides a transmission delay that is upper-bounded by
that of an output-queued switch plus a constant that
depends only on the number of input/output ports,
indicating the same forwarding capacity as an
output-queued switch.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2014:AAS,
author = "Jinbei Zhang and Luoyi Fu and Xinbing Wang",
title = "Asymptotic Analysis on Secrecy Capacity in Large-Scale
Wireless Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "66--79",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2244230",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Since wireless channel is vulnerable to eavesdroppers,
the secrecy during message delivery is a major concern
in many applications such as commercial, governmental,
and military networks. This paper investigates
information-theoretic secrecy in large-scale networks
and studies how capacity is affected by the secrecy
constraint where the locations and channel state
information (CSI) of eavesdroppers are both unknown. We
consider two scenarios: (1) noncolluding case where
eavesdroppers can only decode messages individually;
and (2) colluding case where eavesdroppers can collude
to decode a message. For the noncolluding case, we show
that the network secrecy capacity is not affected in
order-sense by the presence of eavesdroppers. For the
colluding case, the per-node secrecy capacity of $
\Theta ({1 \over \sqrt {n}}) $ can be achieved when the
eavesdropper density $ \psi_e(n) $ is $ O(n^{- \beta })
$, for any constant $ \beta > 0 $ and decreases
monotonously as the density of eavesdroppers increases.
The upper bounds on network secrecy capacity are
derived for both cases and shown to be achievable by
our scheme when $ \psi_e(n) = O(n^{- \beta }) $ or $
\psi_e(n) = \Omega (\log^{\alpha - 2 \over \alpha }n)
$, where $ \alpha $ is the path-loss gain. We show that
there is a clear tradeoff between the security
constraints and the achievable capacity. Furthermore,
we also investigate the impact of secrecy constraint on
the capacity of dense network, the impact of active
attacks and other traffic patterns, as well as mobility
models in the context.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Uddin:2014:JRM,
author = "Md. Forkan Uddin and Catherine Rosenberg and Weihua
Zhuang and Patrick Mitran and Andre Girard",
title = "Joint Routing and Medium Access Control in Fixed
Random Access Wireless Multihop Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "80--93",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2243163",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study cross-layer design in random-access-based
fixed wireless multihop networks under a physical
interference model. Due to the complexity of the
problem, we consider a simple slotted ALOHA medium
access control (MAC) protocol for link-layer operation.
We formulate a joint routing, access probability, and
rate allocation optimization problem to determine the
optimal max-min throughput of the flows and the optimal
configuration of the routing, access probability, and
transmission rate parameters in a slotted ALOHA system.
We then also adapt this problem to include an XOR-like
network coding without opportunistic listening. Both
problems are complex nonlinear and nonconvex. We
provide extensive numerical results for both problems
for medium-size mesh networks using an iterated optimal
search technique. Via numerical and simulation results,
we show that: (1) joint design provides a significant
throughput gain over a default configuration in
slotted-ALOHA-based wireless networks; and (2) the
throughput gain obtained by the simple network coding
is significant, especially at low transmission power.
We also propose simple heuristics to configure
slotted-ALOHA-based wireless mesh networks. These
heuristics are extensively evaluated via simulation and
found to be very efficient.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Meiners:2014:FRE,
author = "Chad R. Meiners and Jignesh Patel and Eric Norige and
Alex X. Liu and Eric Torng",
title = "Fast Regular Expression Matching Using Small {TCAM}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "94--109",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2256466",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
abstract = "Regular expression (RE) matching is a core component
of deep packet inspection in modern networking and
security devices. In this paper, we propose the first
hardware-based RE matching approach that uses ternary
content addressable memory (TCAM), which is available
as off-the-shelf chips and has been widely deployed in
modern networking devices for tasks such as packet
classification. We propose three novel techniques to
reduce TCAM space and improve RE matching speed:
transition sharing, table consolidation, and variable
striding. We tested our techniques on eight real-world
RE sets, and our results show that small TCAMs can be
used to store large deterministic finite automata
(DFAs) and achieve potentially high RE matching
throughput. For space, we can store each of the
corresponding eight DFAs with 25,000 states in a
0.59-Mb TCAM chip. Using a different TCAM encoding
scheme that facilitates processing multiple characters
per transition, we can achieve potential RE matching
throughput of 10-19 Gb/s for each of the eight DFAs
using only a single 2.36-Mb TCAM chip.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bolla:2014:GNP,
author = "Raffaele Bolla and Roberto Bruschi and Alessandro
Carrega and Franco Davoli",
title = "Green Networking With Packet Processing Engines:
Modeling and Optimization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "110--123",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2242485",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the aim of controlling power consumption in
metro/transport and core networks, we consider
energy-aware devices able to reduce their energy
requirements by adapting their performance. In
particular, we focus on state-of-the-art packet
processing engines, which generally represent the most
energy-consuming components of network devices, and
which are often composed of a number of parallel
pipelines to ``divide and conquer'' the incoming
traffic load. Our goal is to control both the power
configuration of pipelines and the way to distribute
traffic flows among them. We propose an analytical
model to accurately represent the impact of green
network technologies (i.e., low power idle and adaptive
rate) on network- and energy-aware performance indexes.
The model has been validated with experimental results,
performed by using energy-aware software routers loaded
by real-world traffic traces. The achieved results
demonstrate how the proposed model can effectively
represent energy- and network-aware performance
indexes. On this basis, we propose a constrained
optimization policy, which seeks the best tradeoff
between power consumption and packet latency times. The
procedure aims at dynamically adapting the energy-aware
device configuration to minimize energy consumption
while coping with incoming traffic volumes and meeting
network performance constraints. In order to deeply
understand the impact of such policy, a number of tests
have been performed by using experimental data from
software router architectures and real-world traffic
traces.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ren:2014:TTD,
author = "Wei Ren and Qing Zhao and Ananthram Swami",
title = "Temporal Traffic Dynamics Improve the Connectivity of
Ad Hoc Cognitive Radio Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "124--136",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2244612",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In an ad hoc cognitive radio network, secondary users
access channels temporarily unused by primary users,
and the existence of a communication link between two
secondary users depends on the transmitting and
receiving activities of nearby primary users. Using
theories and techniques from continuum percolation and
ergodicity, we analytically characterize the
connectivity of the secondary network defined in terms
of the almost sure finiteness of the multihop delay,
and show the occurrence of a phase transition
phenomenon while studying the impact of the temporal
dynamics of the primary traffic on the connectivity of
the secondary network. Specifically, as long as the
primary traffic has some temporal dynamics caused by
either mobility and/or changes in traffic load and
pattern, the connectivity of the secondary network
depends solely on its own density and is independent of
the primary traffic; otherwise, the connectivity of the
secondary network requires putting a density-dependent
cap on the primary traffic load. We show that the
scaling behavior of the multihop delay depends
critically on whether or not the secondary network is
instantaneously connected. In particular, we establish
the scaling law of the minimum multihop delay with
respect to the source-destination distance when the
propagation delay is negligible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deb:2014:AEI,
author = "Supratim Deb and Pantelis Monogioudis and Jerzy
Miernik and James P. Seymour",
title = "Algorithms for Enhanced Inter-{Cell} Interference
Coordination {(eICIC)} in {LTE HetNets}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "137--150",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2246820",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The success of LTE heterogeneous networks (HetNets)
with macrocells and picocells critically depends on
efficient spectrum sharing between high-power macros
and low-power picos. Two important challenges in this
context are: (1) determining the amount of radio
resources that macrocells should offer to picocells,
and (2) determining the association rules that decide
which user equipments (UEs) should associate with
picos. In this paper, we develop a novel algorithm to
solve these two coupled problems in a joint manner. Our
algorithm has provable guarantee, and furthermore, it
accounts for network topology, traffic load, and
macro-pico interference map. Our solution is standard
compliant and can be implemented using the notion of
Almost Blank Subframes (ABS) and Cell Selection Bias
(CSB) proposed by LTE standards. We also show extensive
evaluations using RF plan from a real network and
discuss self-optimized networking (SON)-based enhanced
inter-cell interference coordination (eICIC)
implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hariharan:2014:SPO,
author = "Srikanth Hariharan and Ness B. Shroff",
title = "On Sample-Path Optimal Dynamic Scheduling for
Sum-Queue Minimization in Forests",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "151--164",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2245339",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the problem of minimizing the sum of
the queue lengths of all the nodes in a wireless
network with a forest topology. Each packet is destined
to one of the roots (sinks) of the forest. We consider
a time-slotted system and a primary (or one-hop)
interference model. We characterize the existence of
causal sample-path optimal scheduling policies for this
network topology under this interference model. A
causal sample-path optimal scheduling policy is one for
which at each time-slot, and for any sample-path
traffic arrival pattern, the sum of the queue lengths
of all the nodes in the network is minimum among all
policies. We show that such policies exist in
restricted forest structures, and that for any other
forest structure, there exists a traffic arrival
pattern for which no causal sample-path optimal policy
can exist. Surprisingly, we show that many forest
structures for which such policies exist can be
scheduled by converting the structure into an
equivalent linear network and scheduling the equivalent
linear network according to the one-hop interference
model. The nonexistence of such policies in many forest
structures underscores the inherent limitation of using
sample-path optimality as a performance metric and
necessitates the need to study other (relatively)
weaker metrics of delay performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bienkowski:2014:WAV,
author = "Marcin Bienkowski and Anja Feldmann and Johannes
Grassler and Gregor Schaffrath and Stefan Schmid",
title = "The Wide-Area Virtual Service Migration Problem: a
Competitive Analysis Approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "165--178",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2245676",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib;
https://www.math.utah.edu/pub/tex/bib/virtual-machines.bib",
abstract = "Today's trend toward network virtualization and
software-defined networking enables flexible new
distributed systems where resources can be dynamically
allocated and migrated to locations where they are most
useful. This paper proposes a competitive analysis
approach to design and reason about online algorithms
that find a good tradeoff between the benefits and
costs of a migratable service. A competitive online
algorithm provides worst-case performance guarantees
under any demand dynamics, and without any information
or statistical assumptions on the demand in the future.
This is attractive especially in scenarios where the
demand is hard to predict and can be subject to
unexpected events. As a case study, we describe a
service (e.g., an SAP server or a gaming application)
that uses network virtualization to improve the quality
of service (QoS) experienced by thin client
applications running on mobile devices. By decoupling
the service from the underlying resource
infrastructure, it can be migrated closer to the
current client locations while taking into account
migration costs. We identify the major cost factors in
such a system and formalize the wide-area service
migration problem. Our main contributions are a
randomized and a deterministic online algorithm that
achieve a competitive ratio of $ O(\log {n}) $ in a
simplified scenario, where $n$ is the size of the
substrate network. This is almost optimal. We
complement our worst-case analysis with simulations in
different specific scenarios and also sketch a
migration demonstrator.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Turkcu:2014:OWW,
author = "Onur Turkcu and Suresh Subramaniam",
title = "Optimal Wavebanding in {WDM} Ring Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "179--190",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2247625",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Savings in switching costs of an optical cross-connect
can be achieved by grouping together a set of
consecutive wavelengths and switching them as a single
waveband. This technique is known as waveband
switching. While previous work has focused on either
uniform band sizes or nonuniform band sizes considering
a single node, in this paper we focus on the number of
wavebands and their sizes for ring topologies. First,
we show that such solutions are inadequate when
considering the entire network. We then present a novel
framework for optimizing the number of wavebands in a
ring network for deterministic traffic. The objective
of the Band Minimization Problem is to minimize the
number of nonuniform wavebands in the network while
using the minimum possible number of wavelengths. We
show that the problem is NP-hard and present heuristics
for it. We then consider a specific type of traffic,
namely all-to-all traffic, and present a construction
method for achieving the minimum number of wavebands in
the ring. Our results show that the number of ports can
be reduced by a large amount using waveband switching
compared to wavelength switching, for both all-to-all
traffic and random traffic. We also numerically
evaluate the performance of our waveband design
algorithms under dynamic stochastic traffic.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:AAP,
author = "Wei Li and Shengling Wang and Yong Cui and Xiuzhen
Cheng and Ran Xin and Mznah A. Al-Rodhaan and Abdullah
Al-Dhelaan",
title = "{AP} Association for Proportional Fairness in
Multirate {WLANs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "191--202",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2245145",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the problem of achieving
proportional fairness via access point (AP) association
in multirate WLANs. This problem is formulated as a
nonlinear programming with an objective function of
maximizing the total user bandwidth utilities in the
whole network. Such a formulation jointly considers
fairness and AP selection. We first propose a
centralized algorithm Non-Linear Approximation
Optimization for Proportional Fairness (NLAO-PF) to
derive the user-AP association via relaxation. Since
the relaxation may cause a large integrality gap, a
compensation function is introduced to ensure that our
algorithm can achieve at least half of the optimal in
the worst case. This algorithm is assumed to be adopted
periodically for resource management. To handle the
case of dynamic user membership, we propose a
distributed heuristic Best Performance First (BPF)
based on a novel performance revenue function, which
provides an AP selection criterion for newcomers. When
an existing user leaves the network, the transmission
times of other users associated with the same AP can be
redistributed easily based on NLAO-PF. Extensive
simulation study has been performed to validate our
design and to compare the performance of our algorithms
to those of the state of the art.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Goratti:2014:UOA,
author = "Leonardo Goratti and Ece Yaprak and Stefano Savazzi
and Carlos Pomalaza-Raez",
title = "An Urn Occupancy Approach for Modeling the Energy
Consumption of Distributed Beaconing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "203--216",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270437",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In past years, ultrawideband technology has attracted
great attention from academia and industry for wireless
personal area networks and wireless sensor networks.
Maintenance of connectivity and exchange of data
require an efficient way to manage the devices.
Distributed beaconing defined by ECMA-368 is used to
manage the network in fully distributed fashion. All
the devices must acquire a unique beacon slot, with the
beacon period accessed using a slotted Aloha scheme. In
this paper, we study the efficiency of distributed
beaconing in the presence of $k$ newcomer devices
forming a closed system. Efficiency is measured in
terms of energy consumption and network setup delay.
ECMA-368 defines two distinct phases: extension and
contraction. Both phases are analyzed with particular
emphasis on the extension phase by means of an
absorbing Markov chain model. The main contributions of
this paper are: (1) a systematic approach to model
distributed beaconing by formulating two equivalent urn
occupancy problems of the extension and contraction
phases; (2) the use of exponential generating functions
to obtain closed-form expressions of the transition
probabilities of the absorbing Markov chain; and (3)
comparison to computer simulations based on Opnet
modeling and with the preexisting literature.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramaswamy:2014:MWN,
author = "Vinod Ramaswamy and Vinith Reddy and Srinivas
Shakkottai and Alex Sprintson and Natarajan Gautam",
title = "Multipath Wireless Network Coding: an Augmented
Potential Game Perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "217--229",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2262772",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider wireless networks in which multiple paths
are available between each source and destination. We
allow each source to split traffic among all of its
available paths, and we ask the question: How do we
attain the lowest possible number of transmissions per
unit time to support a given traffic matrix? Traffic
bound in opposite directions over two wireless hops can
utilize the ``reverse carpooling'' advantage of network
coding in order to decrease the number of transmissions
used. We call such coded hops ``hyper-links.'' With the
reverse carpooling technique, longer paths might be
cheaper than shorter ones. However, there is a peculiar
situation among sources-the network coding advantage is
realized only if there is traffic in both directions of
a shared path. We consider the problem of routing with
network coding by selfish agents (the sources) as a
potential game and develop a method of state-space
augmentation in which additional agents (the
hyper-links) decouple sources' choices from each other
by declaring a hyper-link capacity, allowing sources to
split their traffic selfishly in a distributed fashion,
and then changing the hyper-link capacity based on user
actions. Furthermore, each hyper-link has a scheduling
constraint in terms of the maximum number of
transmissions allowed per unit time. We show that our
two-level control scheme is stable and verify our
analytical insights by simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Esposito:2014:RTE,
author = "Christian Esposito and Marco Platania and Roberto
Beraldi",
title = "Reliable and Timely Event Notification for
Publish\slash Subscribe Services Over the {Internet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "230--243",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2245144",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The publish/subscribe paradigm is gaining attention
for the development of several applications in wide
area networks (WANs) due to its intrinsic time, space,
and synchronization decoupling properties that meet the
scalability and asynchrony requirements of those
applications. However, while the communication in a WAN
may be affected by the unpredictable behavior of the
network, with messages that can be dropped or delayed,
existing publish/subscribe solutions pay just a little
attention to addressing these issues. On the contrary,
applications such as business intelligence, critical
infrastructures, and financial services require
delivery guarantees with strict temporal deadlines. In
this paper, we propose a framework that enforces both
reliability and timeliness for publish/subscribe
services over WAN. Specifically, we combine two
different approaches: gossiping, to retrieve missing
packets in case of incomplete information, and network
coding, to reduce the number of retransmissions and,
consequently, the latency. We provide an analytical
model that describes the information recovery
capabilities of our algorithm and a simulation-based
study, taking into account a real workload from the Air
Traffic Control domain, which evidences how the
proposed solution is able to ensure reliable event
notification over a WAN within a reasonable bounded
time window.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Magharei:2014:IFL,
author = "Nazanin Magharei and Reza Rejaie and Ivica Rimac and
Volker Hilt and Markus Hofmann",
title = "{ISP}-Friendly Live {P2P} Streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "244--256",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2257840",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Swarm-based peer-to-peer streaming (SPS) mechanisms
tend to generate a significant amount of costly
inter-ISP traffic. Localization of overlay connectivity
reduces inter-ISP traffic. However, it can adversely
affect the delivered quality. In this paper, we
systematically examine the performance of SPS for live
video over localized overlays. We identify and discuss
the fundamental bottlenecks limiting the stream quality
and present OLIVES, an ISP-friendly P2P streaming
mechanism for live video. OLIVES maintains a fully
localized overlay to reduce the volume of inter-ISP
traffic and incorporates a two-tier inter-ISP and
intra-ISP scheduling scheme to maximize the delivered
quality to individual peers. One important design
choice is to perform basic scheduling at a substream
level and to use implicit coordination among peers.
This allows OLIVES to efficiently detect missing blocks
and pull them into the ISP in a timely manner with a
minimum in coordination overhead. Furthermore, OLIVES
incorporates a shortcutting technique that limits the
buffer requirements for each participating peer and
effectively reduced the playout latency. Through
analysis and extensive simulations, we demonstrate the
ability of OLIVES to deliver high-quality streams over
localized overlays in various realistic scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Markakis:2014:MWS,
author = "Mihalis G. Markakis and Eytan Modiano and John N.
Tsitsiklis",
title = "Max-Weight Scheduling in Queueing Networks With
Heavy-Tailed Traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "257--270",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2246869",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of scheduling in a single-hop
switched network with a mix of heavy-tailed and
light-tailed traffic and analyze the impact of
heavy-tailed traffic on the performance of Max-Weight
scheduling. As a performance metric, we use the delay
stability of traffic flows: A traffic flow is
delay-stable if its expected steady-state delay is
finite, and delay-unstable otherwise. First, we show
that a heavy-tailed traffic flow is delay-unstable
under any scheduling policy. Then, we focus on the
celebrated Max-Weight scheduling policy and show that a
light-tailed flow that conflicts with a heavy-tailed
flow is also delay-unstable. This is true irrespective
of the rate or the tail distribution of the
light-tailed flow or other scheduling constraints in
the network. Surprisingly, we show that a light-tailed
flow can become delay-unstable, even when it does not
conflict with heavy-tailed traffic. Delay stability in
this case may depend on the rate of the light-tailed
flow. Finally, we turn our attention to the class of
Max-Weight- $ \alpha $ scheduling policies. We show
that if the $ \alpha $ -parameters are chosen suitably,
then the sum of the $ \alpha $-moments of the
steady-state queue lengths is finite. We provide an
explicit upper bound for the latter quantity, from
which we derive results related to the delay stability
of traffic flows, and the scaling of moments of
steady-state queue lengths with traffic intensity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Anderson:2014:ODS,
author = "Eric Anderson and Caleb Phillips and Douglas Sicker
and Dirk Grunwald",
title = "Optimization Decomposition for Scheduling and System
Configuration in Wireless Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "271--284",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2289980",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Who gets to use radio spectrum, and when, where, and
how? Scheduling (who, where, when) and system
configuration (how) are fundamental problems in radio
communication and wireless networking. Optimization
decomposition based on Lagrangian relaxation of signal
quality requirements provides a mathematical framework
for solving this type of combined problem. This paper
demonstrates the technique as a solution to spatial
reuse time-division multiple access (STDMA) scheduling
with reconfigurable antennas. The joint beam steering
and scheduling (JBSS) problem offers both a challenging
mathematical structure and significant practical value.
We present algorithms for JBSS and describe an
implemented system based on these algorithms. We
achieve up to 600\% of the throughput of TDMA with a
mean of 234\% in our experiments. The decomposition
approach leads to a working distributed protocol
producing optimal solutions in an amount of time that
is at worst linear in the size of the input. This is,
to the best of our knowledge, the first actually
implemented wireless scheduling system based on dual
decomposition. We identify and briefly address some of
the challenges that arise in taking such a system from
theory to reality.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2014:MUC,
author = "Shurui Huang and Aditya Ramamoorthy",
title = "On the Multiple-Unicast Capacity of $3$-Source,
$3$-Terminal Directed Acyclic Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "285--299",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270438",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the multiple-unicast problem with three
source-terminal pairs over directed acyclic networks
with unit-capacity edges. The three $ s_i{\hbox {-}}t_i
$ pairs wish to communicate at unit-rate via network
coding. The connectivity between the $ s_i{\hbox
{-}}t_i $ pairs is quantified by means of a
connectivity-level vector, $ [k_1 \ k_2 \ k_3] $ such
that there exist $ k_i $ edge-disjoint paths between $
s_i $ and $ t_i $. In this paper, we attempt to
classify networks based on the connectivity level. It
can be observed that unit-rate transmission can be
supported by routing if $ k_i \geq 3 $, for all $ i =
1, \ldots, 3 $. In this paper, we consider
connectivity-level vectors such that $ \min_{i = 1,
\ldots, 3} k_i < 3 $. We present either a constructive
linear network coding scheme or an instance of a
network that cannot support the desired unit-rate
requirement, for all such connectivity-level vectors
except the vector [1 2 4] (and its permutations). The
benefits of our schemes extend to networks with higher
and potentially different edge capacities.
Specifically, our experimental results indicate that
for networks where the different source-terminal paths
have a significant overlap, our constructive unit-rate
schemes can be packed along with routing to provide
higher throughput as compared to a pure routing
approach.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Clad:2014:GCL,
author = "Francois Clad and Pascal Merindol and Jean-Jacques
Pansiot and Pierre Francois and Olivier Bonaventure",
title = "Graceful Convergence in Link-State {IP} Networks: a
Lightweight Algorithm Ensuring Minimal Operational
Impact",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "300--312",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2255891",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The use of real-time multimedia or mission-critical
applications over IP networks puts strong pressure on
service providers to operate disruption-free networks.
However, after any topological change, link-state
Interior Gateway Protocols (IGPs), such as IS-IS or
OSPF, enter a convergence phase during which transient
forwarding loops may occur. Such loops increase the
network latency and cause packet losses. In this paper,
we propose and evaluate an efficient algorithm aimed at
avoiding such traffic disruptions without modifying
these IGPs. In case of an intentional modification of
the weight of a link (e.g., to shut it down for
maintenance operations or to perform traffic
engineering), our algorithm iteratively changes this
weight, splitting the modification into a sequence of
loop-free transitions. The number of weight increments
that need to be applied on the link to reach its target
state is minimized in order to remain usable in
existing networks. Analysis performed on inferred and
real Internet service provider (ISP) topologies shows
that few weight increments are required to handle most
link shutdown events (less than two intermediate
metrics for more than 85\% of the links). The
evaluation of our implementation also reveals that
these minimal sequences can be computed in a reasonable
time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Addis:2014:EMT,
author = "Bernardetta Addis and Antonio Capone and Giuliana
Carello and Luca G. Gianoli and Brunilde Sanso",
title = "Energy Management Through Optimized Routing and Device
Powering for Greener Communication Networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "313--325",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2249667",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent data confirm that the power consumption of the
information and communications technologies (ICT) and
of the Internet itself can no longer be ignored,
considering the increasing pervasiveness and the
importance of the sector on productivity and economic
growth. Although the traffic load of communication
networks varies greatly over time and rarely reaches
capacity limits, its energy consumption is almost
constant. Based on this observation, energy management
strategies are being considered with the goal of
minimizing the energy consumption, so that consumption
becomes proportional to the traffic load either at the
individual-device level or for the whole network. The
focus of this paper is to minimize the energy
consumption of the network through a management
strategy that selectively switches off devices
according to the traffic level. We consider a set of
traffic scenarios and jointly optimize their energy
consumption assuming a per-flow routing. We propose a
traffic engineering mathematical programming
formulation based on integer linear programming that
includes constraints on the changes of the device
states and routing paths to limit the impact on quality
of service and the signaling overhead. We show a set of
numerical results obtained using the energy consumption
of real routers and study the impact of the different
parameters and constraints on the optimal energy
management strategy. We also present heuristic results
to compare the optimal operational planning with online
energy management operation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2014:IFE,
author = "Junchen Jiang and Vyas Sekar and Hui Zhang",
title = "Improving Fairness, Efficiency, and Stability in
{HTTP}-Based Adaptive Video Streaming With {Festive}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "1",
pages = "326--340",
month = feb,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291681",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Tue Mar 4 18:22:52 MST 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Modern video players today rely on bit-rate adaptation
in order to respond to changing network conditions.
Past measurement studies have identified issues with
today's commercial players when multiple
bit-rate-adaptive players share a bottleneck link with
respect to three metrics: fairness, efficiency, and
stability. Unfortunately, our current understanding of
why these effects occur and how they can be mitigated
is quite limited. In this paper, we present a
principled understanding of bit-rate adaptation and
analyze several commercial players through the lens of
an abstract player model consisting of three main
components: bandwidth estimation, bit-rate selection,
and chunk scheduling. Using framework, we identify the
root causes of several undesirable interactions that
arise as a consequence of overlaying the video bit-rate
adaptation over HTTP. Building on these insights, we
develop a suite of techniques that can systematically
guide the tradeoffs between stability, fairness, and
efficiency and thus lead to a general framework for
robust video adaptation. We pick one concrete instance
from this design space and show that it significantly
outperforms today's commercial players on all three key
metrics across a range of experimental scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ferragut:2014:NRA,
author = "Andr{\'e}s Ferragut and Fernando Paganini",
title = "Network resource allocation for users with multiple
connections: fairness and stability",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "349--362",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2251896",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies network resource allocation between
users that manage multiple connections, possibly
through different routes, where each connection is
subject to congestion control. We formulate a
user-centric Network Utility Maximization problem that
takes into account the aggregate rate a user obtains
from all connections, and we propose decentralized
means to achieve this fairness objective. In a first
proposal, cooperative users control their number of
active connections based on congestion prices from the
transport layer to emulate suitable primal-dual
dynamics in the aggregate rate; we show this control
achieves asymptotic convergence to the optimal
user-centric allocation. For the case of noncooperative
users, we show that network stability and user-centric
fairness can be enforced by a utility-based admission
control implemented at the network edge. We also study
stability and fairness issues when routing of incoming
connections is enabled at the edge router. We obtain in
this case a characterization of the stability region of
loads that can be served with routing alone and a
generalization of our admission control policy to
ensure user-centric fairness when the stability
condition is not met. The proposed algorithms are
implemented at the packet level in ns2 and demonstrated
through simulation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Laufer:2014:CLB,
author = "Rafael Laufer and Theodoros Salonidis and Henrik
Lundgren and Pascal {Le Guyadec}",
title = "A cross-layer backpressure architecture for wireless
multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "363--376",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2249592",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Contemporary wireless multihop networks operate much
below their capacity due to the poor coordination among
transmitting nodes. In this paper, we present XPRESS, a
cross-layer backpressure architecture designed to reach
the capacity of wireless multihop networks. Instead of
a collection of poorly coordinated wireless routers,
XPRESS turns a mesh network into a wireless switch.
Transmissions over the network are scheduled using a
throughput-optimal backpressure algorithm. Realizing
this theoretical concept entails several challenges,
which we identify and address with a cross-layer design
and implementation on top of our wireless hardware
platform. In contrast to previous work, we implement
and evaluate backpressure scheduling over a TDMA MAC
protocol, as it was originally proposed in theory. Our
experiments in an indoor testbed show that XPRESS can
yield up to 128\% throughput gains over 802.11.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Khan:2014:SSF,
author = "Faisal Khan and Nicholas Hosein and Soheil Ghiasi and
Chen-Nee Chuah and Puneet Sharma",
title = "Streaming solutions for fine-grained network traffic
measurements and analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "377--390",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2263228",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Online network traffic measurements and analysis is
critical for detecting and preventing any real-time
anomalies in the network. We propose, implement, and
evaluate an online, adaptive measurement platform,
which utilizes real-time traffic analysis results to
refine subsequent traffic measurements. Central to our
solution is the concept of Multi-Resolution Tiling
(MRT), a heuristic approach that performs sequential
analysis of traffic data to zoom into traffic
subregions of interest. However, MRT is sensitive to
transient traffic spikes. In this paper, we propose
three novel traffic streaming algorithms that overcome
the limitations of MRT and can cater to varying degrees
of computational and storage budgets, detection
latency, and accuracy of query response. We evaluate
our streaming algorithms on a highly parallel and
programmable hardware as well as a traditional
software-based platforms. The algorithms demonstrate
significant accuracy improvement over MRT in detecting
anomalies consisting of synthetic hard-to-track
elephant flows and global icebergs. Our proposed
algorithms maintain the worst-case complexities of the
MRT while incurring only a moderate increase in average
resource utilization.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Skoberne:2014:IAS,
author = "Nejc Skoberne and Olaf Maennel and Iain Phillips and
Randy Bush and Jan Zorz and Mojca Ciglaric",
title = "{IPv4} address sharing mechanism classification and
tradeoff analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "391--404",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2256147",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The growth of the Internet has made IPv4 addresses a
scarce resource. Due to slow IPv6 deployment,
IANA-level IPv4 address exhaustion was reached before
the world could transition to an IPv6-only Internet.
The continuing need for IPv4 reachability will only be
supported by IPv4 address sharing. This paper reviews
ISP-level address sharing mechanisms, which allow
Internet service providers to connect multiple
customers who share a single IPv4 address. Some
mechanisms come with severe and unpredicted
consequences, and all of them come with tradeoffs. We
propose a novel classification, which we apply to
existing mechanisms such as NAT444 and DS-Lite and
proposals such as 4rd, MAP, etc. Our tradeoff analysis
reveals insights into many problems including: abuse
attribution, performance degradation, address and port
usage efficiency, direct intercustomer communication,
and availability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nahir:2014:TDC,
author = "Amir Nahir and Ariel Orda and Ari Freund",
title = "Topology design of communication networks: a
game-theoretic perspective",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "405--414",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2254125",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the performance of noncooperative networks in
light of three major topology design considerations,
namely the price of establishing a link, path delay,
and path proneness to congestion, the latter being
modeled through the ``relaying extent'' of the nodes.
We analyze these considerations and the tradeoffs
between them from a game-theoretic perspective, where
each network element attempts to optimize its
individual performance. We show that for all considered
cases but one, the existence of a Nash equilibrium
point is guaranteed. For the latter case, we indicate,
by simulations, that practical scenarios tend to admit
a Nash equilibrium. In addition, we demonstrate that
the price of anarchy, i.e., the performance penalty
incurred by noncooperative behavior, may be
prohibitively large; yet, we also show that such games
usually admit at least one Nash equilibrium that is
system-wide optimal, i.e., their price of stability is
1. This finding suggests that a major improvement can
be achieved by providing a central (``social'') agent
with the ability to impose the initial configuration on
the system.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Bremler-Barr:2014:CSP,
author = "Anat Bremler-Barr and David Hay and Yaron Koral",
title = "{CompactDFA}: Scalable pattern matching using longest
prefix match solutions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "415--428",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253119",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib;
https://www.math.utah.edu/pub/tex/bib/string-matching.bib",
abstract = "A central component in all contemporary intrusion
detection systems (IDSs) is their pattern matching
algorithms, which are often based on constructing and
traversing a deterministic finite automaton (DFA) that
represents the patterns. While this approach ensures
deterministic time guarantees, modern IDSs need to deal
with hundreds of patterns, thus requiring to store very
large DFAs, which usually do not fit in fast memory.
This results in a major bottleneck on the throughput of
the IDS, as well as its power consumption and cost. We
propose a novel method to compress DFAs by observing
that the name used by common DFA encoding is
meaningless. While regular DFAs store separately each
transition between two states, we use this degree of
freedom and encode states in such a way that all
transitions to a specific state are represented by a
single prefix that defines a set of current states. Our
technique applies to a large class of automata, which
can be categorized by simple properties. Then, the
problem of pattern matching is reduced to the
well-studied problem of Longest Prefix Match (LPM),
which can be solved either in ternary
content-addressable memory (TCAM), in commercially
available IP-lookup chips, or in software.
Specifically, we show that with a TCAM our scheme can
reach a throughput of 10 Gb/s with low power
consumption.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chamania:2014:CAE,
author = "Mohit Chamania and Admela Jukan",
title = "A comparative analysis of the effects of dynamic
optical circuit provisioning on {IP} routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "429--442",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2251897",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We analyze the effects of dynamic optical circuit
setup on IP routing in general and on two routing
mechanisms in particular, i.e., explicit routing and
shortest-path-first routing. We present analytical
models for computing the size and placement of optical
circuits and propose model adaptations driven by the IP
router system design. The results show that without
careful consideration of intrinsic capabilities of IP
routing protocol and forwarding, the size and location
of optical circuits used can be vastly underestimated,
also leading to significant disruptions in real
networks. We present the Optical Bypass mechanisms and
show that these methods, unlike traditional IP
routing-based solutions, affect a comparatively lower
number of IP routes and can be computed near-optimally,
even under unknown traffic matrix conditions, making
them effective and feasible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lim:2014:BCP,
author = "Hyesook Lim and Nara Lee and Geumdan Jin and Jungwon
Lee and Youngju Choi and Changhoon Yim",
title = "Boundary cutting for packet classification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "443--456",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2254124",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Decision-tree-based packet classification algorithms
such as HiCuts, HyperCuts, and EffiCuts show excellent
search performance by exploiting the geometrical
representation of rules in a classifier and searching
for a geometric subspace to which each input packet
belongs. However, decision tree algorithms involve
complicated heuristics for determining the field and
number of cuts. Moreover, fixed interval-based cutting
not relating to the actual space that each rule covers
is ineffective and results in a huge storage
requirement. A new efficient packet classification
algorithm using boundary cutting is proposed in this
paper. The proposed algorithm finds out the space that
each rule covers and performs the cutting according to
the space boundary. Hence, the cutting in the proposed
algorithm is deterministic rather than involving the
complicated heuristics, and it is more effective in
providing improved search performance and more
efficient in memory requirement. For rule sets with
1000-100 000 rules, simulation results show that the
proposed boundary cutting algorithm provides a packet
classification through 10-23 on-chip memory accesses
and 1-4 off-chip memory accesses in average.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ramaswamy:2014:WPM,
author = "Vinod Ramaswamy and Diganto Choudhury and Srinivas
Shakkottai",
title = "Which protocol? {Mutual} interaction of heterogeneous
congestion controllers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "457--469",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2262773",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A large number of congestion control protocols have
been proposed in the last few years, with all having
the same purpose--to divide available bandwidth
resources among different flows in a fair manner. Each
protocol operates on the paradigm of some conception of
link price (such as packet losses or packet delays)
that determines source transmission rates. Recent work
on network utility maximization has brought forth the
idea that the fundamental price or Lagrange multiplier
for a link is proportional to the queue length at that
link, and that different congestion metrics (such as
delays or drops) are essentially ways of interpreting
such a Lagrange multiplier. We thus ask the following
question: Suppose that each flow has a number of
congestion control protocols to choose from, which one
(or combination) should it choose? We introduce a
framework wherein each flow has a utility that depends
on throughput and also has a disutility that is some
function of the queue lengths encountered along the
route taken. Flows must choose a combination of
protocols that would maximize their payoffs. We study
both the socially optimal, as well as the selfish cases
to determine the loss of system-wide value incurred
through selfish decision making, so characterizing the
``price of heterogeneity.'' We also propose tolling
schemes that incentivize flows to choose one of several
different virtual networks catering to particular needs
and show that the total system value is greater, hence
making a case for the adoption of such virtual
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xue:2014:PTA,
author = "Guoliang Xue and Ravi Gottapu and Xi Fang and Dejun
Yang and Krishnaiyan Thulasiraman",
title = "A polynomial-time algorithm for computing disjoint
lightpath pairs in minimum isolated-failure-immune
{WDM} optical networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "470--483",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2257180",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A fundamental problem in survivable routing in
wavelength division multiplexing (WDM) optical networks
is the computation of a pair of link-disjoint (or
node-disjoint) lightpaths connecting a source with a
destination, subject to the wavelength continuity
constraint. However, this problem is NP-hard when the
underlying network topology is a general mesh network.
As a result, heuristic algorithms and integer linear
programming (ILP) formulations for solving this problem
have been proposed. In this paper, we advocate the use
of 2-edge connected (or 2-node connected) subgraphs of
minimum isolated failure immune networks as the
underlying topology for WDM optical networks. We
present a polynomial-time algorithm for computing a
pair of link-disjoint lightpaths with shortest total
length in such networks. The running time of our
algorithm is O ( nW$^2$ ), where n is the number of
nodes, and W is the number of wavelengths per link.
Numerical results are presented to demonstrate the
effectiveness and scalability of our algorithm.
Extension of our algorithm to the node-disjoint case is
straightforward.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lubben:2014:SBE,
author = "Ralf L{\"u}bben and Markus Fidler and J{\"o}rg
Liebeherr",
title = "Stochastic bandwidth estimation in networks with
random service",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "484--497",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2261914",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Numerous methods for available bandwidth estimation
have been developed for wireline networks, and their
effectiveness is well-documented. However, most methods
fail to predict bandwidth availability reliably in a
wireless setting. It is accepted that the increased
variability of wireless channel conditions makes
bandwidth estimation more difficult. However, a
(satisfactory) explanation why these methods are
failing is missing. This paper seeks to provide
insights into the problem of bandwidth estimation in
wireless networks or, more broadly, in networks with
random service. We express bandwidth availability in
terms of bounding functions with a defined violation
probability. Exploiting properties of a stochastic
min-plus linear system theory, the task of bandwidth
estimation is formulated as inferring an unknown
bounding function from measurements of probing traffic.
We present derivations showing that simply using the
expected value of the available bandwidth in networks
with random service leads to a systematic
overestimation of the traffic departures. Furthermore,
we show that in a multihop setting with random service
at each node, available bandwidth estimates requires
observations over (in principle infinitely) long time
periods. We propose a new estimation method for random
service that is based on iterative constant-rate probes
that take advantage of statistical methods. We show how
our estimation method can be realized to achieve both
good accuracy and confidence levels. We evaluate our
method for wired single-and multihop networks, as well
as for wireless networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:OOS,
author = "Kai Chen and Ankit Singla and Atul Singh and Kishore
Ramachandran and Lei Xu and Yueping Zhang and Xitao Wen
and Yan Chen",
title = "{OSA}: an optical switching architecture for data
center networks with unprecedented flexibility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "498--511",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253120",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A detailed examination of evolving traffic
characteristics, operator requirements, and network
technology trends suggests a move away from nonblocking
interconnects in data center networks (DCNs). As a
result, recent efforts have advocated oversubscribed
networks with the capability to adapt to traffic
requirements on-demand. In this paper, we present the
design, implementation, and evaluation of OSA, a novel
Optical Switching Architecture for DCNs. Leveraging
runtime reconfigurable optical devices, OSA dynamically
changes its topology and link capacities, thereby
achieving unprecedented flexibility to adapt to dynamic
traffic patterns. Extensive analytical simulations
using both real and synthetic traffic patterns
demonstrate that OSA can deliver high bisection
bandwidth (60\%-100\% of the nonblocking architecture).
Implementation and evaluation of a small-scale
functional prototype further demonstrate the
feasibility of OSA.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gajic:2014:CWP,
author = "Vojislav Gaji{\'c} and Jianwei Huang and Bixio
Rimoldi",
title = "Competition of wireless providers for atomic users",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "512--525",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2255889",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study a problem where wireless service providers
compete for heterogeneous wireless users. The users
differ in their utility functions as well as in the
perceived quality of service of individual providers.
We model the interaction of an arbitrary number of
providers and users as a two-stage
multi-leader-follower game. We prove existence and
uniqueness of the subgame perfect Nash equilibrium for
a generic channel model and a wide class of users'
utility functions. We show that the competition of
resource providers leads to a globally optimal outcome
under mild technical conditions. Most users will
purchase the resource from only one provider at the
unique subgame perfect equilibrium. The number of users
who connect to multiple providers at the equilibrium is
always smaller than the number of providers. We also
present a decentralized algorithm that globally
converges to the unique system equilibrium with only
local information under mild conditions on the update
rates.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{DeCicco:2014:AVS,
author = "Luca {De Cicco} and Saverio Mascolo",
title = "An adaptive video streaming control system: modeling,
validation, and performance evaluation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "526--539",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253797",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Adaptive video streaming is a relevant advancement
with respect to classic progressive download streaming
a la YouTube. Among the different approaches, the video
stream-switching technique is getting wide acceptance,
being adopted by Microsoft, Apple, and popular video
streaming services such as Akamai, Netflix, Hulu, Vudu,
and Livestream. In this paper, we present a model of
the automatic video stream-switching employed by one of
these leading video streaming services along with a
description of the client-side communication and
control protocol. From the control architecture point
of view, the automatic adaptation is achieved by means
of two interacting control loops having the controllers
at the client and the actuators at the server: One loop
is the buffer controller, which aims at steering the
client playout buffer to a target length by regulating
the server sending rate; the other one implements the
stream-switching controller and aims at selecting the
video level. A detailed validation of the proposed
model has been carried out through experimental
measurements in an emulated scenario.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Le:2014:IRI,
author = "Franck Le and Jo{\~a}o Lu{\'\i}s Sobrinho",
title = "Interconnecting routing instances",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "540--553",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2255311",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many operators run more than one routing instance--
more than one routing protocol, or more than one
instance of a given routing protocol--in their
networks. Route election and route redistribution are
mechanisms introduced by router vendors to interconnect
routing instances. We show that these mechanisms do not
heed basic performance goals. Especially, we show that,
in general, they do not allow network configurations
that are simultaneously free from routing anomalies and
resilient to failures. We then propose a new form of
interconnection that overcomes the limitations of route
election and route redistribution, permitting the
configuration of a resilient and efficient routing
system. We conduct a thorough study of this new form of
interconnection, presenting conditions for its
correctness and optimality. The precepts of the study
are applied to routing instances substantiated by the
current Internal Gateway Protocols of the Internet:
RIP, OSPF, IS-IS, IGRP, and EIGRP.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zeng:2014:ATP,
author = "Hongyi Zeng and Peyman Kazemian and George Varghese
and Nick McKeown",
title = "Automatic test packet generation",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "554--566",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253121",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Networks are getting larger and more complex, yet
administrators rely on rudimentary tools such as and to
debug problems. We propose an automated and systematic
approach for testing and debugging networks called
``Automatic Test Packet Generation'' (ATPG). ATPG reads
router configurations and generates a
device-independent model. The model is used to generate
a minimum set of test packets to (minimally) exercise
every link in the network or (maximally) exercise every
rule in the network. Test packets are sent
periodically, and detected failures trigger a separate
mechanism to localize the fault. ATPG can detect both
functional (e.g., incorrect firewall rule) and
performance problems (e.g., congested queue). ATPG
complements but goes beyond earlier work in static
checking (which cannot detect liveness or performance
faults) or fault localization (which only localize
faults given liveness results). We describe our
prototype ATPG implementation and results on two
real-world data sets: Stanford University's backbone
network and Internet2. We find that a small number of
test packets suffices to test all rules in these
networks: For example, 4000 packets can cover all rules
in Stanford backbone network, while 54 are enough to
cover all links. Sending 4000 test packets 10 times per
second consumes less than 1\% of link capacity. ATPG
code and the data sets are publicly available.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:LLB,
author = "Feng Li and Chi Zhang and Jun Luo and Shi-Qing Xin and
Ying He",
title = "{LBDP}: localized boundary detection and
parametrization for {$3$-D} sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "567--579",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253561",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many applications of wireless sensor networks involve
monitoring a time-variant event (e.g., radiation
pollution in the air). In such applications, fast
boundary detection is a crucial function, as it allows
us to track the event variation in a timely fashion.
However, the problem becomes very challenging as it
demands a highly efficient algorithm to cope with the
dynamics introduced by the evolving event. Moreover, as
many physical events occupy volumes rather than
surfaces (e.g., pollution again), the algorithm has to
work for 3-D cases. Finally, as boundaries of a 3-D
network can be complicated 2-manifolds, many network
functionalities (e.g., routing) may fail in the face of
such boundaries. To this end, we propose Localized
Boundary Detection and Parametrization (LBDP) to tackle
these challenges. The first component of LBDP is
UNiform Fast On-Line boundary Detection (UNFOLD). It
applies an inversion to node coordinates such that a
``notched'' surface is ``unfolded'' into a convex one,
which in turn reduces boundary detection to a localized
convexity test. We prove the correctness and efficiency
of UNFOLD; we also use simulations and implementations
to evaluate its performance, which demonstrates that
UNFOLD is two orders of magnitude more time- and
energy-efficient than the most up-to-date proposal.
Another component of LBDP is Localized Boundary
Sphericalization (LBS). Through purely localized
operations, LBS maps an arbitrary genus-0 boundary to a
unit sphere, which in turn supports functionalities
such as distinguishing interboundaries from external
ones and distributed coordinations on a boundary. We
implement LBS in TOSSIM and use simulations to show its
effectiveness.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kavitha:2014:FSC,
author = "Veeraruna Kavitha and Eitan Altman and R. El-Azouzi
and Rajesh Sundaresan",
title = "Fair scheduling in cellular systems in the presence of
noncooperative mobiles",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "580--594",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2253562",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of ``fair'' scheduling the
resources to one of the many mobile stations by a
centrally controlled base station (BS). The BS is the
only entity taking decisions in this framework based on
truthful information from the mobiles on their radio
channel. We study the well-known family of parametric
\alpha -fair scheduling problems from a game-theoretic
perspective in which some of the mobiles may be
noncooperative. We first show that if the BS is unaware
of the noncooperative behavior from the mobiles, the
noncooperative mobiles become successful in snatching
the resources from the other cooperative mobiles,
resulting in unfair allocations. If the BS is aware of
the noncooperative mobiles, a new game arises with BS
as an additional player. It can then do better by
neglecting the signals from the noncooperative mobiles.
The BS, however, becomes successful in eliciting the
truthful signals from the mobiles only when it uses
additional information (signal statistics). This new
policy along with the truthful signals from mobiles
forms a Nash equilibrium (NE) that we call a Truth
Revealing Equilibrium. Finally, we propose new
iterative algorithms to implement fair scheduling
policies that robustify the otherwise nonrobust (in
presence of noncooperation) \alpha -fair scheduling
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Anshelevich:2014:CAG,
author = "Elliot Anshelevich and Bugra Caskurlu and Koushik Kar
and Hang Zhang",
title = "Capacity allocation games for network-coded multicast
streaming",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "595--607",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2255890",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we formulate and study a capacity
allocation game between a set of receivers (players)
that are interested in receiving multicast data
(video/multimedia) being streamed from a server through
a multihop network. We consider fractional multicast
streaming, where the multicast stream from the source
(origin-server) to any particular receiver (end-user)
can be split over multiple paths. The receivers are
selfish and noncooperative, but must collaboratively
purchase capacities of links in the network, as
necessary for delivery of the multicast stream from the
source to the individual receivers, assuming that the
multicast stream is network-coded. For this multicast
capacity allocation (network formation) game, we show
that the Nash equilibrium is guaranteed to exist in
general. For a 2-tier network model where the receivers
must obtain the multicast data from the source through
a set of relay nodes, we show that the price of
stability is at most 2, and provide a polynomial-time
algorithm that computes a Nash equilibrium whose social
cost is within a factor of 2 of the socially optimum
solution. For more general network models, we show that
there exists a 2-approximate Nash equilibrium, whose
cost is at most two times the social optimum. We also
give a polynomial-time algorithm that computes a (2 +
\epsilon )-approximate Nash equilibrium for any
\epsilon > 0, whose cost is at most two times the
social optimum. Simulation studies show that our
algorithms generate efficient Nash equilibrium
allocation solutions for a vast majority of randomly
generated network topologies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiao:2014:ILW,
author = "Qingjun Xiao and Bin Xiao and Kai Bu and Jiannong
Cao",
title = "Iterative localization of wireless sensor networks: an
accurate and robust approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "608--621",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2257839",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In wireless sensor networks, an important research
problem is to use a few anchor nodes with known
locations to derive the locations of other nodes
deployed in the sensor field. A category of solutions
for this problem is the iterative localization, which
sequentially merges the elements in a network to
finally locate them. Here, a network element is
different from its definition in iterative
trilateration. It can be either an individual node or a
group of nodes. For this approach, we identify a new
problem called inflexible body merging, whose objective
is to align two small network elements and generate a
larger element. It is more generalized than the
traditional tools of trilateration and patch stitching
and can replace them as a new merging primitive. We
solve this problem and make the following
contributions. (1) Our primitive can tolerate ranging
noise when merging two network elements. It adopts an
optimization algorithm based on rigid body dynamics and
relaxing springs. (2) Our primitive improves the
robustness against flip ambiguities. It uses orthogonal
regression to detect the rough collinearity of nodes in
the presence of ranging noise, and then enumerate flip
ambiguities accordingly. (3) We present a condition to
indicate when we can apply this primitive to align two
network elements. This condition can unify previous
work and thus achieve a higher percentage of
localizable nodes. All the declared contributions have
been validated by both theoretical analysis and
simulation results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:MCM,
author = "Yixuan Li and Qiuyu Peng and Xinbing Wang",
title = "Multicast capacity with max-min fairness for
heterogeneous networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "622--635",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2255065",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the multicast capacity
for static ad hoc networks with heterogeneous clusters.
We study the effect of heterogeneous cluster traffic
(HCT) on the achievable capacity. HCT means cluster
clients are more likely to appear near the cluster head
instead of being uniformly distributed across the
network. Such a property is commonly found in real
networks. By adopting max-min fairness, the minimum
among all individual multicast capacities of clusters
can be maximized. Since this minimal individual
multicast capacity will not be maximized unlimitedly,
our work focuses on deriving the upper bound of the
minimum individual multicast capacity (we refer it as
minimum capacity for simplicity) in HCT, which provides
the best performance for the minimum multicast capacity
to attain in the whole network. We find that HCT
increases minimum capacity for ad hoc networks.
Furthermore, the multicast capacity achieving scheme is
provided to justify the derived asymptotic upper bound
for the minimum capacity. Our work can generalize
various results obtained under nonheterogeneous
networks in previous literature.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2014:CER,
author = "Rami Cohen and Danny Raz",
title = "Cost-effective resource allocation of overlay routing
relay nodes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "636--646",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2260867",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Overlay routing is a very attractive scheme that
allows improving certain properties of the routing
(such as delay or TCP throughput) without the need to
change the standards of the current underlying routing.
However, deploying overlay routing requires the
placement and maintenance of overlay infrastructure.
This gives rise to the following optimization problem:
Find a minimal set of overlay nodes such that the
required routing properties are satisfied. In this
paper, we rigorously study this optimization problem.
We show that it is NP-hard and derive a nontrivial
approximation algorithm for it, where the approximation
ratio depends on specific properties of the problem at
hand. We examine the practical aspects of the scheme by
evaluating the gain one can get over several real
scenarios. The first one is BGP routing, and we show,
using up-to-date data reflecting the current BGP
routing policy in the Internet, that a relative small
number of less than 100 relay servers is sufficient to
enable routing over shortest paths from a single source
to all autonomous systems (ASs), reducing the average
path length of inflated paths by 40\%. We also
demonstrate that the scheme is very useful for TCP
performance improvement (results in an almost optimal
placement of overlay nodes) and for Voice-over-IP
(VoIP) applications where a small number of overlay
nodes can significantly reduce the maximal peer-to-peer
delay.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Loiseau:2014:IMI,
author = "Patrick Loiseau and Galina Schwartz and John Musacchio
and Saurabh Amin and S. Shankar Sastry",
title = "Incentive mechanisms for {Internet} congestion
management: fixed-budget rebate versus time-of-day
pricing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "647--661",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270442",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Mobile data traffic has been steadily rising in the
past years. This has generated a significant interest
in the deployment of incentive mechanisms to reduce
peak-time congestion. Typically, the design of these
mechanisms requires information about user demand and
sensitivity to prices. Such information is naturally
imperfect. In this paper, we propose a fixed-budget
rebate mechanism that gives each user a reward
proportional to his percentage contribution to the
aggregate reduction in peak-time demand. For
comparison, we also study a time-of-day pricing
mechanism that gives each user a fixed reward per unit
reduction of his peak-time demand. To evaluate the two
mechanisms, we introduce a game-theoretic model that
captures the public good nature of decongestion. For
each mechanism, we demonstrate that the socially
optimal level of decongestion is achievable for a
specific choice of the mechanism's parameter. We then
investigate how imperfect information about user demand
affects the mechanisms' effectiveness. From our
results, the fixed-budget rebate pricing is more robust
when the users' sensitivity to congestion is
``sufficiently'' convex. This feature of the
fixed-budget rebate mechanism is attractive for many
situations of interest and is driven by its closed-loop
property, i.e., the unit reward decreases as the
peak-time demand decreases.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Joo:2014:DPN,
author = "Changhee Joo and Ness B. Shroff",
title = "On the delay performance of in-network aggregation in
lossy wireless sensor networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "662--673",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2256795",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the implication of wireless
broadcast for data aggregation in lossy wireless sensor
networks. Each sensor node generates information by
sensing its physical environment and transmits the data
to a special node called the sink, via multihop
communications. The goal of the network system is to
compute a function at the sink from the information
gathered by spatially distributed sensor nodes. In the
course of collecting information, in-network
computation at intermediate forwarding nodes can
substantially increase network efficiency by reducing
the number of transmissions. On the other hand, it also
increases the amount of the information contained in a
single packet and makes the system vulnerable to packet
loss. Instead of retransmitting lost packets, which
incurs additional delay, we develop a wireless system
architecture that exploits the diversity of the
wireless medium for reliable operations. To elaborate,
we show that for a class of aggregation functions,
wireless broadcasting is an effective strategy to
improve delay performance while satisfying reliability
constraint. We provide scaling law results on the
performance improvement of our solution over unicast
architecture with retransmissions. Interestingly, the
improvement depends on the transmission range as well
as the reliability constraint.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Borst:2014:NUM,
author = "Sem C. Borst and Mihalis G. Markakis and Iraj Saniee",
title = "Nonconcave utility maximization in locally coupled
systems, with applications to wireless and wireline
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "2",
pages = "674--687",
month = apr,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2257181",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Jun 11 19:05:55 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Motivated by challenging resource allocation issues
arising in large-scale wireless and wireline
communication networks, we study distributed network
utility maximization problems with a mixture of concave
(e.g., best-effort throughputs) and nonconcave (e.g.,
voice/video streaming rates) utilities. In the first
part of the paper, we develop our methodological
framework in the context of a locally coupled networked
system, where nodes represent agents that control a
discrete local state. Each node has a possibly
nonconcave local objective function, which depends on
the local state of the node and the local states of its
neighbors. The goal is to maximize the sum of the local
objective functions of all nodes. We devise an
iterative randomized algorithm, whose convergence and
optimality properties follow from the classical
framework of Markov Random Fields and Gibbs Measures
via a judiciously selected neighborhood structure. The
proposed algorithm is distributed, asynchronous,
requires limited computational effort per
node/iteration, and yields provable convergence in the
limit. In order to demonstrate the scope of the
proposed methodological framework, in the second part
of the paper we show how the method can be applied to
two different problems for which no distributed
algorithm with provable convergence and optimality
properties is available. Specifically, we describe how
the proposed methodology provides a distributed
mechanism for solving nonconcave utility maximization
problems: (1) arising in OFDMA cellular networks,
through power allocation and user assignment; (2)
arising in multihop wireline networks, through explicit
rate allocation. Several numerical experiments are
presented to illustrate the convergence speed and
performance of the proposed method.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Venkataraman:2014:EIP,
author = "Mukundan Venkataraman and Mainak Chatterjee",
title = "Effects of {Internet} path selection on {video-QoE}:
analysis and improvements",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "689--702",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2257838",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents large-scale Internet measurements
to understand and improve the effects of Internet path
selection on perceived video quality, or quality of
experience (QoE). We systematically study a large
number of Internet paths between popular video
destinations and clients to create an empirical
understanding of location, persistence, and recurrence
of failures. These failures are mapped to perceived
video quality by reconstructing video clips and
conducting surveys. We then investigate ways to recover
from QoE degradation by choosing one-hop detour paths
that preserve application-specific policies. We seek
simple, scalable path selection strategies without the
need for background path monitoring. Using five
different measurement overlays spread across the globe,
we show that a source can recover from over 75\% of the
degradations by attempting to restore QoE with any $k$
randomly chosen nodes in an overlay, where $k$ is
bounded by $ O(\ln (N))$. We argue that our results are
robust across datasets. Finally, we design and
implement a prototype packet forwarding module called
source initiated frame restoration (SIFR). We deployed
SIFR on PlanetLab nodes and compared the performance of
SIFR to the default Internet routing. We show that SIFR
outperforms IP-path selection by providing higher
on-screen perceptual quality.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:PDC,
author = "Shuqin Li and Jianwei Huang",
title = "Price differentiation for communication networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "703--716",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2258173",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the optimal usage-based pricing problem in a
resource-constrained network with one profit-maximizing
service provider and multiple groups of
surplus-maximizing users. With the assumption that the
service provider knows the utility function of each
user (thus complete information), we find that the
complete price differentiation scheme can achieve a
large revenue gain (e.g., 50\%) compared to no price
differentiation, when the total network resource is
comparably limited and the high-willingness-to-pay
users are minorities. However, the complete price
differentiation scheme may lead to a high
implementational complexity. To trade off the revenue
against the implementational complexity, we further
study the partial price differentiation scheme and
design a polynomial-time algorithm that can compute the
optimal partial differentiation prices. We also
consider the incomplete information case where the
service provider does not know to which group each user
belongs. We show that it is still possible to realize
price differentiation under this scenario and provide
the sufficient and necessary condition under which an
incentive-compatible differentiation scheme can achieve
the same revenue as under complete information.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2014:ODP,
author = "Shaoquan Zhang and Ziyu Shao and Minghua Chen and
Libin Jiang",
title = "Optimal distributed {P2P} streaming under node degree
bounds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "717--730",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270915",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of maximizing the broadcast rate
in peer-to-peer (P2P) systems under node degree bounds,
i.e., the number of neighbors a node can simultaneously
connect to is upper-bounded. The problem is critical
for supporting high-quality video streaming in P2P
systems and is challenging due to its combinatorial
nature. In this paper, we address this problem by
providing the first distributed solution that achieves
near-optimal broadcast rate under arbitrary node degree
bounds and over arbitrary overlay graph. It runs on
individual nodes and utilizes only the measurement from
their one-hop neighbors, making the solution easy to
implement and adaptable to peer churn and network
dynamics. Our solution consists of two distributed
algorithms proposed in this paper that can be of
independent interests: a network-coding-based
broadcasting algorithm that optimizes the broadcast
rate given a topology, and a Markov-chain guided
topology hopping algorithm that optimizes the topology.
Our distributed broadcasting algorithm achieves the
optimal broadcast rate over arbitrary P2P topology,
while previously proposed distributed algorithms obtain
optimality only for P2P complete graphs. We prove the
optimality of our solution and its convergence to a
neighborhood around the optimal equilibrium under noisy
measurements or without time-scale separation
assumptions. We demonstrate the effectiveness of our
solution in simulations using uplink bandwidth
statistics of Internet hosts.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cho:2014:PMP,
author = "Jeong-Woo Cho and Yung Yi",
title = "On the payoff mechanisms in peer-assisted services
with multiple content providers: rationality and
fairness",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "731--744",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2259637",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper studies an incentive structure for
cooperation and its stability in peer-assisted services
when there exist multiple content providers, using a
coalition game-theoretic approach. We first consider a
generalized coalition structure consisting of multiple
providers with many assisting peers, where peers assist
providers to reduce the operational cost in content
distribution. To distribute the profit from cost
reduction to players (i.e, providers and peers), we
then establish a generalized formula for individual
payoffs when a ``Shapley-like'' payoff mechanism is
adopted. We show that the grand coalition is unstable,
even when the operational cost functions are concave,
which is in sharp contrast to the recently studied case
of a single provider where the grand coalition is
stable. We also show that irrespective of stability of
the grand coalition, there always exist coalition
structures that are not convergent to the grand
coalition under a dynamic among coalition structures.
Our results give us an incontestable fact that a
provider does not tend to cooperate with other
providers in peer-assisted services and is separated
from them. Three facets of the noncooperative (selfish)
providers are illustrated: (1) underpaid peers; (2)
service monopoly; and (3) oscillatory coalition
structure. Lastly, we propose a stable payoff mechanism
that improves fairness of profit sharing by regulating
the selfishness of the players as well as grants the
content providers a limited right of realistic
bargaining. Our study opens many new questions such as
realistic and efficient incentive structures and the
tradeoffs between fairness and individual providers'
competition in peer-assisted services.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Goussevskaia:2014:AWC,
author = "Olga Goussevskaia and Magn{\'u}s M. Halld{\'o}rsson
and Roger Wattenhofer",
title = "Algorithms for wireless capacity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "745--755",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2258036",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we address two basic questions in
wireless communication. First, how long does it take to
schedule an arbitrary set of communication requests?
Second, given a set of communication requests, how many
of them can be scheduled concurrently? Our results are
derived in the signal-to-interference-plus-noise ratio
(SINR) interference model with geometric path loss and
consist of efficient algorithms that find a constant
approximation for the second problem and a logarithmic
approximation for the first problem. In addition, we
show that the interference model is robust to various
factors that can influence the signal attenuation. More
specifically, we prove that as long as influences on
the signal attenuation are constant, they affect the
capacity only by a constant factor.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sundaresan:2014:CVM,
author = "Karthikeyan Sundaresan and Sampath Rangarajan",
title = "Cooperation versus multiplexing: multicast scheduling
algorithms for {OFDMA} relay networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "756--769",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2260353",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "With the next-generation cellular networks making a
transition toward smaller cells, two-hop orthogonal
frequency-division multiple access (OFDMA) relay
networks have become a dominant, mandatory component in
the 4G standards (WiMAX 802.16j, 3GPP LTE-Adv). While
unicast flows have received reasonable attention in
two-hop OFDMA relay networks, not much light has been
shed on the design of efficient scheduling algorithms
for multicast flows. Given the growing importance of
multimedia broadcast and multicast services (MBMS) in
4G networks, the latter forms the focus of this paper.
We show that while relay cooperation is critical for
improving multicast performance, it must be carefully
balanced with the ability to multiplex multicast
sessions and hence maximize aggregate multicast flow.
To this end, we highlight strategies that carefully
group relays for cooperation to achieve this balance.
We then solve the multicast scheduling problem under
two OFDMA subchannelization models. We establish the
NP-hardness of the scheduling problem even for the
simpler model and provide efficient algorithms with
approximation guarantees under both models. Evaluation
of the proposed solutions reveals the efficiency of the
scheduling algorithms as well as the significant
benefits obtained from the multicasting strategy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Almasaeid:2014:EMD,
author = "Hisham M. Almasaeid and Ahmed E. Kamal",
title = "Exploiting multichannel diversity for cooperative
multicast in cognitive radio mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "770--783",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2258035",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio networks (CRNs) have emerged as a
promising, yet challenging, solution to enhance
spectrum utilization, thanks to the technology of
cognitive radios. A well-known property of CRNs is the
potential heterogeneity in channel availability among
secondary users. Therefore, multicast throughput in
CRNs may suffer from significant degradation because of
this property since a link-level broadcast of a frame
may only reach a small subset of destinations that are
able to receive on the same channel. This may
necessitate multiple sequential transmissions of the
same frame by the source on different channels to
guarantee delivery to all receivers in the destination
set. In case of high data generation rate, delivery
delay will be high due to the repeated transmissions by
the source. In this paper, we propose an assistance
strategy to reduce the effect of the channel
heterogeneity property on the multicast throughput in
cognitive radio wireless mesh networks (CR-WMNs). This
assistance strategy is composed of two main activities:
first, allowing multicast receivers to assist the
source in delivering the data, and second, allowing the
transmission of coded packets so that multicast
receivers belonging to different multicast groups can
decode and extract their data concurrently. Results
show that the proposed assistance paradigm reduces
multicast time and increases throughput
significantly.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dhanapala:2014:TPM,
author = "Dulanjalie C. Dhanapala and Anura P. Jayasumana",
title = "Topology preserving maps: extracting layout maps of
wireless sensor networks from virtual coordinates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "784--797",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2263254",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A method for obtaining topology-preserving maps (TPMs)
from virtual coordinates (VCs) of wireless sensor
networks is presented. In a virtual coordinate system
(VCS), a node is identified by a vector containing its
distances, in hops, to a small subset of nodes called
anchors. Layout information such as physical voids,
shape, and even relative physical positions of sensor
nodes with respect to x-y directions are absent in a
VCS description. The proposed technique uses Singular
Value Decomposition to isolate dominant radial
information and to extract topological information from
the VCS for networks deployed on 2-D/3-D surfaces and
in 3-D volumes. The transformation required for TPM
extraction can be generated using the coordinates of a
subset of nodes, resulting in sensor-network-friendly
implementation alternatives. TPMs of networks
representing a variety of topologies are extracted.
Topology preservation error ( E TP), a metric that
accounts for both the number and degree of node flips,
is defined and used to evaluate 2-D TPMs. The
techniques extract TPMs with ( E TP) less than 2\%.
Topology coordinates provide an economical alternative
to physical coordinates for many sensor networking
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Seibert:2014:NSV,
author = "Jeff Seibert and Sheila Becker and Cristina
Nita-Rotaru and Radu State",
title = "{Newton}: securing virtual coordinates by enforcing
physical laws",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "798--811",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2264725",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Virtual coordinate systems (VCSs) provide accurate
estimations of latency between arbitrary hosts on a
network, while conducting a small amount of actual
measurements and relying on node cooperation. While
these systems have good accuracy under benign settings,
they suffer a severe decrease of their effectiveness
when under attack by compromised nodes acting as
insider attackers. Previous defenses mitigate such
attacks by using machine learning techniques to
differentiate good behavior (learned over time) from
bad behavior. However, these defense schemes have been
shown to be vulnerable to advanced attacks that make
the schemes learn malicious behavior as good behavior.
We present Newton, a decentralized VCS that is robust
to a wide class of insider attacks. Newton uses an
abstraction of a real-life physical system, similar to
that of Vivaldi, but in addition uses safety invariants
derived from Newton's laws of motion. As a result,
Newton does not need to learn good behavior and can
tolerate a significantly higher percentage of malicious
nodes. We show through simulations and real-world
experiments on the PlanetLab testbed that Newton is
able to mitigate all known attacks against VCSs while
providing better accuracy than Vivaldi, even in benign
settings. Finally, we show how to design a VCS that
better matches a real physical system, thus allowing
for more intuitive and tighter system parameters that
are even more difficult to exploit by attackers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lu:2014:BAP,
author = "Ning Lu and Tom H. Luan and Miao Wang and Xuemin Shen
and Fan Bai",
title = "Bounds of asymptotic performance limits of
social-proximity vehicular networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "812--825",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2260558",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the asymptotic
performance limits (throughput capacity and average
packet delay) of social-proximity vehicular networks.
The considered network involves N vehicles moving and
communicating on a scalable grid-like street layout
following the social-proximity model: Each vehicle has
a restricted mobility region around a specific social
spot and transmits via a unicast flow to a destination
vehicle that is associated with the same social spot.
Moreover, the spatial distribution of the vehicle
decays following a power-law distribution from the
central social spot toward the border of the mobility
region. With vehicles communicating using a variant of
the two-hop relay scheme, the asymptotic bounds of
throughput capacity and average packet delay are
derived in terms of the number of social spots, the
size of the mobility region, and the decay factor of
the power-law distribution. By identifying these key
impact factors of performance mathematically, we find
three possible regimes for the performance limits. Our
results can be applied to predict the network
performance of real-world scenarios and provide insight
on the design and deployment of future vehicular
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2014:VTE,
author = "Yang Xu and Chenguang Yu and Jingjiang Li and Yong
Liu",
title = "Video telephony for end-consumers: measurement study
of {Google+}, {iChat} and {Skype}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "826--839",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2260354",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Video telephony requires high-bandwidth and low-delay
voice and video transmissions between geographically
distributed users. It is challenging to deliver
high-quality video telephony to end-consumers through
the best-effort Internet. In this paper, we present our
measurement study on three popular video telephony
systems on the Internet: Google+, iChat, and Skype.
Through a series of carefully designed active and
passive measurements, we uncover important information
about their key design choices and performance,
including application architecture, video generation
and adaptation schemes, loss recovery strategies,
end-to-end voice and video delays, resilience against
random and bursty losses, etc. The obtained insights
can be used to guide the design of applications that
call for high-bandwidth and low-delay data
transmissions under a wide range of ``best-effort''
network conditions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vadrevu:2014:DSP,
author = "Chaitanya S. K. Vadrevu and Rui Wang and Massimo
Tornatore and Charles U. Martel and Biswanath
Mukherjee",
title = "Degraded service provisioning in mixed-line-rate {WDM}
backbone networks using multipath routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "840--849",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2259638",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traffic in optical backbone networks is increasing and
becoming more heterogeneous with respect to bandwidth
and QoS requirements due to the popularity of
high-bandwidth services (such as cloud computing,
e-science, telemedicine, etc.), which need to coexist
with traditional services (HTTP, etc.). Mixed-line-rate
(MLR) networks that support lightpaths of different
rates such as 10, 40, 100 Gb/s, etc., are being studied
to better support the heterogeneous traffic demands.
Here, we study the important topic of degraded services
in MLR networks, where a service can accept some
degradation (i.e., reduction) in bandwidth in case of a
failure in exchange for a lower cost, a concept called
partial protection. Network operators may wish to
support degraded services to optimize network resources
and reduce cost. We propose using multipath routing to
support degraded services in MLR networks, a problem
that has not been studied before and is significantly
more challenging than in single-line-rate (SLR)
networks. We consider minimum-cost MLR network design
(i.e., choosing which transponder rates to use at each
node), considering the opportunity to exploit multipath
routes to support degraded services. We propose a
mixed-integer-linear-program (MILP) solution and a
computationally efficient heuristic, and consider two
partial-protection models. Our illustrative numerical
results show that significant cost savings can be
achieved due to partial protection versus full
protection and is highly beneficial for network
operators. We also note that multipath routing in MLR
networks exploits volume discount of higher-line-rate
transponders by cost-effectively grooming requests over
appropriate line rates to maximize transponder reuse
versus SLR.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dhaini:2014:EET,
author = "Ahmad R. Dhaini and Pin-Han Ho and Gangxiang Shen and
Basem Shihada",
title = "Energy efficiency in {TDMA}-based next-generation
passive optical access networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "850--863",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2259596",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Next-generation passive optical network (PON) has been
considered in the past few years as a cost-effective
broadband access technology. With the ever-increasing
power saving concern, energy efficiency has been an
important issue in its operations. In this paper, we
propose a novel sleep-time sizing and scheduling
framework for the implementation of green bandwidth
allocation (GBA) in TDMA-PONs. The proposed framework
leverages the batch-mode transmission feature of GBA to
minimize the overhead due to frequent ONU on-off
transitions. The optimal sleeping time sequence of each
ONU is determined in every cycle without violating the
maximum delay requirement. With multiple ONUs possibly
accessing the shared media simultaneously, a collision
may occur. To address this problem, we propose a new
sleep-time sizing mechanism, namely Sort-And-Shift
(SAS), in which the ONUs are sorted according to their
expected transmission start times, and their sleep
times are shifted to resolve any possible collision
while ensuring maximum energy saving. Results show the
effectiveness of the proposed framework and highlight
the merits of our solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Abedini:2014:CCS,
author = "Navid Abedini and Srinivas Shakkottai",
title = "Content caching and scheduling in wireless networks
with elastic and inelastic traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "864--874",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2261542",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The rapid growth of wireless content access implies
the need for content placement and scheduling at
wireless base stations. We study a system under which
users are divided into clusters based on their channel
conditions, and their requests are represented by
different queues at logical front ends. Requests might
be elastic (implying no hard delay constraint) or
inelastic (requiring that a delay target be met).
Correspondingly, we have request queues that indicate
the number of elastic requests, and deficit queues that
indicate the deficit in inelastic service. Caches are
of finite size and can be refreshed periodically from a
media vault. We consider two cost models that
correspond to inelastic requests for streaming stored
content and real-time streaming of events,
respectively. We design provably optimal policies that
stabilize the request queues (hence ensuring finite
delays) and reduce average deficit to zero [hence
ensuring that the quality-of-service (QoS) target is
met] at small cost. We illustrate our approach through
simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Eshete:2014:TBC,
author = "Addisu Tadesse Eshete and Yuming Jiang",
title = "On the transient behavior of {CHOKe}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "875--888",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2260831",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "CHOKe is a simple and stateless active queue
management (AQM) scheme. Apart from low operational
overhead, a highly attractive property of CHOKe is that
it can protect responsive TCP flows from unresponsive
UDP flows. Particularly, previous works have proven
that CHOKe is able to bound both bandwidth share and
buffer share of (a possible aggregate) UDP traffic
(flow) on a link. However, these studies consider, and
pertain only to, a steady state where the queue reaches
equilibrium in the presence of many (long-lived) TCP
flows and an unresponsive UDP flow of fixed arrival
rate. If the steady-state conditions are perturbed,
particularly when UDP traffic rate changes over time,
it is unclear whether the protection property of CHOKe
still holds. Indeed, it can be examined, for example,
that when UDP rate suddenly becomes 0 (i.e., flow
stops), the unresponsive flow may assume close to full
utilization in sub-round-trip-time (sub-RTT) scales,
potentially starving out the TCP flows. To explain this
apparent discrepancy, this paper investigates CHOKe
queue properties in a transient regime, which is the
time period of transition between two steady states of
the queue, initiated when the rate of the unresponsive
flow changes. Explicit expressions that characterize
flow throughputs in transient regimes are derived.
These results provide additional understanding of CHOKe
and give some explanation on its intriguing behavior in
the transient regime.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2014:CHB,
author = "Yifan Zhang and Gexin Yu and Qun Li and Haodong Wang
and Xiaojun Zhu and Baosheng Wang",
title = "Channel-hopping-based communication rendezvous in
cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "889--902",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270443",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio (CR) networks have an ample but
dynamic amount of spectrum for communications.
Communication rendezvous in CR networks is the process
of establishing a control channel between radios before
they can communicate. Designing a communication
rendezvous protocol that can take advantage of all the
available spectrum at the same time is of great
importance, because it alleviates load on control
channels, and thus further reduces probability of
collisions. In this paper, we present ETCH, efficient
channel-hopping-based MAC-layer protocols for
communication rendezvous in CR networks. Compared to
the existing solutions, ETCH fully exploits spectrum
diversity in communication rendezvous by allowing all
the rendezvous channels to be utilized at the same
time. We propose two protocols, SYNC-ETCH, which is a
synchronous protocol assuming CR nodes can synchronize
their channel hopping processes, and ASYNC-ETCH, which
is an asynchronous protocol not relying on global clock
synchronization. Our theoretical analysis and
ns-2-based evaluation show that ETCH achieves better
performances of time-to-rendezvous and throughput than
the existing work.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lin:2014:EHA,
author = "Hui Lin and Halit {\"U}ster",
title = "Exact and heuristic algorithms for data-gathering
cluster-based wireless sensor network design problem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "903--916",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2262153",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Data-gathering wireless sensor networks (WSNs) are
operated unattended over long time horizons to collect
data in several applications such as those in climate
monitoring and a variety of ecological studies.
Typically, sensors have limited energy (e.g., an
on-board battery) and are subject to the elements in
the terrain. In-network operations, which largely
involve periodically changing network flow decisions to
prolong the network lifetime, are managed remotely, and
the collected data are retrieved by a user via
Internet. In this paper, we study an integrated
topology control and routing problem in cluster-based
WSNs. To prolong network lifetime via efficient use of
the limited energy at the sensors, we adopt a
hierarchical network structure with multiple sinks at
which the data collected by the sensors are gathered
through the clusterheads (CHs). We consider a
mixed-integer linear programming (MILP) model to
optimally determine the sink and CH locations as well
as the data flow in the network. Our model effectively
utilizes both the position and the energy-level aspects
of the sensors while selecting the CHs and avoids the
highest-energy sensors or the sensors that are
well-positioned sensors with respect to sinks being
selected as CHs repeatedly in successive periods. For
the solution of the MILP model, we develop an effective
Benders decomposition (BD) approach that incorporates
an upper bound heuristic algorithm, strengthened cuts,
and an $ \epsilon $-optimal framework for accelerated
convergence. Computational evidence demonstrates the
efficiency of the BD approach and the heuristic in
terms of solution quality and time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Smaragdakis:2014:DSM,
author = "Georgios Smaragdakis and Nikolaos Laoutaris and
Konstantinos Oikonomou and Ioannis Stavrakakis and Azer
Bestavros",
title = "Distributed server migration for scalable {Internet}
service deployment",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "917--930",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270440",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The effectiveness of service provisioning in
large-scale networks is highly dependent on the number
and location of service facilities deployed at various
hosts. The classical, centralized approach to
determining the latter would amount to formulating and
solving the uncapacitated $k$-median (UKM) problem (if
the requested number of facilities is fixed-$k$) or the
uncapacitated facility location (UFL) problem (if the
number of facilities is also to be optimized). Clearly,
such centralized approaches require knowledge of global
topological and demand information, and thus do not
scale and are not practical for large networks. The key
question posed and answered in this paper is the
following: ``How can we determine in a distributed and
scalable manner the number and location of service
facilities?'' In this paper, we develop a scalable and
distributed approach that answers our key question
through an iterative reoptimization of the location and
the number of facilities within network neighborhoods.
We propose an innovative approach to migrate, add, or
remove servers within limited-scope network
neighborhoods by utilizing only local information about
the topology and demand. We show that even with limited
information about the network topology and demand,
within one or two hops, our distributed approach
achieves performance, under various synthetic and real
Internet topologies and workloads, that is comparable
to that of optimal, centralized approaches requiring
full topology and demand information. We also show that
it is responsive to volatile demand. Our approach
leverages recent advances in virtualization technology
toward an automated placement of services on the
Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2014:BAI,
author = "Kuai Xu and Feng Wang and Lin Gu",
title = "Behavior analysis of {Internet} traffic via bipartite
graphs and one-mode projections",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "931--942",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2264634",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As Internet traffic continues to grow in size and
complexity, it has become an increasingly challenging
task to understand behavior patterns of end-hosts and
network applications. This paper presents a novel
approach based on behavioral graph analysis to study
the behavior similarity of Internet end-hosts.
Specifically, we use bipartite graphs to model host
communications from network traffic and build one-mode
projections of bipartite graphs for discovering
social-behavior similarity of end-hosts. By applying
simple and efficient clustering algorithms on the
similarity matrices and clustering coefficient of
one-mode projection graphs, we perform network-aware
clustering of end-hosts in the same network prefixes
into different end-host behavior clusters and discover
inherent clustered groups of Internet applications. Our
experiment results based on real datasets show that
end-host and application behavior clusters exhibit
distinct traffic characteristics that provide improved
interpretations on Internet traffic. Finally, we
demonstrate the practical benefits of exploring
behavior similarity in profiling network behaviors,
discovering emerging network applications, and
detecting anomalous traffic patterns.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Butkiewicz:2014:CWP,
author = "Michael Butkiewicz and Harsha V. Madhyastha and Vyas
Sekar",
title = "Characterizing {Web} page complexity and its impact",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "943--956",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2269999",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Over the years, the Web has evolved from simple text
content from one server to a complex ecosystem with
different types of content from servers spread across
several administrative domains. There is anecdotal
evidence of users being frustrated with high page load
times. Because page load times are known to directly
impact user satisfaction, providers would like to
understand if and how the complexity of their Web sites
affects the user experience. While there is an
extensive literature on measuring Web graphs, Web site
popularity, and the nature of Web traffic, there has
been little work in understanding how complex
individual Web sites are, and how this complexity
impacts the clients' experience. This paper is a first
step to address this gap. To this end, we identify a
set of metrics to characterize the complexity of Web
sites both at a content level (e.g., number and size of
images) and service level (e.g., number of
servers/origins). We find that the distributions of
these metrics are largely independent of a Web site's
popularity rank. However, some categories (e.g., News)
are more complex than others. More than 60\% of Web
sites have content from at least five non-origin
sources, and these contribute more than 35\% of the
bytes downloaded. In addition, we analyze which metrics
are most critical for predicting page render and load
times and find that the number of objects requested is
the most important factor. With respect to variability
in load times, however, we find that the number of
servers is the best indicator.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2014:HHA,
author = "Layong Luo and Gaogang Xie and Yingke Xie and Laurent
Mathy and Kav{\'e} Salamatian",
title = "A hybrid hardware architecture for high-speed {IP}
lookups and fast route updates",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "957--969",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2266665",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As network link rates are being pushed beyond 40 Gb/s,
IP lookup in high-speed routers is moving to hardware.
The ternary content addressable memory (TCAM)-based IP
lookup engine and the static random access memory
(SRAM)-based IP lookup pipeline are the two most common
ways to achieve high throughput. However, route updates
in both engines degrade lookup performance and may lead
to packet drops. Moreover, there is a growing interest
in virtual IP routers where more frequent updates
happen. Finding solutions that achieve both fast lookup
and low update overhead becomes critical. In this
paper, we propose a hybrid IP lookup architecture to
address this challenge. The architecture is based on an
efficient trie partitioning scheme that divides the
forwarding information base (FIB) into two prefix sets:
a large disjoint leaf prefix set mapped into an
external TCAM-based lookup engine and a small
overlapping prefix set mapped into an on-chip
SRAM-based lookup pipeline. Critical optimizations are
developed on both IP lookup engines to reduce the
update overhead. We show how to extend the proposed
hybrid architecture to support virtual routers. Our
implementation shows a throughput of 250 million
lookups per second (equivalent to 128 Gb/s with 64-B
packets). The update overhead is significantly lower
than that of previous work, the memory consumption is
reasonable, and the utilization ratio of most external
TCAMs is up to 100\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hu:2014:DCF,
author = "Chengchen Hu and Bin Liu and Hongbo Zhao and Kai Chen
and Yan Chen and Yu Cheng and Hao Wu",
title = "Discount counting for fast flow statistics on flow
size and flow volume",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "970--981",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270439",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A complete flow statistics report should include both
flow size (the number of packets in a flow) counting
and flow volume (the number of bytes in a flow)
counting. Although previous studies have contributed a
lot to the flow size counting problem, it is still a
great challenge to well support the flow volume
statistics due to the demanding requirements on both
memory size and memory bandwidth in monitoring device.
In this paper, we propose a DIScount COunting (DISCO)
method, which is designed for both flow size and flow
bytes counting. For each incoming packet of length l,
DISCO increases the corresponding counter assigned to
the flow with an increment that is less than l. With an
elaborate design on the counter update rule and the
inverse estimation, DISCO saves memory consumption
while providing an accurate unbiased estimator. The
method is evaluated thoroughly under theoretical
analysis and simulations with synthetic and real
traces. The results demonstrate that DISCO is more
accurate than related work given the same counter
sizes. DISCO is also implemented on the network
processor Intel IXP2850 for a performance test. Using
only one microengine (ME) in IXP2850, the throughput
can reach up to 11.1 Gb/s under a traditional traffic
pattern. The throughput increases to 39 Gb/s when
employing four MEs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xu:2014:HTM,
author = "Yang Xu and Zhaobo Liu and Zhuoyuan Zhang and H.
Jonathan Chao",
title = "High-throughput and memory-efficient multimatch packet
classification based on distributed and pipelined hash
tables",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "982--995",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270441",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/hash.bib;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The emergence of new network applications, such as the
network intrusion detection system and packet-level
accounting, requires packet classification to report
all matched rules instead of only the best matched
rule. Although several schemes have been proposed
recently to address the multimatch packet
classification problem, most of them require either
huge memory or expensive ternary content addressable
memory (TCAM) to store the intermediate data structure,
or they suffer from steep performance degradation under
certain types of classifiers. In this paper, we
decompose the operation of multimatch packet
classification from the complicated multidimensional
search to several single-dimensional searches, and
present an asynchronous pipeline architecture based on
a signature tree structure to combine the intermediate
results returned from single-dimensional searches. By
spreading edges of the signature tree across multiple
hash tables at different stages, the pipeline can
achieve a high throughput via the interstage parallel
access to hash tables. To exploit further intrastage
parallelism, two edge-grouping algorithms are designed
to evenly divide the edges associated with each stage
into multiple work-conserving hash tables. To avoid
collisions involved in hash table lookup, a hybrid
perfect hash table construction scheme is proposed.
Extensive simulation using realistic classifiers and
traffic traces shows that the proposed pipeline
architecture outperforms HyperCuts and B2PC schemes in
classification speed by at least one order of
magnitude, while having a similar storage requirement.
Particularly, with different types of classifiers of 4K
rules, the proposed pipeline architecture is able to
achieve a throughput between 26.8 and 93.1 Gb/s using
perfect hash tables.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Minnebo:2014:FCP,
author = "Wouter Minnebo and Benny {Van Houdt}",
title = "A fair comparison of pull and push strategies in large
distributed networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "996--1006",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270445",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we compare the performance of the pull
and push strategies in a large homogeneous distributed
system. When a pull strategy is in use, lightly loaded
nodes attempt to steal jobs from more highly loaded
nodes, while under the push strategy, more highly
loaded nodes look for lightly loaded nodes to process
some of their jobs. Given the maximum allowed overall
probe rate R and arrival rate $ \lambda $, we provide
closed-form solutions for the mean response time of a
job for the push and pull strategy under the infinite
system model. More specifically, we show that the push
strategy outperforms the pull strategy for any probe
rate $ R > 0 $ when $ \lambda < \varphi - 1 $, where $
\varphi = (1 + \sqrt 5) / 2 \approx 1.6180 $ is the
golden ratio. More generally, we show that the push
strategy prevails if and only if $ 2 \lambda < \sqrt (R
+ 1)^2 + 4 (R + 1) - (R + 1) $. We also show that under
the infinite system model, a hybrid pull-and-push
strategy is always inferior to the pure pull or push
strategy. The relation between the finite and infinite
system model is discussed, and simulation results that
validate the infinite system model are provided.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Congdon:2014:SRL,
author = "Paul T. Congdon and Prasant Mohapatra and Matthew
Farrens and Venkatesh Akella",
title = "Simultaneously reducing latency and power consumption
in {OpenFlow} switches",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "3",
pages = "1007--1020",
month = jun,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270436",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Wed Oct 1 09:58:30 MDT 2014",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Ethernet switch is a primary building block for
today's enterprise networks and data centers. As
network technologies converge upon a single Ethernet
fabric, there is ongoing pressure to improve the
performance and efficiency of the switch while
maintaining flexibility and a rich set of packet
processing features. The OpenFlow architecture aims to
provide flexibility and programmable packet processing
to meet these converging needs. Of the many ways to
create an OpenFlow switch, a popular choice is to make
heavy use of ternary content addressable memories
(TCAMs). Unfortunately, TCAMs can consume a
considerable amount of power and, when used to match
flows in an OpenFlow switch, put a bound on switch
latency. In this paper, we propose enhancing an
OpenFlow Ethernet switch with per-port packet
prediction circuitry in order to simultaneously reduce
latency and power consumption without sacrificing rich
policy-based forwarding enabled by the OpenFlow
architecture. Packet prediction exploits the temporal
locality in network communications to predict the flow
classification of incoming packets. When predictions
are correct, latency can be reduced, and significant
power savings can be achieved from bypassing the full
lookup process. Simulation studies using actual network
traces indicate that correct prediction rates of 97\%
are achievable using only a small amount of prediction
circuitry per port. These studies also show that
prediction circuitry can help reduce the power consumed
by a lookup process that includes a TCAM by 92\% and
simultaneously reduce the latency of a cut-through
switch by 66\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cunha:2014:DSP,
author = "{\'I}talo Cunha and Renata Teixeira and Darryl Veitch
and Christophe Diot",
title = "{DTRACK}: a system to predict and track {Internet}
path changes",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1025--1038",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2269837",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we implement and evaluate a system that
predicts and tracks Internet path changes to maintain
an up-to-date network topology. Based on empirical
observations, we claim that monitors can enhance
probing according to the likelihood of path changes. We
design a simple predictor of path changes and show that
it can be used to enhance probe targeting. Our path
tracking system, called DTRACK, focuses probes on
unstable paths and spreads probes over time to minimize
the chances of missing path changes. Our evaluations of
DTRACK with trace-driven simulations and with a
prototype show that DTRACK can detect up to three times
more path changes than traditional traceroute-based
topology mapping techniques.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Altieri:2014:ACS,
author = "Andr{\'e}s Altieri and Leonardo Rey Vega and Pablo
Piantanida and Cecilia G. Galarza",
title = "Analysis of a cooperative strategy for a large
decentralized wireless network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1039--1051",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2269054",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper investigates the benefits of cooperation
and proposes a relay activation strategy for a large
wireless network with multiple transmitters. In this
framework, some nodes cooperate with a nearby node that
acts as a relay, using the decode-and-forward protocol,
and others use direct transmission. The network is
modeled as an independently marked Poisson point
process, and the source nodes may choose their relays
from the set of inactive nodes. Although cooperation
can potentially lead to significant improvements in the
performance of a communication pair, relaying causes
additional interference in the network, increasing the
average noise that other nodes see. We investigate how
source nodes should balance cooperation versus
interference to obtain reliable transmissions, and for
this purpose, we study and optimize a relay activation
strategy with respect to the outage probability.
Surprisingly, in the high reliability regime, the
optimized strategy consists on the activation of all
the relays or none at all, depending on network
parameters. We provide a simple closed-form expression
that indicates when the relays should be active, and we
introduce closed-form expressions that quantify the
performance gains of this scheme with respect to a
network that only uses direct transmission.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2014:MRW,
author = "Hyang-Won Lee and Kayi Lee and Eytan Modiano",
title = "Maximizing reliability in {WDM} networks through
lightpath routing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1052--1066",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2266666",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the reliability maximization problem in
wavelength division multiplexing (WDM) networks with
random link failures. Reliability in these networks is
defined as the probability that the logical network is
connected, and it is determined by the underlying
lightpath routing, network topologies, and the link
failure probability. By introducing the notion of
lexicographical ordering for lightpath routings, we
characterize precise optimization criteria for maximum
reliability in the low failure probability regime.
Based on the optimization criteria, we develop
lightpath routing algorithms that maximize the
reliability, and logical topology augmentation
algorithms for further improving reliability. We also
study the reliability maximization problem in the high
failure probability regime.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tapolcai:2014:SFF,
author = "J{\'a}nos Tapolcai and Pin-Han Ho and P{\'e}ter
Babarczi and Lajos R{\'o}nyai",
title = "On signaling-free failure dependent restoration in
all-optical mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1067--1078",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272599",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Failure dependent protection (FDP) is known to achieve
optimal capacity efficiency among all types of
protection, at the expense of longer recovery time and
more complicated signaling overhead. This particularly
hinders the usage of FDP in all-optical mesh networks.
As a remedy, this paper investigates a new restoration
framework that enables all-optical fault management and
device configuration via state-of-the-art failure
localization techniques, such as the FDP restoration
process. It can be implemented without relying on any
control plane signaling. With the proposed restoration
framework, a novel spare capacity allocation problem is
defined and is further analyzed on circulant topologies
for any single link failure, aiming to gain a solid
understanding of the problem. By allowing reuse of
monitoring resources for restoration capacity, we are
particularly interested in the monitoring resource
hidden property, where less or even no monitoring
resources are consumed as more working traffic is in
place. To deal with general topologies, we introduce a
novel heuristic approach to the proposed spare capacity
allocation problem, which comprises a generic FDP
survivable routing scheme followed by a novel
monitoring resource allocation method. Extensive
simulation is conducted to examine the proposed scheme
and verify the proposed restoration framework.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Luo:2014:MTD,
author = "Wen Luo and Shigang Chen and Yan Qiao and Tao Li",
title = "Missing-tag detection and energy-time tradeoff in
large-scale {RFID} systems with unreliable channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1079--1091",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270444",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Radio frequency identification (RFID) technologies are
poised to revolutionize retail, warehouse, and supply
chain management. One of their interesting applications
is to automatically detect missing tags in a large
storage space, which may have to be performed
frequently to catch any missing event such as theft in
time. Because RFID systems typically work under
low-rate channels, past research has focused on
reducing execution time of a detection protocol to
prevent excessively long protocol execution from
interfering normal inventory operations. However, when
active tags are used for a large spatial coverage,
energy efficiency becomes critical in prolonging the
lifetime of these battery-powered tags. Furthermore,
much of the existing literature assumes that the
channel between a reader and tags is reliable, which is
not always true in reality because of
noise/interference in the environment. Given these
concerns, this paper makes three contributions. First,
we propose a novel protocol design that considers both
energy efficiency and time efficiency. It achieves
multifold reduction in both energy cost and execution
time when compared to the best existing work. Second,
we reveal a fundamental energy-time tradeoff in
missing-tag detection, which can be flexibly controlled
through a couple of system parameters in order to
achieve desirable performance. Third, we extend our
protocol design to consider channel error under two
different models. We find that energy/time cost will be
higher in unreliable channel conditions, but the
energy-time tradeoff relation persists.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rottenstreich:2014:VIC,
author = "Ori Rottenstreich and Yossi Kanizo and Isaac
Keslassy",
title = "The variable-increment counting {Bloom} filter",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1092--1105",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272604",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Counting Bloom Filters (CBFs) are widely used in
networking device algorithms. They implement fast set
representations to support membership queries with
limited error and support element deletions unlike
Bloom Filters. However, they consume significant
amounts of memory. In this paper, we introduce a new
general method based on variable increments to improve
the efficiency of CBFs and their variants. Unlike CBFs,
at each element insertion, the hashed counters are
incremented by a hashed variable increment instead of a
unit increment. Then, to query an element, the exact
value of a counter is considered and not just its
positiveness. We present two simple schemes based on
this method. We demonstrate that this method can always
achieve a lower false positive rate and a lower
overflow probability bound than CBF in practical
systems. We also show how it can be easily implemented
in hardware, with limited added complexity and memory
overhead. We further explain how this method can extend
many variants of CBF that have been published in the
literature. We then suggest possible improvements of
the presented schemes and provide lower bounds on their
memory consumption. Lastly, using simulations with
real-life traces and hash functions, we show how it can
significantly improve the false positive rate of CBFs
given the same amount of memory.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:PME,
author = "Yishuai Chen and Baoxian Zhang and Changjia Chen and
Dah Ming Chiu",
title = "Performance modeling and evaluation of peer-to-peer
live streaming systems under flash crowds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1106--1120",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272056",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A peer-to-peer (P2P) live streaming system faces a big
challenge under flash crowds. When a flash crowd
occurs, the sudden arrival of numerous peers may starve
the upload capacity of the system, hurt its quality of
service, and even cause system collapse. This paper
provides a comprehensive study on the performance of
P2P live streaming systems under flash crowds. By
modeling the systems using a fluid model, we study the
system capacity, peer startup latency, and system
recovery time of systems with and without admission
control for flash crowds, respectively. Our study
demonstrates that, without admission control, a P2P
live streaming system has limited capacity to handle
flash crowds. We quantify this capacity by the largest
flash crowd (measured in shock level) that the system
can handle, and further find this capacity is
independent of system initial state while decreasing as
departure rate of stable peer increases, in a power-law
relationship. We also establish the mathematical
relationship of flash crowd size to the worst-case peer
startup latency and system recovery time. For a system
with admission control, we prove that it can recover
stability under flash crowds of any sizes. Moreover,
its worst-case peer startup latency and system recovery
time increase logarithmically with the flash crowd
size. Based on the analytical results, we present
detailed flash crowd handling strategies, which can be
used to achieve satisfying peer startup performance
while keeping system stability in the presence of flash
crowds under different circumstances.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Mohsenian-Rad:2014:RIN,
author = "Hamed Mohsenian-Rad and Jianwei Huang and Vincent W.
S. Wong and Robert Schober",
title = "Repeated intersession network coding games: efficiency
and min-max bargaining solution",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1121--1135",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2271038",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent results have shown that selfish users do not
have an incentive to participate in intersession
network coding in a static noncooperative game setting.
Because of this, the worst-case network efficiency
(i.e., the price-of-anarchy) can be as low as 20\%. In
this paper, we show that if the same game is played
repeatedly, then the price-of-anarchy can be improved
to 36\%. We design a grim-trigger strategy that
encourages users to cooperate and participate in the
intersession network coding. A key challenge is to
determine a common cooperative coding rate that the
users should mutually agree on. We resolve the conflict
of interest among the users through a bargaining
process and obtain tight upper bounds for the
price-of-anarchy that are valid for any possible
bargaining scheme. Moreover, we propose a simple and
efficient min-max bargaining solution that can achieve
these upper bounds, as confirmed through simulation
studies. The coexistence of multiple selfish network
coding sessions as well as the coexistence of selfish
network coding and routing sessions are also
investigated. Our results represent a first step toward
designing practical intersession network coding schemes
that achieve reasonable performance for selfish
users.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lee:2014:FMM,
author = "Myungjin Lee and Sharon Goldberg and Ramana Rao
Kompella and George Varghese",
title = "{FineComb}: measuring microscopic latency and loss in
the presence of reordering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1136--1149",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272080",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Modern stock trading and cluster applications require
microsecond latencies and almost no losses in data
centers. This paper introduces an algorithm called
FineComb that can obtain fine-grain end-to-end loss and
latency measurements between edge routers in these
networks. Such a mechanism can allow managers to
distinguish between latencies and loss singularities
caused by servers and those caused by the network.
Compared to prior work, such as Lossy Difference
Aggregator (LDA), which focused on switch-level latency
measurements, the requirement of end-to-end latency
measurements introduces the challenge of reordering
that occurs commonly in IP networks due to churn. The
problem is even more acute in switches across data
center networks that employ multipath routing
algorithms to exploit the inherent path diversity.
Without proper care, a loss estimation algorithm can
confound loss and reordering; furthermore, any attempt
to aggregate delay estimates in the presence of
reordering results in severe errors. FineComb deals
with these problems using order-agnostic packet digests
and a simple new idea we call stash recovery. Our
evaluation demonstrates that FineComb is orders of
magnitude more accurate than LDA in loss and delay
estimates in the presence of reordering.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhao:2014:NDD,
author = "Shizhen Zhao and Xinbing Wang",
title = "Node density and delay in large-scale wireless
networks with unreliable links",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1150--1163",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270088",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the delay performance in large-scale wireless
multihop networks with unreliable links from
percolation perspective. Previous works have showed
that the end-to-end delay scales linearly with the
source-to-destination distance, and thus the delay
performance can be characterized by the delay-distance
ratio $ \gamma $. However, the range of $ \gamma $,
which may be the most important parameter for delay,
remains unknown. We expect that $ \gamma $ may depend
heavily on the node density $ \lambda $ of a wireless
multihop network. In this paper, we investigate the
fundamental relationship between $ \gamma $ and $
\lambda $. Obtaining the exact value of $ \gamma
(\lambda) $ is extremely hard, mainly because of the
dynamically changing network topologies caused by the
link unreliability. Instead, we provide both upper
bound and lower bound to the delay-distance ratio $
\gamma (\lambda) $. Simulations are conducted to verify
our theoretical analysis.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yue:2014:UTI,
author = "Hao Yue and Chi Zhang and Miao Pan and Yuguang Fang
and Shigang Chen",
title = "Unknown-target information collection in
sensor-enabled {RFID} systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1164--1175",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272761",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Sensor-enabled radio frequency identification (RFID)
technology has generated a lot of interest from
industries lately. Integrated with miniaturized
sensors, RFID tags can provide not only the IDs, but
also valuable real-time information about the state of
the objects or their surrounding environment, which can
benefit many practical applications, such as warehouse
management and inventory control. In this paper, we
study the problem of designing efficient protocols for
a reader to collect sensor-produced information from
unknown target tags in an RFID system with minimum
execution time. Different from information collection
with all target tags known a priori, in the scenarios
we consider, the reader has to first find out the
target tags in order to read information from them,
which makes traditional information collection
protocols not efficient any more. We design a
Bloom-filter-based information collection protocol
(BIC) to address this challenging problem. A Bloom
filter is constructed for the reader to efficiently
determine the target tags, which significantly reduces
the communication and time overhead. We also introduce
the allocation vectors to coordinate the transmissions
from different tags and minimize collision during
information collection. Extensive simulation results
demonstrate that our protocol is highly efficient in
terms of execution time, and it performs much better
than other solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Aurzada:2014:FAN,
author = "Frank Aurzada and Martin L{\'e}vesque and Martin Maier
and Martin Reisslein",
title = "{FiWi} access networks based on next-generation {PON}
and gigabit-class {WLAN} technologies: a capacity and
delay analysis",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1176--1189",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270360",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Current Gigabit-class passive optical networks (PONs)
evolve into next-generation PONs, whereby high-speed
Gb/s time division multiplexing (TDM) and long-reach
wavelength-broadcasting/routing wavelength division
multiplexing (WDM) PONs are promising near-term
candidates. On the other hand, next-generation wireless
local area networks (WLANs) based on frame aggregation
techniques will leverage physical-layer enhancements,
giving rise to Gigabit-class very high throughput (VHT)
WLANs. In this paper, we develop an analytical
framework for evaluating the capacity and delay
performance of a wide range of routing algorithms in
converged fiber-wireless (FiWi) broadband access
networks based on different next-generation PONs and a
Gigabit-class multiradio multichannel WLAN-mesh front
end. Our framework is very flexible and incorporates
arbitrary frame size distributions, traffic matrices,
optical/wireless propagation delays, data rates, and
fiber faults. We verify the accuracy of our
probabilistic analysis by means of simulation for the
wireless and wireless-optical-wireless operation modes
of various FiWi network architectures under
peer-to-peer, upstream, uniform, and nonuniform traffic
scenarios. The results indicate that our proposed
optimized FiWi routing algorithm (OFRA) outperforms
minimum (wireless) hop and delay routing in terms of
throughput for balanced and unbalanced traffic loads,
at the expense of a slightly increased mean delay at
small to medium traffic loads.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sheng:2014:PIT,
author = "Shang-Pin Sheng and Mingyan Liu",
title = "Profit incentive in trading nonexclusive access on a
secondary spectrum market through contract design",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1190--1203",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2270954",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we formulate a contract design problem
where a primary license holder wishes to profit from
its excess spectrum capacity by selling it to potential
secondary users/buyers. It needs to determine how to
optimally price the excess spectrum so as to maximize
its profit, knowing that this excess capacity is
stochastic in nature, does not come with exclusive
access, and cannot provide deterministic service
guarantees to a buyer. At the same time, buyers are of
different types, characterized by different
communication needs, tolerance for the channel
uncertainty, and so on, all of which are a buyer's
private information. The license holder must then try
to design different contracts catered to different
types of buyers in order to maximize its profit. We
address this problem by adopting as a reference a
traditional spectrum market where the buyer can
purchase exclusive access with fixed/deterministic
guarantees. We fully characterize the optimal solution
in the cases where there is a single buyer type, and
when multiple types of buyers share the same known
channel condition as a result of the primary user
activity. In the most general case, we construct an
algorithm that generates a set of contracts in a
computationally efficient manner and show that this set
is optimal when the buyer types satisfy a monotonicity
condition.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Choi:2014:DLS,
author = "Jin-Ghoo Choi and Changhee Joo and Junshan Zhang and
Ness B. Shroff",
title = "Distributed link scheduling under {SINR} model in
multihop wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1204--1217",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2273100",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Link adaptation technologies, such as Adaptive
Modulation and Coding (AMC) and
Multiple-Input-Multiple-Output (MIMO), are used in
advanced wireless communication systems to achieve high
spectrum efficiency. Communication performance can be
improved significantly by adaptive transmissions based
on the quality of received signals, i.e., the
signal-to-interference-plus-noise ratio (SINR).
However, for multihop wireless communications, most
link scheduling schemes have been developed under
simplified interference models that do not account for
accumulative interference and cannot fully exploit the
recent advances in PHY-layer communication theory. This
paper focuses on developing link scheduling schemes
that can achieve optimal performance under the SINR
model. One key idea is to treat an adaptive wireless
link as multiple parallel virtual links with different
signal quality, building on which we develop
throughput-optimal scheduling schemes using a two-stage
queueing structure in conjunction with recently
developed carrier-sensing techniques. Furthermore, we
introduce a novel three-way handshake to ensure, in a
distributed manner, that all transmitting links satisfy
their SINR requirements. We evaluate the proposed
schemes through rigorous analysis and simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2014:DSP,
author = "Xin Zhang and Fanfu Zhou and Xinyu Zhu and Haiyang Sun
and Adrian Perrig and Athanasios V. Vasilakos and
Haibing Guan",
title = "{DFL}: secure and practical fault localization for
datacenter networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1218--1231",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2274662",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Datacenter networking has gained increasing popularity
in the past few years. While researchers paid
considerable efforts to enhance the performance and
scalability of datacenter networks, achieving reliable
data delivery in these emerging networks with
misbehaving routers and switches received far less
attention. Unfortunately, documented incidents of
router compromise underscore that the capability to
identify adversarial routers and switches is an
imperative and practical need rather than merely a
theoretical exercise. To this end, data-plane fault
localization (FL) aims to identify faulty links and is
an effective means of achieving high network
availability. However, existing secure FL protocols
assume that the source node knows the entire outgoing
path that delivers the source node's packets and that
the path is static and long-lived. These assumptions
are invalidated by the dynamic traffic patterns and
agile load balancing commonly seen in modern datacenter
networks. We propose the first secure FL protocol, DFL,
with no requirements on path durability or the source
node knowing the outgoing paths. Through a core
technique we named delayed function disclosure, DFL
incurs little communication overhead and a small,
constant router state independent of the network size
or the number of flows traversing a router.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Houmansadr:2014:NBW,
author = "Amir Houmansadr and Negar Kiyavash and Nikita
Borisov",
title = "Non-blind watermarking of network flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1232--1244",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272740",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Linking network flows is an important problem in
intrusion detection as well as anonymity. Passive
traffic analysis can link flows, but requires long
periods of observation to reduce errors. Active traffic
analysis, also known as flow watermarking, allows for
better precision and is more scalable. Previous flow
watermarks introduce significant delays to the traffic
flow as a side effect of using a blind detection
scheme; this enables attacks that detect and remove the
watermark, while at the same time slowing down
legitimate traffic. We propose the first non-blind
approach for flow watermarking, called RAINBOW, that
improves watermark invisibility by inserting delays
hundreds of times smaller than previous blind
watermarks, hence reduces the watermark interference on
network flows. We derive and analyze the optimum
detectors for RAINBOW as well as the passive traffic
analysis under different traffic models by using
hypothesis testing. Comparing the detection performance
of RAINBOW and the passive approach, we observe that
both RAINBOW and passive traffic analysis perform
similarly good in the case of uncorrelated traffic,
however the RAINBOW detector drastically outperforms
the optimum passive detector in the case of correlated
network flows. This justifies the use of non-blind
watermarks over passive traffic analysis even though
both approaches have similar scalability constraints.
We confirm our analysis by simulating the detectors and
testing them against large traces of real network
flows.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:MST,
author = "Shuang Li and Zizhan Zheng and Eylem Ekici and Ness
Shroff",
title = "Maximizing system throughput by cooperative sensing in
cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1245--1256",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2272722",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cognitive radio networks (CRNs) allow unlicensed users
to opportunistically access the licensed spectrum
without causing disruptive interference to the primary
users (PUs). One of the main challenges in CRNs is the
ability to detect PU transmissions. Recent works have
suggested the use of secondary user (SU) cooperation
over individual sensing to improve sensing accuracy. In
this paper, we consider a CRN consisting of multiple
PUs and SUs to study the problem of maximizing the
total expected system throughput. First, we study the
sensing decision problem for maximizing the system
throughput subject to a constraint on the PU
throughput, and we design a Bayesian decision
rule-based algorithm. The problem is shown to be
strongly NP-hard and solved via a greedy algorithm with
time complexity $ O(N^5 / \log^2 (1 / 1 - \epsilon)) $,
where $N$ is the total number of SUs. The algorithm
achieves a throughput strictly greater than $ (1 / 2)
(1 - \epsilon)$ of the optimal solution and results in
a small constraint violation that goes to zero with $
\epsilon $. We then investigate the more general
problem with constraints on both PU throughput and the
sensing time overhead, which limits the number of SUs
that can participate in cooperative sensing. We
illustrate the efficacy of the performance of our
algorithms and provide sensitivity analysis via a
numerical investigation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rosberg:2014:IJA,
author = "Zvi Rosberg and Yu Peng and Jing Fu and Jun Guo and
Eric W. M. Wong and Moshe Zukerman",
title = "Insensitive job assignment with throughput and energy
criteria for processor-sharing server farms",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1257--1270",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2276427",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We study the problem of stochastic job assignment in a
server farm comprising multiple processor-sharing
servers with various speeds and finite buffer sizes. We
consider two types of assignment policies: without
jockeying, where an arriving job is assigned only once
to an available server, and with jockeying, where a job
may be reassigned at any time. We also require that the
underlying Markov process under each policy is
insensitive. Namely, the stationary distribution of the
number of jobs in the system is independent of the job
size distribution except for its mean. For the case
without jockeying, we derive two insensitive heuristic
policies: One aims at maximizing job throughput, and
the other trades off job throughput for energy
efficiency. For the case with jockeying, we formulate
the optimal assignment problem as a semi-Markov
decision process and derive optimal policies with
respect to various optimization criteria. We further
derive two simple insensitive heuristic policies with
jockeying: One maximizes job throughput, and the other
aims at maximizing energy efficiency. Numerical
examples demonstrate that, under a wide range of system
parameters, the latter policy performs very close to
the optimal policy. Numerical examples also demonstrate
energy/throughput tradeoffs for the various policies
and, in the case with jockeying, they show a potential
of substantial energy savings relative to a policy that
optimizes throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dong:2014:IID,
author = "Wei Dong and Swati Rallapalli and Rittwik Jana and
Lili Qiu and K. K. Ramakrishnan and Leo Razoumov and
Yin Zhang and Tae Won Cho",
title = "{iDEAL}: incentivized dynamic cellular offloading via
auctions",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1271--1284",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2273766",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The explosive growth of cellular traffic and its
highly dynamic nature often make it increasingly
expensive for a cellular service provider to provision
enough cellular resources to support the peak traffic
demands. In this paper, we propose iDEAL, a novel
auction-based incentive framework that allows a
cellular service provider to leverage resources from
third-party resource owners on demand by buying
capacity whenever needed through reverse auctions.
iDEAL has several distinctive features: (1) iDEAL
explicitly accounts for the diverse spatial coverage of
different resources and can effectively foster
competition among third-party resource owners in
different regions, resulting in significant savings to
the cellular service provider. (2) iDEAL provides
revenue incentives for third-party resource owners to
participate in the reverse auction and be truthful in
the bidding process. (3) iDEAL is provably efficient.
(4) iDEAL effectively guards against collusion. (5)
iDEAL effectively copes with the dynamic nature of
traffic demands. In addition, iDEAL has useful
extensions that address important practical issues.
Extensive evaluation based on real traces from a large
US cellular service provider clearly demonstrates the
effectiveness of our approach. We further demonstrate
the feasibility of iDEAL using a prototype
implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Teng:2014:ELI,
author = "Jin Teng and Boying Zhang and Junda Zhu and Xinfeng Li
and Dong Xuan and Yuan F. Zheng",
title = "{EV-Loc}: integrating electronic and visual signals
for accurate localization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1285--1296",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2274283",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Nowadays, more and more objects can be represented
with electronic identifiers, e.g., people can be
recognized from their laptops' MACs, and products can
be identified by their RFID numbers. Localizing
electronic identifiers is more and more important for a
fully digitalized life. However, traditional wireless
localization techniques are not satisfactory in
performance to determine these electronic identifiers'
positions. Some of them require costly hardware to
achieve high accuracy and, hence, are not practical.
The others are inaccurate and not robust against
environmental noises, e.g., RSSI-based localization.
Therefore, an accurate and practical approach for
localizing electronic identifiers is needed. In this
paper, we propose a new localization technique called
EV-Loc. In EV-Loc, we make use of visual signals to
help improve the accuracy of wireless localization. Our
technique fully takes advantage of the high accuracy of
visual signals and pervasiveness of electronic signals.
To effectively couple these two signals together, we
have designed an E-V match engine to find the
correspondence between an object's electronic
identifier and its visual appearance. We have
implemented our technique on mobile devices and
evaluated it in the real world. The localization error
is less than 1 m. We have also evaluated our approach
using large-scale simulations. The results show that
our approach is accurate and robust.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Seferoglu:2014:NCA,
author = "Hulya Seferoglu and Athina Markopoulou",
title = "Network coding-aware queue management for {TCP} flows
over coded wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1297--1310",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2278292",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we are interested in improving the
performance of TCP flows over wireless networks with a
given constructive intersession network coding scheme.
We are motivated by the observation that TCP does not
fully exploit the potential of the underlying network
coding opportunities. In order to improve the
performance of TCP flows over coded wireless networks,
without introducing changes to TCP itself, we propose a
network-coding aware queue management scheme (NCAQM)
that is implemented at intermediate network coding
nodes and bridges the gap between network coding and
TCP rate control. The design of NCAQM is grounded on
the network utility maximization (NUM) framework and
includes the following mechanisms. NCAQM: (1) stores
coded packets at intermediate nodes in order to use the
buffer space more efficiently; (2) determines what
fraction of the flows should be coded together; and (3)
drops packets at intermediate nodes so that it matches
the rates of parts of different TCP flows that are
coded together. We demonstrate, via simulation, that
NCAQM significantly improves TCP throughput compared to
TCP over baseline queue management schemes.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2014:TCA,
author = "Peng Yang and Juan Shao and Wen Luo and Lisong Xu and
Jitender Deogun and Ying Lu",
title = "{TCP} congestion avoidance algorithm identification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1311--1324",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2278271",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Internet has recently been evolving from
homogeneous congestion control to heterogeneous
congestion control. Several years ago, Internet traffic
was mainly controlled by the traditional RENO, whereas
it is now controlled by multiple different TCP
algorithms, such as RENO, CUBIC, and Compound TCP
(CTCP). However, there is very little work on the
performance and stability study of the Internet with
heterogeneous congestion control. One fundamental
reason is the lack of the deployment information of
different TCP algorithms. In this paper, we first
propose a tool called TCP Congestion Avoidance
Algorithm Identification (CAAI) for actively
identifying the TCP algorithm of a remote Web server.
CAAI can identify all default TCP algorithms (e.g.,
RENO, CUBIC, and CTCP) and most non-default TCP
algorithms of major operating system families. We then
present the CAAI measurement result of about 30 000 Web
servers. We found that only 3.31\%-14.47\% of the Web
servers still use RENO, 46.92\% of the Web servers use
BIC or CUBIC, and 14.5\%-25.66\% of the Web servers use
CTCP. Our measurement results show a strong sign that
the majority of TCP flows are not controlled by RENO
anymore, and a strong sign that the Internet congestion
control has changed from homogeneous to
heterogeneous.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:SAO,
author = "Shengbo Chen and Prasun Sinha and Ness B. Shroff and
Changhee Joo",
title = "A simple asymptotically optimal joint energy
allocation and routing scheme in rechargeable sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1325--1336",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2273830",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the utility maximization
problem for a sensor network with energy replenishment.
Each sensor node consumes energy in its battery to
generate and deliver data to its destination via
multihop communications. Although the battery can be
replenished from renewable energy sources, the energy
allocation should be carefully designed in order to
maximize system performance, especially when the
replenishment profile is unknown in advance. In this
paper, we address the joint problem of energy
allocation and routing to maximize the total system
utility, without prior knowledge of the replenishment
profile. We first characterize optimal throughput of a
single node under general replenishment profile and
extend our idea to the multihop network case. After
characterizing the optimal network utility with an
upper bound, we develop a low-complexity online
solution that achieves asymptotic optimality. Focusing
on long-term system performance, we can greatly
simplify computational complexity while maintaining
high performance. We also show that our solution can be
approximated by a distributed algorithm using standard
optimization techniques. In addition, we show that the
required battery size is $ O(1 / \xi) $ to constrain
the performance of our scheme within $ \xi $
-neighborhood of the optimum. Through simulations with
replenishment profile traces for solar and wind energy,
we numerically evaluate our solution, which outperforms
a state-of-the-art scheme that is developed based on
the Lyapunov optimization technique.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2014:PON,
author = "Yuan Shen and Wenhan Dai and Moe Z. Win",
title = "Power optimization for network localization",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1337--1350",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2278984",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Reliable and accurate localization of mobile objects
is essential for many applications in wireless
networks. In range-based localization, the position of
the object can be inferred using the distance
measurements from wireless signals exchanged with
active objects or reflected by passive ones. Power
allocation for ranging signals is important since it
affects not only network lifetime and throughput but
also localization accuracy. In this paper, we establish
a unifying optimization framework for power allocation
in both active and passive localization networks. In
particular, we first determine the functional
properties of the localization accuracy metric, which
enable us to transform the power allocation problems
into second-order cone programs (SOCPs). We then
propose the robust counterparts of the problems in the
presence of parameter uncertainty and develop
asymptotically optimal and efficient near-optimal
SOCP-based algorithms. Our simulation results validate
the efficiency and robustness of the proposed
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2014:ILM,
author = "Liang Ma and Ting He and Kin K. Leung and Ananthram
Swami and Don Towsley",
title = "Inferring link metrics from end-to-end path
measurements: identifiability and monitor placement",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "4",
pages = "1351--1368",
month = aug,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2328668",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:29 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We investigate the problem of identifying individual
link metrics in a communication network from end-to-end
path measurements, under the assumption that link
metrics are additive and constant. To uniquely identify
the link metrics, the number of linearly independent
measurement paths must equal the number of links. Our
contribution is to characterize this condition in terms
of the network topology and the number/placement of
monitors, under the constraint that measurement paths
must be cycle-free. Our main results are: (1) it is
generally impossible to identify all the link metrics
by using two monitors; (2) nevertheless, metrics of all
the interior links not incident to any monitor are
identifiable by two monitors if the topology satisfies
a set of necessary and sufficient connectivity
conditions; (3) these conditions naturally extend to a
necessary and sufficient condition for identifying all
the link metrics using three or more monitors. We show
that these conditions not only facilitate efficient
identifiability tests, but also enable an efficient
algorithm to place the minimum number of monitors in
order to identify all link metrics. Our evaluations on
both random and real topologies show that the proposed
algorithm achieves identifiability using a much smaller
number of monitors than a baseline solution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gopalan:2014:MNL,
author = "Abishek Gopalan and Srinivasan Ramasubramanian",
title = "On the maximum number of linearly independent cycles
and paths in a network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1373--1388",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291208",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Central to network tomography is the problem of
identifiability, the ability to identify internal
network characteristics uniquely from end-to-end
measurements. This problem is often underconstrained
even when internal network characteristics such as link
delays are modeled as additive constants. While it is
known that the network topology can play a role in
determining the extent of identifiability, there is a
lack in the fundamental understanding of being able to
quantify it for a given network. In this paper, we
consider the problem of identifying additive link
metrics in an arbitrary undirected network using
measurement nodes and establishing paths/cycles between
them. For a given placement of measurement nodes, we
define and derive the ``link rank'' of the network--the
maximum number of linearly independent cycles/paths
that may be established between the measurement nodes.
We achieve this in linear time. The link rank helps
quantify the exact extent of identifiability in a
network. We also develop a quadratic time algorithm to
compute a set of cycles/paths that achieves the maximum
rank.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Han:2014:YFM,
author = "Bo Han and Jian Li and Aravind Srinivasan",
title = "Your friends have more friends than you do:
identifying influential mobile users through
random-walk sampling",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1389--1400",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2280436",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the problem of
identifying influential users in mobile social
networks. Influential users are individuals with high
centrality in their social-contact graphs. Traditional
approaches find these users through centralized
algorithms. However, the computational complexity of
these algorithms is known to be very high, making them
unsuitable for large-scale networks. We propose a
lightweight and distributed protocol, iWander, to
identify influential users through fixed-length
random-walk sampling. We prove that random-walk
sampling with O (log n ) steps, where is the number of
nodes in a graph, comes quite close to sampling
vertices approximately according to their degrees. To
the best of our knowledge, we are the first to design a
distributed protocol on mobile devices that leverages
random walks for identifying influential users,
although this technique has been used in other areas.
The most attractive feature of iWander is its extremely
low control-message overhead, which lends itself well
to mobile applications. We evaluate the performance of
iWander for two applications, targeted immunization of
infectious diseases and target-set selection for
information dissemination. Through extensive simulation
studies using a real-world mobility trace, we
demonstrate that targeted immunization using iWander
achieves a comparable performance with a degree-based
immunization policy that vaccinates users with a large
number of contacts first, while generating only less
than 1\% of this policy's control messages. We also
show that target-set selection based on iWander
outperforms the random and degree-based selections for
information dissemination in several scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:RSR,
author = "Chao-Chih Chen and Lihua Yuan and Albert Greenberg and
Chen-Nee Chuah and Prasant Mohapatra",
title = "Routing-as-a-service {(RaaS)}: a framework for
tenant-directed route control in data center",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1401--1414",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2277880",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In a multi-tenant data center environment, the current
paradigm for route control customization involves a
labor-intensive ticketing process where tenants submit
route control requests to the landlord. This results in
tight coupling between tenants and the landlord,
extensive human resource deployment, and long ticket
resolution time. We propose Routing-as-a-Service
(RaaS), a framework for tenant-directed route control
in data centers. We show that RaaS-based implementation
provides a route control platform where multiple
tenants can perform route control independently with
little administrative involvement, and the landlord can
set the overall network policies. RaaS-based solutions
can run on commercial off-the-shelf (COTS) hardware and
leverage existing technologies, so it can be
implemented in existing networks without major
infrastructural overhaul. We present the design of
RaaS, introduce its components, and evaluate a
prototype based on RaaS.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Castro:2014:UTR,
author = "Ignacio Castro and Rade Stanojevic and Sergey
Gorinsky",
title = "Using tuangou to reduce {IP} transit costs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1415--1428",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2278236",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A majority of Internet service providers (ISPs)
support connectivity to the entire Internet by
transiting their traffic via other providers. Although
the transit prices per megabit per second (Mbps)
decline steadily, the overall transit costs of these
ISPs remain high or even increase due to the traffic
growth. The discontent of the ISPs with the high
transit costs has yielded notable innovations such as
peering, content distribution networks, multicast, and
peer-to-peer localization. While the above solutions
tackle the problem by reducing the transit traffic,
this paper explores a novel approach that reduces the
transit costs without altering the traffic. In the
proposed Cooperative IP Transit (CIPT), multiple ISPs
cooperate to jointly purchase Internet Protocol (IP)
transit in bulk. The aggregate transit costs decrease
due to the economies-of-scale effect of typical
subadditive pricing as well as burstable billing: Not
all ISPs transit their peak traffic during the same
period. To distribute the aggregate savings among the
CIPT partners, we propose Shapley-value sharing of the
CIPT transit costs. Using public data about IP traffic
and transit prices, we quantitatively evaluate CIPT and
show that significant savings can be achieved, both in
relative and absolute terms. We also discuss the
organizational embodiment, relationship with transit
providers, traffic confidentiality, and other aspects
of CIPT.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{VanDeVen:2014:BEH,
author = "P. M. {Van De Ven} and Augustus J. E. M. Janssen and
J. S. H. {Van Leeuwaarden}",
title = "Balancing exposed and hidden nodes in linear wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1429--1443",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2277654",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless networks equipped with the CSMA protocol are
subject to collisions due to interference. For a given
interference range, we investigate the tradeoff between
collisions (hidden nodes) and unused capacity (exposed
nodes). We show that the sensing range that maximizes
throughput critically depends on the activation rate of
nodes. For infinite line networks, we prove the
existence of a threshold: When the activation rate is
below this threshold, the optimal sensing range is
small (to maximize spatial reuse). When the activation
rate is above the threshold, the optimal sensing range
is just large enough to preclude all collisions.
Simulations suggest that this threshold policy extends
to more complex linear and nonlinear topologies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ahlehagh:2014:VAS,
author = "Hasti Ahlehagh and Sujit Dey",
title = "Video-aware scheduling and caching in the radio access
network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1444--1462",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2294111",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we introduce distributed caching of
videos at the base stations of the Radio Access Network
(RAN) to significantly improve the video capacity and
user experience of mobile networks. To ensure
effectiveness of the massively distributed but
relatively small-sized RAN caches, unlike Internet
content delivery networks (CDNs) that can store
millions of videos in a relatively few large-sized
caches, we propose RAN-aware reactive and proactive
caching policies that utilize User Preference Profiles
(UPPs) of active users in a cell. Furthermore, we
propose video-aware backhaul and wireless channel
scheduling techniques that, in conjunction with edge
caching, ensure maximizing the number of concurrent
video sessions that can be supported by the end-to-end
network while satisfying their initial delay
requirements and minimize stalling. To evaluate our
proposed techniques, we developed a statistical
simulation framework using MATLAB and performed
extensive simulations under various cache sizes, video
popularity and UPP distributions, user dynamics, and
wireless channel conditions. Our simulation results
show that RAN caches using UPP-based caching policies,
together with video-aware backhaul scheduling, can
improve capacity by 300\% compared to having no RAN
caches, and by more than 50\% compared to RAN caches
using conventional caching policies. The results also
demonstrate that using UPP-based RAN caches can
significantly improve the probability that video
requests experience low initial delays. In networks
where the wireless channel bandwidth may be
constrained, application of our video-aware wireless
channel scheduler results in significantly (up to
250\%) higher video capacity with very low stalling
probability.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Antikainen:2014:DSA,
author = "Markku Antikainen and Tuomas Aura and Mikko
S{\"a}rel{\"a}",
title = "Denial-of-service attacks in {Bloom}-filter-based
forwarding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1463--1476",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2281614",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Bloom-filter-based forwarding has been suggested to
solve several fundamental problems in the current
Internet, such as routing-table growth, multicast
scalability issues, and denial-of-service (DoS) attacks
by botnets. The proposed protocols are source-routed
and include the delivery tree encoded as a Bloom filter
in each packet. The network nodes forward packets based
on this in-packet information without consulting
routing tables and without storing per-flow state. We
show that these protocols have critical vulnerabilities
and make several false security assumptions. In
particular, we present DoS attacks against broad
classes of Bloom-filter-based protocols and conclude
that the protocols are not ready for deployment on open
networks. The results also help us understand the
limitations and design options for Bloom-filter
forwarding.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2014:SMW,
author = "Shihuan Liu and Eylem Ekici and Lei Ying",
title = "Scheduling in multihop wireless networks without
back-pressure",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1477--1488",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2278840",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper focuses on scheduling in multihop wireless
networks where flows are associated with fixed routes.
The well-known back-pressure scheduling algorithm is
throughput-optimal, but requires constant exchange of
queue length information among neighboring nodes for
calculating the ``back-pressure.'' Moreover, previous
research shows that the total queue length along a
route increases quadratically as the route length under
the backpressure algorithm, resulting in poor delay
performance. In this paper, we propose a self-regulated
MaxWeight scheduling, which does not require
back-pressure calculation. We prove that the
self-regulated MaxWeight scheduling is
throughput-optimal (an algorithm is said to be
throughput-optimal if it can stabilize any traffic that
can be stabilized by any other algorithm). In the
simulation part, we show that the self-regulated
MaxWeight scheduling has a much better delay
performance than the back-pressure algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xiao:2014:ROU,
author = "Jin Xiao and Raouf Boutaba",
title = "Reconciling the overlay and underlay tussle",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1489--1502",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2281276",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the presence of multiple overlays and underlays,
the emerging global network behavior is the result of
interactions of self-serving overlay routing decisions
and independent underlay management actions. It is
crucial for network operators, service, and content
providers to have a good grasp of the underlying
principles in order to better design and manage current
and future networks and services. In this paper, we
describe special game scenarios wherein the interaction
of noncooperative overlays and underlays in multidomain
networks can result in an operable global configuration
in linear time and the overall convergence is
polynomial in the unweighed case. For weighted games,
we find that weighted Shapley potential can achieve
linear time convergence to an operable state.
Furthermore, we analyze the interaction of overlays and
underlays as a two-stage congestion game and recommend
simple operational guidelines to ensure global
stability. We further explore the use of Shapley value
as an enabler of mutual cooperation in an otherwise
competitive environment. Our simulation results confirm
our findings and demonstrate its effectiveness in
general networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:RDM,
author = "Dan Li and Hongze Zhao and Mingwei Xu and Xiaoming
Fu",
title = "Revisiting the design of mega data centers:
considering heterogeneity among containers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1503--1515",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2280764",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we revisit the design of mega data
centers, which are usually built by a number of
modularized containers. Due to technical innovation and
vendor diversity, heterogeneity widely exists among
data-center containers in practice. To embrace this
issue, we propose uFix, which is a scalable, flexible,
and modularized network architecture to interconnect
heterogeneous data-center containers. The
intercontainer connection rule in uFix is designed in
such a way that it can flexibly scale to a huge number
of servers with stable server/switch hardware settings.
uFix allows modularized and fault-tolerant routing by
completely decoupling intercontainer routing from
intracontainer routing. We implement a software-based
uFix prototype on a Linux platform. Both simulation and
prototype-based experiment show that uFix enjoys high
network capacity, gracefully handles server/switch
failures, and causes lightweight CPU overhead onto
data-center servers.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Muthusamy:2014:IFC,
author = "Vinod Muthusamy and Hans-Arno Jacobsen",
title = "Infrastructure-free content-based publish\slash
subscribe",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1516--1530",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2282159",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Peer-to-peer (P2P) networks can offer benefits to
distributed content-based publish/subscribe data
dissemination systems. In particular, since a P2P
network's aggregate resources grow as the number of
participants increases, scalability can be achieved
using no infrastructure other than the participants'
own resources. This paper proposes algorithms for
supporting content-based publish/subscribe in which
subscriptions can specify a range of interest and
publications a range of values. The algorithms are
built over a distributed hash table abstraction and are
completely decentralized. Load balance is addressed by
subscription delegation away from overloaded peers and
a bottom-up tree search technique that avoids root
hotspots. Furthermore, fault tolerance is achieved with
a lightweight replication scheme that quickly detects
and recovers from faults. Experimental results support
the scalability and fault-tolerance properties of the
algorithms: For example, doubling the number of
subscriptions does not double internal system messages,
and even the simultaneous failure of 20\% of the peers
in the system requires less than 2 min to fully
recover.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yoon:2014:VMJ,
author = "Jongwon Yoon and Honghai Zhang and Suman Banerjee and
Sampath Rangarajan",
title = "Video multicast with joint resource allocation and
adaptive modulation and coding in {4G} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1531--1544",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2279887",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Although wireless broadband technologies have evolved
significantly over the past decade, they are still
insufficient to support the fast-growing mobile
traffic, especially due to the increasing popularity of
mobile video applications. Wireless multicast, aiming
to exploit the wireless broadcast advantage, is a
viable approach to bridge the gap between the limited
wireless capacity and the ever-increasing mobile video
traffic demand. In this paper, we propose MuVi, a
Multicast Video delivery scheme through joint optimal
resource allocation and adaptive modulation and coding
scheme in OFDMA-based 4G cellular networks. MuVi
differentiates video frames based on their importance
in reconstructing the video and incorporates an
efficient radio resource allocation algorithm to
optimize the overall video quality across all users in
the multicast group. MuVi is a lightweight solution
with most of the implementation in the gateway, slight
modification in the base station, and no modification
at the clients. We implement MuVi on a WiMAX testbed
and compare its performance to a Naive wireless
multicast scheme that employs the most robust
Modulation and Coding Scheme (MCS), and an Adaptive
scheme that employs the highest MCS supportable by all
clients. Experimental results show that MuVi improves
the average video peak signal-to-noise ratio (PSNR) by
up to 13 and 7 dB compared to the Naive and the
Adaptive schemes, respectively. MuVi does not require
modification to the video encoding scheme or the air
interface. Thus, it allows speedy deployment in
existing systems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:SUD,
author = "Kang Chen and Haiying Shen",
title = "{SMART}: utilizing distributed social map for
lightweight routing in delay-tolerant networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1545--1558",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2281583",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Previous delay-tolerant network (DTN) routing
algorithms exploit either past encounter records or
social network properties to derive a node's
probability of delivering packets to their
destinations. However, they only have a local view of
the network, which limits the routing efficiency. Also,
when two nodes meet, they have to exchange the delivery
abilities to the destinations of all packets in the two
nodes, which incurs high resource consumption. In this
paper, we propose SMART, which utilizes a distributed
social map for lightweight routing in delay-tolerant
networks. In SMART, each node builds its own social map
consisting of nodes it has met and their frequently
encountered nodes in a distributed manner. Based on
both encountering frequency and social closeness of the
two linked nodes in the social map, we decide the
weight of each link to reflect the packet delivery
ability between the two nodes. The social map enables
more accurate forwarder selection through a broader
view. Moreover, nodes exchange much less information
for social map update, which reduces resource
consumption. Trace-driven experiments and tests on the
GENI ORBIT testbed demonstrate the high efficiency of
SMART in comparison to previous algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nguyen:2014:USM,
author = "Van Minh Nguyen and Chung Shue Chen and Laurent
Thomas",
title = "A unified stochastic model of handover measurement in
mobile networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1559--1576",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283577",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Handover measurement is responsible for finding a
handover target and directly decides the performance of
mobility management. It is governed by a complex
combination of parameters dealing with multicell
scenarios and system dynamics. A network design has to
offer an appropriate handover measurement procedure in
such a multiconstraint problem. This paper proposes a
unified framework for the network analysis and
optimization. The exposition focuses on the stochastic
modeling and addresses its key probabilistic events,
namely: (1) suitable handover target found; (2) service
failure; (3) handover measurement triggering; and (4)
handover measurement withdrawal. We derive their
closed-form expressions and provide a generalized setup
for the analysis of handover measurement failure and
target cell quality by the best signal quality and
level crossing properties. Finally, we show its
application and effectiveness in today's 3GPP-LTE
cellular networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kucera:2014:ECC,
author = "Stepan Kucera",
title = "Enabling co-channel small-cell deployments in
{SINR}-constraint networks by distributed monitoring of
normalized network capacity",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1577--1590",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2280148",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We propose distributed algorithms for real-time
monitoring and admission control that allow base
stations in heterogeneous wireless cellular networks to
dynamically serve mobile users under the constraint of:
(1) accommodating all active transmissions in a single
shared channel; and (2) guaranteeing a minimum
signal-to-interference-plus-noise ratio (SINR) to each
served user. In particular, we develop distributed
techniques for iterative real-time computation of the
spectral radius of an unknown network matrix (often the
Perron root of the matrix) that indicates the
time-varying limits of power control stability, i.e.,
the limits of network capacity. Solely locally
available information is used as algorithmic input. By
drawing a formal analogy with the Google PageRank
algorithm, the computations are shown analytically to
be exponentially fast and sufficiently accurate for
optimal (error-free) stability detection. Numerical
simulations of an existing office building demonstrate
the applicability of the proposed algorithms to actual
UMTS W-CDMA systems characterized by discrete power
control with limited step-size.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Develder:2014:JDS,
author = "Chris Develder and Jens Buysse and Bart Dhoedt and
Brigitte Jaumard",
title = "Joint dimensioning of server and network
infrastructure for resilient optical grids\slash
clouds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1591--1606",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283924",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We address the dimensioning of infrastructure,
comprising both network and server resources, for
large-scale decentralized distributed systems such as
grids or clouds. We design the resulting grid/cloud to
be resilient against network link or server failures.
To this end, we exploit relocation: Under failure
conditions, a grid job or cloud virtual machine may be
served at an alternate destination (i.e., different
from the one under failure-free conditions). We thus
consider grid/cloud requests to have a known origin,
but assume a degree of freedom as to where they end up
being served, which is the case for grid applications
of the bag-of-tasks (BoT) type or hosted virtual
machines in the cloud case. We present a generic
methodology based on integer linear programming (ILP)
that: (1) chooses a given number of sites in a given
network topology where to install server
infrastructure; and (2) determines the amount of both
network and server capacity to cater for both the
failure-free scenario and failures of links or nodes.
For the latter, we consider either failure-independent
(FID) or failure-dependent (FD) recovery. Case studies
on European-scale networks show that relocation allows
considerable reduction of the total amount of network
and server resources, especially in sparse topologies
and for higher numbers of server sites. Adopting a
failure-dependent backup routing strategy does lead to
lower resource dimensions, but only when we adopt
relocation (especially for a high number of server
sites): Without exploiting relocation, potential
savings of FD versus FID are not meaningful.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Su:2014:EAV,
author = "Sen Su and Zhongbao Zhang and Alex X. Liu and Xiang
Cheng and Yiwen Wang and Xinchao Zhao",
title = "Energy-aware virtual network embedding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1607--1620",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2286156",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Virtual network embedding, which means mapping virtual
networks requested by users to a shared substrate
network maintained by an Internet service provider, is
a key function that network virtualization needs to
provide. Prior work on virtual network embedding has
primarily focused on maximizing the revenue of the
Internet service provider and did not consider the
energy cost in accommodating such requests. As energy
cost is more than half of the operating cost of the
substrate networks, while trying to accommodate more
virtual network requests, minimizing energy cost is
critical for infrastructure providers. In this paper,
we make the first effort toward energy-aware virtual
network embedding. We first propose an energy cost
model and formulate the energy-aware virtual network
embedding problem as an integer linear programming
problem. We then propose two efficient energy-aware
virtual network embedding algorithms: a heuristic-based
algorithm and a
particle-swarm-optimization-technique-based algorithm.
We implemented our algorithms in C++ and performed
side-by-side comparison with prior algorithms. The
simulation results show that our algorithms
significantly reduce the energy cost by up to 50\% over
the existing algorithm for accommodating the same
sequence of virtual network requests.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vaze:2014:DPA,
author = "Rahul Vaze and Rachit Garg and Neetish Pathak",
title = "Dynamic power allocation for maximizing throughput in
energy-harvesting communication system",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1621--1630",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2281196",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The design of online algorithms for maximizing the
achievable rate in a wireless communication channel
between a source and a destination over a fixed number
of slots is considered. The source is assumed to be
powered by a natural renewable source, and the most
general case of arbitrarily varying energy arrivals is
considered, where neither the future energy arrival
instants or amount nor their distribution is known. The
fading coefficients are also assumed to be arbitrarily
varying over time, with only causal information
available at the source. For a maximization problem,
the utility of an online algorithm is tested by finding
its competitive ratio or competitiveness that is
defined to be the maximum of the ratio of the gain of
the optimal offline algorithm and the gain of the
online algorithm over all input sequences. We show that
the lower bound on the optimal competitive ratio for
maximizing the achievable rate is arbitrarily close to
the number of slots. Conversely, we propose a simple
strategy that invests available energy uniformly over
all remaining slots until the next energy arrival, and
show that its competitive ratio is equal to the number
of slots, to conclude that it is an optimal online
algorithm.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hou:2014:SHR,
author = "I-Hong Hou",
title = "Scheduling heterogeneous real-time traffic over fading
wireless channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1631--1644",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2280846",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We develop a general approach for designing scheduling
policies for real-time traffic over wireless channels.
We extend prior work, which characterizes a real-time
flow by its traffic pattern, delay bound, timely
throughput requirement, and channel reliability, to
allow clients to have different deadlines and allow a
variety of channel models. In particular, our extended
model consider scenarios where channel qualities are
time-varying, the access point may not have explicit
information on channel qualities, and the access point
may or may not employ rate adaptation. Thus, our model
allows the treatment of more realistic fading channels
as well as scenarios with mobile nodes and the usage of
more general transmission strategies. We derive a
sufficient condition for a scheduling policy to be
feasibility optimal, and thereby establish a class of
feasibility optimal policies. We demonstrate the
utility of the identified class by deriving a
feasibility optimal policy for the scenario with rate
adaptation, time-varying channels, and heterogeneous
delay bounds. When rate adaptation is not available, we
also derive feasibility optimal policies for both
scenarios where the access point may or may not have
explicit knowledge on channel qualities. For the
scenario where rate adaptation is not available but
clients have different delay bounds, we describe a
heuristic. Simulation results are also presented, which
indicate the usefulness of the scheduling policies for
more realistic and complex scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cicconetti:2014:ETD,
author = "Claudio Cicconetti and Luciano Lenzini and Andrea Lodi
and Silvano Martello and Enzo Mingozzi and Michele
Monaci",
title = "Efficient two-dimensional data allocation in {IEEE
802.16 OFDMA}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1645--1658",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2282965",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In IEEE 802.16, the wireless resources are logically
partitioned into 5-ms frames, which extend in two
dimensions: time and frequency. To break down the
complexity of resource allocation at the base station,
a split approach has been proposed in the literature,
where the tasks of scheduling packets and allocating
them into frames are solved in separate and subsequent
stages. In this paper, we focus on the allocation task
alone, which is addressed in its full complexity, i.e.,
by considering that data within the frame must be
allocated as bursts with rectangular shape, each
consisting of a set of indivisible sub-bursts, and that
a variable portion of the frame is reserved for in-band
signaling. After proving that the resulting allocation
problem is NP-hard, we develop an efficient heuristic
algorithm, called Recursive Tiles and Stripes (RTS), to
solve it. RTS, in addition to handling a more general
problem, is shown to perform better than
state-of-the-art solutions via numerical analysis with
realistic system parametrization. Furthermore, an
extensive evaluation of the interaction between the
scheduler and the allocator is carried out in a wide
variety of network scenarios.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zhang:2014:VFD,
author = "Lei Zhang and Dongning Guo",
title = "Virtual full duplex wireless broadcasting via
compressed sensing",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1659--1671",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283793",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A novel solution is proposed to undertake a frequent
task in wireless networks, which is to let all nodes
broadcast information to and receive information from
their respective one-hop neighboring nodes. The
contribution in this paper is twofold. First, as each
neighbor selects one message-bearing codeword from its
unique codebook for transmission, it is shown that
decoding their messages based on a superposition of
those codewords through the multiaccess channel is
fundamentally a problem of compressed sensing. In the
case where each message is designed to consist of a
small number of bits, an iterative algorithm based on
belief propagation is developed for efficient decoding.
Second, to satisfy the half-duplex constraint, each
codeword consists of randomly distributed on-slots and
off-slots. A node transmits during its on-slots and
listens to its neighbors only through its own
off-slots. Over one frame interval, each node
broadcasts a message to its neighbors and
simultaneously receives the superposition of neighbors'
signals through its own off-slots and then decodes all
messages. The proposed solution fully exploits the
multiaccess nature of the wireless medium and addresses
the half-duplex constraint at the fundamental level. In
a network consisting of Poisson distributed nodes,
numerical results demonstrate that the proposed scheme
often achieves several times the rate of slotted ALOHA
and CSMA with the same packet error rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Han:2014:DRE,
author = "Hao Han and Yunxin Liu and Guobin Shen and Yongguang
Zhang and Qun Li and Chiu C. Tan",
title = "Design, realization, and evaluation of {DozyAP} for
power-efficient {Wi-Fi} tethering",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1672--1685",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283636",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wi-Fi tethering (i.e., sharing the Internet connection
of a mobile phone via its Wi-Fi interface) is a useful
functionality and is widely supported on commercial
smartphones. Yet, existing Wi-Fi tethering schemes
consume excessive power: They keep the Wi-Fi interface
in a high power state regardless if there is ongoing
traffic or not. In this paper, we propose DozyAP to
improve the power efficiency of Wi-Fi tethering. Based
on measurements in typical applications, we identify
many opportunities that a tethering phone could sleep
to save power. We design a simple yet reliable sleep
protocol to coordinate the sleep schedule of the
tethering phone with its clients without requiring
tight time synchronization. Furthermore, we develop a
two-stage, sleep interval adaptation algorithm to
automatically adapt the sleep intervals to ongoing
traffic patterns of various applications. DozyAP does
not require any changes to the 802.11 protocol and is
incrementally deployable through software updates. We
have implemented DozyAP on commercial smartphones.
Experimental results show that, while retaining
comparable user experiences, our implementation can
allow the Wi-Fi interface to sleep for up to 88\% of
the total time in several different applications and
reduce the system power consumption by up to 33\% under
the restricted programmability of current Wi-Fi
hardware.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jahromizadeh:2014:JRC,
author = "Soroush Jahromizadeh and Veselin Rakocevic",
title = "Joint rate control and scheduling for providing
bounded delay with high efficiency in multihop wireless
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "5",
pages = "1686--1698",
month = oct,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2282872",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:34 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of supporting traffic with
elastic bandwidth requirements and average end-to-end
delay constraints in multihop wireless networks, with
focus on source rates and link data rates as the key
resource allocation decisions. The network utility
maximization-based approaches to support
delay-sensitive traffic have been predominantly based
on either reducing link utilization, or approximation
of links as M/D/1 queues, which lead to inefficient
link utilization under optimal resource allocation, and
mostly to unpredictable transient behavior of packet
delays. On the contrary, we present an alternative
formulation where the delay constraint is omitted and
sources' utility functions are multiplied by a weight
factor. The alternative optimization problem is solved
by a scheduling algorithm incorporating a duality-based
rate control algorithm at its inner layer, where link
prices correlate with their average queueing delays. We
then present an alternative strategy where the utility
weight of each source is adjusted to ensure its desired
optimal path prices, and hence the desired average path
delays. Since the proposed strategy is based on solving
a concave optimization problem for the elastic traffic,
it leads to maximal utilization of the network
capacity. The proposed approach is then realized by a
scheduling algorithm that runs jointly with an integral
controller whereby each source independently regulates
the queueing delay on its paths at the desired level,
using its utility weight factor as the control
variable. The proposed algorithms are shown, using
theoretical analysis and simulation, to achieve
asymptotic regulation of end-to-end delay with good
performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Patel:2014:BSE,
author = "Jignesh Patel and Alex X. Liu and Eric Torng",
title = "Bypassing space explosion in high-speed regular
expression matching",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1701--1714",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2309014",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network intrusion detection and prevention systems
commonly use regular expression (RE) signatures to
represent individual security threats. While the
corresponding deterministic finite state automata (DFA)
for any one RE is typically small, the DFA that
corresponds to the entire set of REs is usually too
large to be constructed or deployed. To address this
issue, a variety of alternative automata
implementations that compress the size of the final
automaton have been proposed such as extended finite
automata (XFA) and delayed input DFA (D$^2$ FA). The
resulting final automata are typically much smaller
than the corresponding DFA. However, the previously
proposed automata construction algorithms do suffer
from some drawbacks. First, most employ a ``Union then
Minimize'' framework where the automata for each RE are
first joined before minimization occurs. This leads to
an expensive nondeterministic finite automata (NFA) to
DFA subset construction on a relatively large NFA.
Second, most construct the corresponding large DFA as
an intermediate step. In some cases, this DFA is so
large that the final automaton cannot be constructed
even though the final automaton is small enough to be
deployed. In this paper, we propose a ``Minimize then
Union'' framework for constructing compact alternative
automata focusing on the D$^2$ FA. We show that we can
construct an almost optimal final D$^2$ FA with small
intermediate parsers. The key to our approach is a
space-and time-efficient routine for merging two
compact D$^2$ FA into a compact D$^2$ FA. In our
experiments, our algorithm runs on average 155 times
faster and uses 1500 times less memory than previous
algorithms. For example, we are able to construct a
D$^2$ FA with over 80 000 000 states using only 1 GB of
main memory in only 77 min.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Fu:2014:DRA,
author = "Amy Fu and Parastoo Sadeghi and Muriel M{\'e}dard",
title = "Dynamic rate adaptation for improved throughput and
delay in wireless network coded broadcast",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1715--1728",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2292613",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we provide theoretical and
simulation-based study of the delivery delay
performance of a number of existing throughput-optimal
coding schemes and use the results to design a new
dynamic rate adaptation scheme that achieves improved
overall throughput-delay performance. Under a baseline
rate control scheme, the receivers' delay performance
is examined. Based on their Markov states, the
knowledge difference between the sender and receiver,
three distinct methods for packet delivery are
identified: zero state, leader state, and
coefficient-based delivery. We provide analyses of each
of these and show that, in many cases, zero state
delivery alone presents a tractable approximation of
the expected packet delivery behavior. Interestingly,
while coefficient-based delivery has so far been
treated as a secondary effect in the literature, we
find that the choice of coefficients is extremely
important in determining the delay, and a well-chosen
encoding scheme can, in fact, contribute a significant
improvement to the delivery delay. Based on our
delivery delay model, we develop a dynamic rate
adaptation scheme that uses performance prediction
models to determine the sender transmission rate.
Surprisingly, taking this approach leads us to the
simple conclusion that the sender should regulate its
addition rate based on the total number of undelivered
packets stored at the receivers. We show that despite
its simplicity, our proposed dynamic rate adaptation
scheme results in noticeably improved throughput-delay
performance over existing schemes in the literature.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tapparello:2014:DCT,
author = "Cristiano Tapparello and Osvaldo Simeone and Michele
Rossi",
title = "Dynamic compression-transmission for energy-harvesting
multihop networks with correlated sources",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1729--1741",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283071",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Energy-harvesting wireless sensor networking is an
emerging technology with applications to various fields
such as environmental and structural health monitoring.
A distinguishing feature of wireless sensors is the
need to perform both source coding tasks, such as
measurement and compression, and transmission tasks. It
is known that the overall energy consumption for source
coding is generally comparable to that of transmission,
and that a joint design of the two classes of tasks can
lead to relevant performance gains. Moreover, the
efficiency of source coding in a sensor network can be
potentially improved via distributed techniques by
leveraging the fact that signals measured by different
nodes are correlated. In this paper, a data-gathering
protocol for multihop wireless sensor networks with
energy-harvesting capabilities is studied whereby the
sources measured by the sensors are correlated. Both
the energy consumptions of source coding and
transmission are modeled, and distributed source coding
is assumed. The problem of dynamically and jointly
optimizing the source coding and transmission
strategies is formulated for time-varying channels and
sources. The problem consists in the minimization of a
cost function of the distortions in the source
reconstructions at the sink under queue stability
constraints. By adopting perturbation-based Lyapunov
techniques, a close-to-optimal online scheme is
proposed that has an explicit and controllable tradeoff
between optimality gap and queue sizes. The role of
side information available at the sink is also
discussed under the assumption that acquiring the side
information entails an energy cost.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Akhoondi:2014:LLL,
author = "Masoud Akhoondi and Curtis Yu and Harsha V.
Madhyastha",
title = "{LASTor}: a low-latency {AS}-aware {Tor} client",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1742--1755",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291242",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Though the widely used Tor anonymity network is
designed to enable low-latency anonymous communication,
interactive communications on Tor incur latencies over
5 greater than on the direct Internet path, and in many
cases, autonomous systems (ASs) can compromise
anonymity via correlations of network traffic. In this
paper, we develop LASTor, a new Tor client that
addresses these shortcomings in Tor with only
client-side modifications. First, LASTor improves
communication latencies by accounting for the inferred
locations of Tor relays while choosing paths. Since the
preference for shorter paths reduces the entropy of
path selection, we design LASTor so that a user can
choose an appropriate tradeoff between latency and
anonymity. Second, we develop an efficient and accurate
algorithm to identify paths on which an AS can
compromise anonymity by traffic correlation. LASTor
avoids such paths to improve a user's anonymity, and
the low run-time of the algorithm ensures that the
impact on end-to-end communication latencies is low.
Our results show that, in comparison to the default Tor
client, LASTor reduces median latencies by 25\% while
also reducing the false negative rate of not detecting
a potential snooping AS from 57\% to 11\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kompella:2014:CCU,
author = "Sastry Kompella and Gam D. Nguyen and Clement Kam and
Jeffrey E. Wieselthier and Anthony Ephremides",
title = "Cooperation in cognitive underlay networks: stable
throughput tradeoffs",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1756--1768",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2284788",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper addresses fundamental issues in a shared
channel where the users have different priority levels.
In particular, we study a two-user cognitive shared
channel consisting of a primary (higher-priority) and a
secondary user, operating in the cognitive underlay
fashion, but in a novel way where interference suffered
by the primary user is compensated by requiring the
secondary user to cooperatively relay some of the
primary's packets. We start by analyzing the case of no
node cooperation, where nodes transmit their own
packets to their respective destinations. We then
extend the analysis to a system in which the secondary
node acts as a relay for the primary user, in addition
to serving its own packets. Specifically, in the
cognitive cooperation case, the secondary node forwards
those packets to the primary destination that it
receives successfully from the primary source. In such
cognitive shared channels, a tradeoff arises in terms
of activating the secondary along with the primary so
that both transmissions may be successful, but with a
lower probability, compared to the case of the
secondary node staying idle when the primary user
transmits. Results show the benefits of relaying for
both the primary as well as the secondary nodes in
terms of the stable-throughput region.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Orsini:2014:EIK,
author = "Chiara Orsini and Enrico Gregori and Luciano Lenzini
and Dmitri Krioukov",
title = "Evolution of the {Internet} $k$-dense structure",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1769--1780",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2282756",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "As the Internet autonomous system (AS)-level topology
grows over time, some of its structural properties
remain unchanged. Such time-invariant properties are
generally interesting because they tend to reflect some
fundamental processes or constraints behind Internet
growth. As has been shown before, the time-invariant
structural properties of the Internet include some most
basic ones, such as the degree distribution or
clustering. Here, we add to this time-invariant list a
nontrivial property --- $k$-dense decomposition. This
property is derived from a recursive form of edge
multiplicity, defined as the number of triangles that
share a given edge. We show that after proper
normalization, the $k$-dense decomposition of the
Internet has remained stable over the last decade, even
though the Internet size has approximately doubled, and
so has the $k$-density of its $k$-densest core. This
core consists mostly of content providers peering at
Internet eXchange Points, and it only loosely overlaps
with the high-degree or high-rank AS core, consisting
mostly of tier-1 transit providers. We thus show that
high degrees and high k-densities reflect two different
Internet-specific properties of ASs (transit versus
content providers). As a consequence, even though
degrees and $k$-densities of nodes are correlated, the
relative fluctuations are strong, and related to that,
random graphs with the same degree distribution or even
degree correlations as in the Internet, do not
reproduce its $k$-dense decomposition. Therefore an
interesting open question is what Internet topology
models or generators can fully explain or at least
reproduce the $k$-dense properties of the Internet.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:MQR,
author = "Shannon Chen and Cing-Yu Chu and Su-Ling Yeh and
Hao-Hua Chu and Polly Huang",
title = "Modeling the {QoE} of rate changes in {Skype\slash
SILK VoIP} calls",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1781--1793",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2286624",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The effective end-to-end transport of delay-sensitive
voice data has long been a problem in multimedia
networking. One of the major issues is determining the
sending rate of real-time VoIP streams such that the
user experience is maximized per unit network resource
consumed. A particularly interesting complication that
remains to be addressed is that the available bandwidth
is often dynamic. Thus, it is unclear whether a
marginal increase warrants better user experience. If a
user naively tunes the sending rate to the optimum at
any given opportunity, the user experience could
fluctuate. To investigate the effects of magnitude and
frequency of rate changes on user experience, we
recruited 127 human participants to systematically
score emulated Skype calls with different combinations
of rate changes, including varying magnitude and
frequency of rate changes. Results show that: (1) the
rate change frequency affects the user experience on a
logarithmic scale, echoing Weber-Fechner's Law; (2) the
effect of rate change magnitude depends on how users
perceive the quality difference; and (3) this study
derives a closed-form model of user perception for rate
changes for Skype calls.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Stamatiou:2014:DCM,
author = "Kostas Stamatiou and Martin Haenggi",
title = "Delay characterization of multihop transmission in a
{Poisson} field of interference",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1794--1807",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2283338",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We evaluate the end-to-end delay of a multihop
transmission scheme that includes a source, a number of
relays, and a destination, in the presence of
interferers located according to a Poisson point
process. The medium access control (MAC) protocol
considered is a combination of TDMA and ALOHA,
according to which nodes located a certain number of
hops apart are allowed to transmit with a certain
probability. Based on an independent transmissions
assumption, which decouples the queue evolutions, our
analysis provides explicit expressions for the mean
end-to-end delay and throughput, as well as scaling
laws when the interferer density grows to infinity. If
the source always has packets to transmit, we find that
full spatial reuse, i.e., ALOHA, is asymptotically
delay-optimal, but requires more hops than a TDMA-ALOHA
protocol. The results of our analysis have applications
in delay-minimizing joint MAC/routing algorithms for
networks with randomly located nodes.We simulate a
network where sources and relays form a Poisson point
process, and each source assembles a route to its
destination by selecting the relays closest to the
optimal locations. We assess both theoretically and via
simulation the sensitivity of the end-to-end delay with
respect to imperfect relay placements and route
crossings.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sojoudi:2014:BDS,
author = "Somayeh Sojoudi and Steven H. Low and John C. Doyle",
title = "Buffering dynamics and stability of {Internet}
congestion controllers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1808--1818",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2287198",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Many existing fluid-flow models of the Internet
congestion control algorithms make simplifying
assumptions on the effects of buffers on the data
flows. In particular, they assume that the flow rate of
a TCP flow at every link in its path is equal to the
original source rate. However, a fluid flow in practice
is modified by the queueing processes on its path, so
that an intermediate link will generally not see the
original source rate. In this paper, a more accurate
model is derived for the behavior of the network under
a congestion controller, which takes into account the
effect of buffering on output flows. It is shown how
this model can be deployed for some well-known service
disciplines such as first-in-first-out and generalized
weighted fair queueing. Based on the derived model, the
dual and primal-dual algorithms are studied under the
common pricing mechanisms, and it is shown that these
algorithms can become unstable. Sufficient conditions
are provided to guarantee the stability of the dual and
primal-dual algorithms. Finally, a new pricing
mechanism is proposed under which these congestion
control algorithms are both stable.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Hou:2014:PFD,
author = "I-Hong Hou and Piyush Gupta",
title = "Proportionally fair distributed resource allocation in
multiband wireless systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1819--1830",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2284494",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "A challenging problem in multiband multicell
self-organized wireless systems, such as
femtocells/picocells in cellular networks, multichannel
Wi-Fi networks, and more recent wireless networks over
TV white spaces, is of distributed resource allocation.
This in general involves four components: channel
selection, client association, channel access, and
client scheduling. In this paper, we present a unified
framework for jointly addressing the four components
with the global system objective of maximizing the
clients throughput in a proportionally fair manner. Our
formulation allows a natural dissociation of the
problem into two subparts. We show that the first part,
involving channel access and client scheduling, is
convex and derive a distributed adaptation procedure
for achieving a Pareto-optimal solution. For the second
part, involving channel selection and client
association, we develop a Gibbs-sampler-based approach
for local adaptation to achieve the global objective,
as well as derive fast greedy algorithms from it that
achieve good solutions often.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Blough:2014:FUI,
author = "Douglas M. Blough and Paolo Santi and Ramya
Srinivasan",
title = "On the feasibility of unilateral interference
cancellation in {MIMO} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1831--1844",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2286829",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The problem of multiple-input-multiple-output (MIMO)
feasibility refers to whether it is possible to support
specified numbers of streams allocated to the links of
an MIMO network while canceling all interference. In
unilateral interference cancellation, nodes account
only for interfering links that they have been assigned
to cancel and ignore other interfering links. We
present several different formulations of the
unilateral MIMO feasibility problem and use these
formulations to analyze the problem's complexity and
develop heuristic feasibility algorithms. We first
prove that the general unilateral feasibility problem
is NP-complete. We then identify several special cases
where the problem is solvable in polynomial time. These
include when only receiver-side interference
cancellation is performed, when all nodes have two
antenna elements, and when the maximum degree of the
network's interference graph is two. Finally, we
present several heuristic feasibility algorithms
derived from different problem formulations and
evaluate their accuracies on randomly generated MIMO
networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Magistretti:2014:CAC,
author = "Eugenio Magistretti and Omer Gurewitz and Edward W.
Knightly",
title = "{802.11ec}: collision avoidance without control
messages",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1845--1858",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288365",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we design, implement, and evaluate
802.11ec (Encoded Control), an 802.11-based protocol
without control messages: Instead, 802.11ec employs
correlatable symbol sequences that, together with the
timing the codes are transmitted, encode all control
information and change the fundamental design
properties of the MAC. The use of correlatable symbol
sequences provides two key advantages: (1) efficiency,
as it permits a near order of magnitude reduction of
the control time; (2) robustness, because codes are
short and easily detectable even at low
signal-to-interference-plus-noise ratio (SINR) and even
while a neighbor is transmitting data. We implement
802.11ec on a field programmable gate array
(FPGA)-based software defined radio. We perform a large
number of experiments and show that, compared to 802.11
(with and without RTS/CTS), 802.11ec achieves a vast
efficiency gain in conveying control information and
resolves key throughput and fairness problems in the
presence of hidden terminals, asymmetric topologies,
and general multihop topologies.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lim:2014:SMW,
author = "Sungsu Lim and Kyomin Jung and Matthew Andrews",
title = "Stability of the max-weight protocol in adversarial
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1859--1872",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288372",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we consider the MAX-WEIGHT protocol for
routing and scheduling in wireless networks under an
adversarial model. This protocol has received a
significant amount of attention dating back to the
papers of Tassiulas and Ephremides. In particular, this
protocol is known to be throughput-optimal whenever the
traffic patterns and propagation conditions are
governed by a stationary stochastic process. However,
the standard proof of throughput optimality (which is
based on the negative drift of a quadratic potential
function) does not hold when the traffic patterns and
the edge capacity changes over time are governed by an
arbitrary adversarial process. Such an environment
appears frequently in many practical wireless scenarios
when the assumption that channel conditions are
governed by a stationary stochastic process does not
readily apply. In this paper, we prove that even in the
above adversarial setting, the MAX-WEIGHT protocol
keeps the queues in the network stable (i.e., keeps the
queue sizes bounded) whenever this is feasible by some
routing and scheduling algorithm. However, the proof is
somewhat more complex than the negative potential drift
argument that applied in the stationary case. Our proof
holds for any arbitrary interference relationships
among edges. We also prove the same stability of
\epsilon -approximate MAX-WEIGHT under the adversarial
model. We conclude the paper with a discussion of queue
sizes in the adversarial model as well as a set of
simulation results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Al-Ayyoub:2014:TSA,
author = "Mahmoud Al-Ayyoub and Himanshu Gupta",
title = "Truthful spectrum auctions with approximate
social-welfare or revenue",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1873--1885",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288317",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In cellular networks, a recent trend in research is to
make spectrum access dynamic in the spatial and
temporal dimensions for the sake of efficient
utilization of spectrum. In one such model, the
spectrum is divided into channels and periodically
allocated to competing base stations using an
auction-based market mechanism. An ``efficient''
auction mechanism is essential to the success of such a
dynamic spectrum access model. A key objective in
designing an auction mechanism is ``truthfulness.''
Combining this objective with an optimization of some
social choice function (such as the social-welfare or
the generated revenue) is highly desirable. In this
paper, we design polynomial-time spectrum auction
mechanisms that are truthful and yield an allocation
with O (1)-approximate social-welfare or revenue. Our
mechanisms generalize to general interference models.
To the best of our knowledge, ours is the first work to
design polynomial-time truthful spectrum auction
mechanisms with a constant-factor approximation of
either the expected revenue or the social-welfare. We
demonstrate the performance of our designed mechanism
through simulations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Zheng:2014:TME,
author = "Yuanqing Zheng and Mo Li",
title = "Towards more efficient cardinality estimation for
large-scale {RFID} systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1886--1896",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288352",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Radio frequency identification (RFID) cardinality
estimation with an accuracy guarantee is of practical
importance in various large-scale RFID applications.
This paper proposes a fast RFID cardinality estimation
protocol, named Zero-One Estimator (ZOE). ZOE only
requires 1-bit response from the RFID tags per
estimation round. More importantly, ZOE rapidly
converges to optimal parameter configurations and
achieves higher estimation efficiency compared to
existing protocols. ZOE guarantees arbitrary accuracy
requirement without imposing heavy computation and
memory overhead at RFID tags except the routine
operations of C1G2 standard. ZOE also provides reliable
cardinality estimation with unreliable channels due to
the robust protocol design. We prototype ZOE using the
USRP software defined radio and the Intel WISP tags. We
extensively evaluate the performance of ZOE compared to
existing protocols, which demonstrates encouraging
results in terms of estimation accuracy, time
efficiency, as well as robustness over a large range of
tag population.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liu:2014:PPB,
author = "Changbin Liu and Ricardo Correa and Harjot Gill and
Tanveer Gill and Xiaozhou Li and Shivkumar Muthukumar
and Taher Saeed and Boon Thau Loo and Prithwish Basu",
title = "{PUMA}: policy-based unified multiradio architecture
for agile mesh networking",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1897--1910",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2286321",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "This paper presents the design and implementation of
PUMA, a declarative constraint-solving platform for
policy-based routing and channel selection in
multiradio wireless mesh networks. In PUMA, users
formulate channel selection policies as optimization
goals and constraints that are concisely declared using
the Colog declarative language. To efficiently execute
Colog programs in a distributed setting, PUMA
integrates a high-performance constraint solver with a
declarative networking engine. We demonstrate the
capabilities of PUMA in defining distributed protocols
that cross-optimize across channel selection and
routing. We have developed a prototype of the PUMA
system that we extensively evaluated in simulations and
on the ORBIT testbed. Our experimental results
demonstrate that PUMA can flexibly and efficiently
implement a variety of centralized and distributed
channel selection protocols that result in
significantly higher throughput compared to
single-channel and identical-channel assignment
solutions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ji:2014:LCS,
author = "Bo Ji and Gagan R. Gupta and Xiaojun Lin and Ness B.
Shroff",
title = "Low-complexity scheduling policies for achieving
throughput and asymptotic delay optimality in
multichannel wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1911--1924",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291793",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we study the scheduling problem for
downlink transmission in a multichannel (e.g.,
OFDM-based) wireless network. We focus on a single
cell, with the aim of developing a unifying framework
for designing low-complexity scheduling policies that
can provide optimal performance in terms of both
throughput and delay. We develop new easy-to-verify
sufficient conditions for rate-function delay
optimality (in the many-channel many-user asymptotic
regime) and throughput optimality (in general
nonasymptotic setting), respectively. The sufficient
conditions allow us to prove rate-function delay
optimality for a class of Oldest Packets First (OPF)
policies and throughput optimality for a large class of
Maximum Weight in the Fluid limit (MWF) policies,
respectively. By exploiting the special features of our
carefully chosen sufficient conditions and
intelligently combining policies from the classes of
OPF and MWF policies, we design hybrid policies that
are both rate-function delay-optimal and
throughput-optimal with a complexity of O ( n$^{2.5}$
log n ), where n is the number of channels or users.
Our sufficient condition is also used to show that a
previously proposed policy called Delay Weighted
Matching (DWM) is rate-function delay-optimal. However,
DWM incurs a high complexity of O(n$^5$ ). Thus, our
approach yields significantly lower complexity than the
only previously designed delay and throughput-optimal
scheduling policy. We also conduct numerical
experiments to validate our theoretical results.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Li:2014:SPE,
author = "Qi Li and Mingwei Xu and Yuan Yang and Lixin Gao and
Yong Cui and Jianping Wu",
title = "Safe and practical energy-efficient detour routing in
{IP} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1925--1937",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288790",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The Internet is generally not energy-efficient since
all network devices are running all the time and only a
small fraction of consumed power is actually related to
traffic forwarding. Existing studies try to detour
around links and nodes during traffic forwarding to
save powers for energy-efficient routing. However,
energy-efficient routing in traditional IP networks is
not well addressed. The most challenges within an
energy-efficient routing scheme in IP networks lie in
safety and practicality. The scheme should ensure
routing stability and loop-and congestion-free packet
forwarding, while not requiring modifications in the
traditional IP forwarding diagram and shortest-path
routing protocols. In this paper, we propose a novel
energy-efficient routing approach called safe and
practical energy-efficient detour routing (SPEED) for
power savings in IP networks. We provide theoretical
insight into energy-efficient routing and prove that
determining if energy-efficient routing exists is
NP-complete. We develop a heuristic in SPEED to
maximize pruned links in computing energy-efficient
routings. Extensive experimental results show that
SPEED significantly saves power consumptions without
incurring network congestions using real network
topologies and traffic matrices.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Maguluri:2014:SJU,
author = "Siva Theja Maguluri and R. Srikant",
title = "Scheduling jobs with unknown duration in clouds",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1938--1951",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288973",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider a stochastic model of jobs arriving at a
cloud data center. Each job requests a certain amount
of CPU, memory, disk space, etc. Job sizes (durations)
are also modeled as random variables, with possibly
unbounded support. These jobs need to be scheduled
nonpreemptively on servers. The jobs are first routed
to one of the servers when they arrive and are queued
at the servers. Each server then chooses a set of jobs
from its queues so that it has enough resources to
serve all of them simultaneously. This problem has been
studied previously under the assumption that job sizes
are known and upper-bounded, and an algorithm was
proposed that stabilizes traffic load in a diminished
capacity region. Here, we present a load balancing and
scheduling algorithm that is throughput-optimal,
without assuming that job sizes are known or are
upper-bounded.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dong:2014:MAP,
author = "Wei Dong and Yunhao Liu and Yuan He and Tong Zhu and
Chun Chen",
title = "Measurement and analysis on the packet delivery
performance in a large-scale sensor network",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1952--1963",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2288646",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Understanding the packet delivery performance of a
wireless sensor network (WSN) is critical for improving
system performance and exploring future developments
and applications of WSN techniques. In spite of many
empirical measurements in the literature, we still lack
in-depth understanding on how and to what extent
different factors contribute to the overall packet
losses for a complete stack of protocols at large
scale. Specifically, very little is known about: (1)
when, where, and under what kind of circumstances
packet losses occur; (2) why packets are lost. As a
step toward addressing those issues, we deploy a
large-scale WSN and design a measurement system for
retrieving important system metrics. We propose MAP, a
step-by-step methodology to identify the losses,
extract system events, and perform spatial-temporal
correlation analysis by employing a carefully examined
causal graph. MAP enables us to get a closer look at
the root causes of packet losses in a low-power ad hoc
network. This study validates some earlier conjectures
on WSNs and reveals some new findings. The quantitative
results also shed lights for future large-scale WSN
deployments.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dainotti:2014:ACW,
author = "Alberto Dainotti and Claudio Squarcella and Emile Aben
and Kimberly C. Claffy and Marco Chiesa and Michele
Russo and Antonio Pescap{\'e}",
title = "Analysis of country-wide {Internet} outages caused by
censorship",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1964--1977",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291244",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In the first months of 2011, Internet communications
were disrupted in several North African countries in
response to civilian protests and threats of civil war.
In this paper, we analyze episodes of these disruptions
in two countries: Egypt and Libya. Our analysis relies
on multiple sources of large-scale data already
available to academic researchers: BGP interdomain
routing control plane data, unsolicited data plane
traffic to unassigned address space, active macroscopic
traceroute measurements, RIR delegation files, and
MaxMind's geolocation database. We used the latter two
data sets to determine which IP address ranges were
allocated to entities within each country, and then
mapped these IP addresses of interest to BGP-announced
address ranges (prefixes) and origin autonomous systems
(ASs) using publicly available BGP data repositories in
the US and Europe. We then analyzed observable activity
related to these sets of prefixes and ASs throughout
the censorship episodes. Using both control plane and
data plane data sets in combination allowed us to
narrow down which forms of Internet access disruption
were implemented in a given region over time. Among
other insights, we detected what we believe were
Libya's attempts to test firewall-based blocking before
they executed more aggressive BGP-based disconnection.
Our methodology could be used, and automated, to detect
outages or similar macroscopically disruptive events in
other geographic or topological regions.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yao:2014:NCR,
author = "Hongyi Yao and Danilo Silva and Sidharth Jaggi and
Michael Langberg",
title = "Network codes resilient to jamming and eavesdropping",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1978--1987",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2294254",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the problem of communicating information
over a network secretly and reliably in the presence of
a hidden adversary who can eavesdrop and inject
malicious errors. We provide polynomial-time
distributed network codes that are
information-theoretically rate-optimal for this
scenario, improving on the rates achievable in prior
work by Ngai et al. Ourmain contribution shows that as
long as the sum of the number of links the adversary
can jam (denoted by Z O ) and the number of links he
can eavesdrop on (denoted by ZI ) is less than the
network capacity (denoted by C ) (i.e., ZO + ZI {$<$} C
), our codes can communicate (with vanishingly small
error probability) a single bit correctly and without
leaking any information to the adversary.We then use
this scheme as a module to design codes that allow
communication at the source rate of C --- ZO when there
are no security requirements, and codes that allow
communication at the source rate of C --- ZO --- ZI
while keeping the communicated message provably secret
from the adversary. Interior nodes are oblivious to the
presence of adversaries and perform random linear
network coding; only the source and destination need to
be tweaked. We also prove that the rate-region obtained
is information-theoretically optimal. In proving our
results, we correct an error in prior work by a subset
of the authors in this paper.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2014:EDC,
author = "Shaxun Chen and Kai Zeng and Prasant Mohapatra",
title = "Efficient data capturing for network forensics in
cognitive radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "1988--2000",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291832",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Network forensics is an emerging interdiscipline used
to track down cyber crimes and detect network anomalies
for a multitude of applications. Efficient capture of
data is the basis of network forensics. Compared to
traditional networks, data capture faces significant
challenges in cognitive radio networks. In traditional
wireless networks, usually one monitor is assigned to
one channel for traffic capture. This approach will
incur very high cost in cognitive radio networks
because it typically has a large number of channels.
Furthermore, due to the uncertainty of the primary
user's behavior, cognitive radio devices change their
operating channels dynamically, which makes data
capturing more difficult. In this paper, we propose a
systematic method to capture data in cognitive radio
networks with a small number of monitors. We utilize
incremental support vector regression to predict packet
arrival time and intelligently switch monitors between
channels. We also propose a protocol that schedules
multiple monitors to perform channel scanning and
packet capturing in an efficient manner. Monitors are
reused in the time domain, and geographic coverage is
taken into account. The real-world experiments and
simulations show that our method is able to achieve the
packet capture rate above 70\% using a small number of
monitors, which outperforms the random scheme by
200\%-300\%.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dinh:2014:CEV,
author = "Thang N. Dinh and Huiyuan Zhang and Dzung T. Nguyen
and My T. Thai",
title = "Cost-effective viral marketing for time-critical
campaigns in large-scale social networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "2001--2011",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2290714",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Online social networks (OSNs) have become one of the
most effective channels for marketing and advertising.
Since users are often influenced by their friends,
``word-of-mouth'' exchanges, so-called viral marketing,
in social networks can be used to increase product
adoption or widely spread content over the network. The
common perception of viral marketing about being cheap,
easy, and massively effective makes it an ideal
replacement of traditional advertising. However, recent
studies have revealed that the propagation often fades
quickly within only few hops from the sources,
counteracting the assumption on the self-perpetuating
of influence considered in literature. With only
limited influence propagation, is massively reaching
customers via viral marketing still affordable? How do
we economically spend more resources to increase the
spreading speed? We investigate the cost-effective
massive viral marketing problem, taking into the
consideration the limited influence propagation. Both
analytical analysis based on power-law network theory
and numerical analysis demonstrate that the viral
marketing might involve costly seeding. To minimize the
seeding cost, we provide mathematical programming to
find optimal seeding for medium-size networks and
propose VirAds, an efficient algorithm, to tackle the
problem on large-scale networks. VirAds guarantees a
relative error bound of O(1) from the optimal solutions
in power-law networks and outperforms the greedy
heuristics that realizes on the degree centrality.
Moreover, we also show that, in general, approximating
the optimal seeding within a ratio better than O (log n
) is unlikely possible.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Liang:2014:FCP,
author = "Guanfeng Liang and Ulas C. Kozat",
title = "Fast cloud: pushing the envelope on delay performance
of cloud storage with coding",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "2012--2025",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2289382",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Our paper presents solutions that can significantly
improve the delay performance of putting and retrieving
data in and out of cloud storage. We first focus on
measuring the delay performance of a very popular cloud
storage service Amazon S3. We establish that there is
significant randomness in service times for reading and
writing small and medium size objects when assigned
distinct keys. We further demonstrate that using
erasure coding, parallel connections to storage cloud
and limited chunking (i.e., dividing the object into a
few smaller objects) together pushes the envelope on
service time distributions significantly (e.g., 76\%,
80\%, and 85\% reductions in mean, 90th, and 99th
percentiles for 2-MB files) at the expense of
additional storage (e.g., 1.75x). However, chunking and
erasure coding increase the load and hence the queuing
delays while reducing the supportable rate region in
number of requests per second per node. Thus, in the
second part of our paper, we focus on analyzing the
delay performance when chunking, forward error
correction (FEC), and parallel connections are used
together. Based on this analysis, we develop
load-adaptive algorithms that can pick the best code
rate on a per-request basis by using offline computed
queue backlog thresholds. The solutions work with
homogeneous services with fixed object sizes, chunk
sizes, operation type (e.g., read or write) as well as
heterogeneous services with mixture of object sizes,
chunk sizes, and operation types. We also present a
simple greedy solution that opportunistically uses idle
connections and picks the erasure coding rate
accordingly on the fly. Both backlog-based and greedy
solutions support the full rate region and provide best
mean delay performance when compared to the best fixed
coding rate policy. Our evaluations show that
backlog-based solutions achieve better delay
performance at higher percentile values than the greedy
solution.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kriegleder:2014:CAA,
author = "Maximilian Kriegleder",
title = "A correction to algorithm {A2} in {``Asynchronous
distributed averaging on communication networks''}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "22",
number = "6",
pages = "2026--2027",
month = dec,
year = "2014",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2292800",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Thu Feb 12 18:29:37 MST 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
note = "See \cite{Mehyar:2007:ADA}.",
abstract = "This paper discusses Algorithm A2 in ``Asynchronous
Distributed Averaging on Communication Networks'' (IEEE
Trans. Netw., vol. 15, no. 3, pp. 512-520, Jun. 2007),
which claims to solve the distributed averaging problem
provided that the parameters to the algorithm meet
certain constraints. Specifically, the states of each
node in the network are claimed to converge to the
average of the initial values associated with the nodes
under these constraints. This paper points out a flaw
in the proof of the algorithm and in addition provides
a specific example of a network, satisfying the
assumptions, for which the algorithm does not
converge.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2015:PPA,
author = "Wanchun Jiang and Fengyuan Ren and Chuang Lin",
title = "Phase plane analysis of quantized congestion
notification for data center {Ethernet}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "1--14",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2292851",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Currently, Ethernet is being enhanced to become the
unified switch fabric in data centers. With the unified
switch fabric, the cost on redundant devices is
reduced, while the design and management of data center
networks are simplified. Congestion management is one
of the indispensable enhancements on Ethernet, and
Quantized Congestion Notification (QCN) has just been
ratified as the formal standard. Though QCN has been
investigated for several years, there exist few
in-depth theoretical analyses on QCN. The most possible
reason is that QCN is heuristically designed and
involves the property of variable structure. The
classic linear analysis method is incapable of handling
the segmented nonlinearity of the variable structure
system. In this paper, we use the phase plane method,
which is suitable for systems of segmented
nonlinearity, to analyze the QCN system. The overall
dynamic behaviors of the QCN system are presented, and
the sufficient conditions for the stable QCN system are
deduced. These sufficient conditions serve as
guidelines toward proper parameters setting. Moreover,
we find that the stability of QCN is mainly promised by
the sliding mode motion, which is the underlying reason
for QCN's stable queue shown in numerous simulations
and experiments. Experiments on the NetFPGA platform
verify that the analytical results can explain the
complex behaviors of QCN.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Jiang:2015:CBS,
author = "Hongbo Jiang and Tianlong Yu and Chen Tian and Guang
Tan and Chonggang Wang",
title = "Connectivity-based segmentation in large-scale
{$2$-D\slash $3$-D} sensor networks: algorithm and
applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "15--27",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2289912",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Efficient sensor network design requires a full
understanding of the geometric environment in which
sensor nodes are deployed. In practice, a large-scale
sensor network often has a complex and irregular
topology, possibly containing obstacles/holes. Convex
network partitioning, also known as convex
segmentation, is a technique to divide a network into
convex regions in which traditional algorithms designed
for a simple network geometry can be applied. Existing
segmentation algorithms heavily depend on concave node
detection, or sink extraction from the median
axis/skeleton, resulting in sensitivity of performance
to network boundary noise. Furthermore, since they rely
on the network's 2-D geometric properties, they do not
work for 3-D cases. This paper presents a novel
segmentation approach based on Morse function, bringing
together the notions of convex components and the Reeb
graph of a network. The segmentation is realized by a
distributed and scalable algorithm, named CONSEL, for
CONnectivity-based SEgmentation in Large-scale
$2$-D\slash $3$-D sensor networks. In CONSEL, several
boundary nodes first flood the network to construct the
Reeb graph. The ordinary nodes then compute mutex pairs
locally, generating a coarse segmentation. Next,
neighboring regions that are not mutex pairs are merged
together. Finally, by ignoring mutex pairs that lead to
small concavity, we provide an approximate convex
decomposition. CONSEL has a number of advantages over
previous solutions: (1) it works for both $2$-D and
$3$-D sensor networks; (2) it uses merely network
connectivity information; (3) it guarantees a bound for
the generated regions' deviation from convexity. We
further propose to integrate network segmentation with
existing applications that are oriented to simple
network geometry. Extensive simulations show the
efficacy of CONSEL in segmenting networks and in
improving the performance of two applications:
geographic routing and connectivity-based
localization.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Basile:2015:AAL,
author = "Cataldo Basile and Antonio Lioy",
title = "Analysis of application-layer filtering policies with
application to {HTTP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "28--41",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2293625",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Application firewalls are increasingly used to inspect
upper-layer protocols (as HTTP) that are the target or
vehicle of several attacks and are not properly
addressed by network firewalls. Like other security
controls, application firewalls need to be carefully
configured, as errors have a significant impact on
service security and availability. However, currently
no technique is available to analyze their
configuration for correctness and consistency. This
paper extends a previous model for analysis of packet
filters to the policy anomaly analysis in application
firewalls. Both rule-pair and multirule anomalies are
detected, hence reducing the likelihood of conflicting
and suboptimal configurations. The expressiveness of
this model has been successfully tested against the
features of Squid, a popular Web-caching proxy offering
various access control capabilities. The tool
implementing this model has been tested on various
scenarios and exhibits good performance.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Leogrande:2015:MCP,
author = "Marco Leogrande and Fulvio Risso and Luigi Ciminiera",
title = "Modeling complex packet filters with finite state
automata",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "42--55",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2290739",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Designing an efficient and scalable packet filter for
modern computer networks becomes more challenging each
day: Faster link speeds, the steady increase in the
number of encapsulation rules (e.g., tunneling), and
the necessity to precisely isolate a given subset of
traffic cause filtering expressions to become more
complex than in the past. Most current packet filtering
mechanisms cannot deal with those requirements because
their optimization algorithms either cannot scale with
the increased size of the filtering code or exploit
simple domain-specific optimizations that cannot
guarantee to operate properly in case of complex
filters. This paper presents pFSA, a new model that
transforms packet filters into finite state automata
and guarantees the optimal number of checks on the
packet, also in case of multiple filters composition,
hence enabling efficiency and scalability without
sacrificing filtering computation time.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rabbachin:2015:WNI,
author = "Alberto Rabbachin and Andrea Conti and Moe Z. Win",
title = "Wireless network intrinsic secrecy",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "56--69",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2297339",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless secrecy is essential for communication
confidentiality, health privacy, public safety,
information superiority, and economic advantage in the
modern information society. Contemporary security
systems are based on cryptographic primitives and can
be complemented by techniques that exploit the
intrinsic properties of a wireless environment. This
paper develops a foundation for design and analysis of
wireless networks with secrecy provided by intrinsic
properties such as node spatial distribution, wireless
propagation medium, and aggregate network interference.
We further propose strategies that mitigate
eavesdropping capabilities, and we quantify their
benefits in terms of network secrecy metrics. This
research provides insights into the essence of wireless
network intrinsic secrecy and offers a new perspective
on the role of network interference in communication
confidentiality.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shen:2015:HAA,
author = "Haiying Shen and Ze Li",
title = "A hierarchical account-aided reputation management
system for {MANETs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "70--84",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2290731",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Encouraging cooperation and deterring selfish
behaviors are important for proper operations of mobile
ad hoc networks (MANETs). For this purpose, most
previous efforts rely on either reputation systems or
price systems. However, these systems are neither
sufficiently effective in providing cooperation
incentives nor sufficiently efficient in resource
consumption. Nodes in both systems can be uncooperative
while still being considered trustworthy. Also,
information exchange between mobile nodes in reputation
systems and credit circulation in price systems
consumes significant resources. This paper presents a
hierarchical Account-aided Reputation Management system
(ARM) to efficiently and effectively provide
cooperation incentives. ARM builds a hierarchical
locality-aware distributed hash table (DHT)
infrastructure for efficient and integrated operation
of both reputation and price systems. The
infrastructure helps to globally collect all node
reputation information in the system, which can be used
to calculate more accurate reputation and detect
abnormal reputation information. Also, ARM integrates
reputation and price systems by enabling higher-reputed
nodes to pay less for their received services.
Theoretical analysis demonstrates the properties of
ARM. Simulation results show that ARM outperforms the
individual reputation system and price system in terms
of effectiveness and efficiency of providing
cooperation incentives and deterring selfish
behaviors.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ma:2015:EIE,
author = "Richard T. B. Ma and John C. S. Lui and Vishal Misra",
title = "Evolution of the {Internet} economic ecosystem",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "85--98",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291852",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The evolution of the Internet has manifested itself in
many ways: the traffic characteristics, the
interconnection topologies, and the business
relationships among the autonomous components. It is
important to understand why (and how) this evolution
came about, and how the interplay of these dynamics may
affect future evolution and services. We propose a
network-aware, macroscopic model that captures the
characteristics and interactions of the application and
network providers, and show how it leads to a market
equilibrium of the ecosystem. By analyzing the driving
forces and the dynamics of the market equilibrium, we
obtain some fundamental understandings of the cause and
effect of the Internet evolution, which explain why
some historical and recent evolutions have happened.
Furthermore, by projecting the likely future
evolutions, our model can help application and network
providers to make informed business decisions so as to
succeed in this competitive ecosystem.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Celik:2015:SNT,
author = "G{\"u}ner D. {\c{C}}elik and Eytan Modiano",
title = "Scheduling in networks with time-varying channels and
reconfiguration delay",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "99--113",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2292604",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider the optimal control problem for networks
subjected to time-varying channels, reconfiguration
delays, and interference constraints. We show that the
simultaneous presence of time-varying channels and
reconfiguration delays significantly reduces the system
stability region and changes the structure of optimal
policies. We first consider memoryless channel
processes and characterize the stability region in
closed form. We prove that a frame-based Max-Weight
scheduling algorithm that sets frame durations
dynamically, as a function of the current queue lengths
and average channel gains, is throughput-optimal. Next,
we consider arbitrary Markov-modulated channel
processes and show that memory in the channel processes
can be exploited to improve the stability region. We
develop a novel approach to characterizing the
stability region of such systems using state-action
frequencies, which are stationary solutions to a Markov
Decision Process (MDP) formulation. Moreover, we
develop a dynamic control policy using the state-action
frequencies and variable frames whose lengths are
functions of queue sizes and show that it is
throughput-optimal. The frame-based dynamic control
(FBDC) policy is applicable to a broad class of network
control systems, with or without reconfiguration
delays, and provides a new framework for developing
throughput-optimal network control policies using
state-action frequencies. Finally, we propose Myopic
policies that are easy to implement and have better
delay properties as compared to the FBDC policy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2015:JSF,
author = "Reuven Cohen and Guy Grebla",
title = "Joint scheduling and fast cell selection in {OFDMA}
wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "114--125",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2291295",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In modern broadband cellular networks, the
omni-directional antenna at each cell is replaced by
three or six directional antennas, one in every sector.
While every sector can run its own scheduling
algorithm, bandwidth utilization can be significantly
increased if a joint scheduler makes these decisions
for all the sectors. This gives rise to a new problem,
referred to as ``joint scheduling,'' addressed in this
paper for the first time. The problem is proven to be
NP-hard, but we propose efficient algorithms with a
worst-case performance guarantee for solving it. We
then show that the proposed algorithms indeed
substantially increase the network throughput.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Yang:2015:TRC,
author = "Yang Yang and Ness B. Shroff",
title = "Throughput of rateless codes over broadcast erasure
channels",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "126--137",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2295608",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we characterize the throughput of a
broadcast network with n receivers using rateless codes
with block size $K$. We assume that the underlying
channel is a Markov modulated erasure channel that is
i.i.d. across users, but can be correlated in time. We
characterize the system throughput asymptotically in
$n$. Specifically, we explicitly show how the
throughput behaves for different values of the coding
block size $K$ as a function of $n$, as $ n \to \infty
$. For finite values of $K$ and $n$, under the more
restrictive assumption of Gilbert--Elliott erasure
channels, we are able to provide a lower bound on the
maximum achievable throughput. Using simulations, we
show the tightness of the bound with respect to system
parameters $n$ and $K$ and find that its performance is
significantly better than the previously known lower
bounds.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Nakibly:2015:ODP,
author = "Gabi Nakibly and Reuven Cohen and Liran Katzir",
title = "Optimizing data plane resources for multipath flows",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "138--147",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2292895",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In many modern networks, such as datacenters, optical
networks, and multiprotocol label switching (MPLS), the
delivery of a traffic flow with a certain bandwidth
demand over a single network path is either not
possible or not cost-effective. In these cases, it is
very often possible to improve the network's bandwidth
utilization by splitting the traffic flow over multiple
efficient paths. While using multiple paths for the
same traffic flow increases the efficiency of the
network, it consumes expensive forwarding resources
from the network nodes, such as TCAM entries of
Ethernet/MPLS switches and wavelengths/lightpaths of
optical switches. In this paper, we define several
problems related to splitting a traffic flow over
multiple paths while minimizing the consumption of
forwarding resources, and present efficient algorithms
for solving these problems.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Checco:2015:FVN,
author = "Alessandro Checco and Douglas J. Leith",
title = "Fair virtualization of 802.11 networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "148--160",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2293501",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider virtualization of network capacity in
802.11 WLANs and mesh networks. We show that allocating
total airtime slices to ISPs is analogous to allocating
a fraction of available time-slots in TDMA. We
establish that the max-min fair flow rate allocation
within an ISP airtime slice can be characterized
independently of the rate allocation policy employed in
other slices. Building on these observations, we
present a lightweight, distributed algorithm for
allocating airtime slices among ISP and max-min fair
flow rates within each slice.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Martignon:2015:ETB,
author = "Fabio Martignon and Stefano Paris and Ilario Filippini
and Lin Chen and Antonio Capone",
title = "Efficient and truthful bandwidth allocation in
wireless mesh community networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "161--174",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2296401",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Nowadays, the maintenance costs of wireless devices
represent one of the main limitations to the deployment
of wireless mesh networks (WMNs) as a means to provide
Internet access in urban and rural areas. A promising
solution to this issue is to let the WMN operator lease
its available bandwidth to a subset of customers,
forming a wireless mesh community network, in order to
increase network coverage and the number of residential
users it can serve. In this paper, we propose and
analyze an innovative marketplace to allocate the
available bandwidth of a WMN operator to those
customers who are willing to pay the higher price for
the requested bandwidth, which in turn can be subleased
to other residential users. We formulate the allocation
mechanism as a combinatorial truthful auction
considering the key features of wireless multihop
networks and further present a greedy algorithm that
finds efficient and fair allocations even for
large-scale, real scenarios while maintaining the
truthfulness property. Numerical results show that the
greedy algorithm represents an efficient, fair, and
practical alternative to the combinatorial auction
mechanism.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Partov:2015:UFO,
author = "Bahar Partov and Douglas J. Leith and Rouzbeh Razavi",
title = "Utility fair optimization of antenna tilt angles in
{LTE} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "175--185",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2294965",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We formulate adaptation of antenna tilt angle as a
utility fair optimization task. This optimization
problem is nonconvex, but in this paper we show that,
under reasonable conditions, it can be reformulated as
a convex optimization. Using this insight, we develop a
lightweight method for finding the optimal antenna tilt
angles, making use of measurements that are already
available at base stations, and suited to distributed
implementation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wang:2015:DPL,
author = "Jiliang Wang and Wei Dong and Zhichao Cao and Yunhao
Liu",
title = "On the delay performance in a large-scale wireless
sensor network: measurement, analysis, and
implications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "186--197",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2296331",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We present a comprehensive delay performance
measurement and analysis in a large-scale wireless
sensor network. We build a lightweight delay
measurement system and present a robust method to
calculate the per-packet delay. We show that the method
can identify incorrect delays and recover them with a
bounded error. Through analysis of delay and other
system metrics, we seek to answer the following
fundamental questions: What are the spatial and
temporal characteristics of delay performance in a real
network? What are the most important impacting factors,
and is there any practical model to capture those
factors? What are the implications to protocol designs?
In this paper, we identify important factors from the
data trace and show that the important factors are not
necessarily the same with those in the Internet.
Furthermore, we propose a delay model to capture those
factors. We revisit several prevalent protocol designs
such as Collection Tree Protocol, opportunistic
routing, and Dynamic Switching-based Forwarding and
show that our model and analysis are useful to
practical protocol designs.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Papadopoulos:2015:NMR,
author = "Fragkiskos Papadopoulos and Constantinos Psomas and
Dmitri Krioukov",
title = "Network mapping by replaying hyperbolic growth",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "198--211",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2294052",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Recent years have shown a promising progress in
understanding geometric underpinnings behind the
structure, function, and dynamics of many complex
networks in nature and society. However, these promises
cannot be readily fulfilled and lead to important
practical applications, without a simple, reliable, and
fast network mapping method to infer the latent
geometric coordinates of nodes in a real network. Here,
we present HyperMap, a simple method to map a given
real network to its hyperbolic space. The method
utilizes a recent geometric theory of complex networks
modeled as random geometric graphs in hyperbolic
spaces. The method replays the network's geometric
growth, estimating at each time-step the hyperbolic
coordinates of new nodes in a growing network by
maximizing the likelihood of the network snapshot in
the model. We apply HyperMap to the Autonomous Systems
(AS) Internet and find that: (1) the method produces
meaningful results, identifying soft communities of ASs
belonging to the same geographic region; (2) the method
has a remarkable predictive power: Using the resulting
map, we can predict missing links in the Internet with
high precision, outperforming popular existing methods;
and (3) the resulting map is highly navigable, meaning
that a vast majority of greedy geometric routing paths
are successful and low-stretch. Even though the method
is not without limitations, and is open for
improvement, it occupies a unique attractive position
in the space of tradeoffs between simplicity, accuracy,
and computational complexity.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Chen:2015:DFI,
author = "Kang Chen and Haiying Shen",
title = "{DTN-FLOW}: inter-landmark data flow for
high-throughput routing in {DTNs}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "212--226",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2296751",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we focus on the efficient routing of
data among different areas in delay tolerant networks
(DTNs). In current algorithms, packets are forwarded
gradually through nodes with higher probability of
visiting the destination node or area. However, the
number of such nodes usually is limited, leading to
insufficient throughput performance. To solve this
problem, we propose an inter-landmark data routing
algorithm, namely DTN-FLOW. It selects popular places
that nodes visit frequently as landmarks and divides
the entire DTN area into subareas represented by
landmarks. Nodes transiting between landmarks relay
packets among landmarks, even though they rarely visit
the destinations of these packets. Specifically, the
number of node transits between two landmarks is
measured to represent the forwarding capacity between
them, based on which routing tables are built on each
landmark to guide packet routing. Each node predicts
its transits based on its previous landmark visiting
records using the order- k Markov predictor. When
routing a packet, the landmark determines the next-hop
landmark based on its routing table and forwards the
packet to the node with the highest probability of
transiting to the selected landmark. Thus, DTN-FLOW
fully utilizes all node movements to route packets
along landmark-based paths to their destinations. We
analyzed two real DTN traces to support the design of
DTN-FLOW. We deployed a small DTN-FLOW system on our
campus for performance evaluation. We also proposed
advanced extensions to improve its efficiency and
stability. The real deployment and trace-driven
simulation demonstrate the high efficiency of DTN-FLOW
in comparison to state-of-the-art DTN routing
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Vissicchio:2015:IRP,
author = "Stefano Vissicchio and Luca Cittadini and Giuseppe {Di
Battista}",
title = "On {iBGP} routing policies",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "227--240",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2296330",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Internet service providers (ISPs) run the internal
Border Gateway Protocol (iBGP) to distribute
interdomain routing information among their BGP
routers. Previous research consistently assumed that
iBGP is always configured as a mere dispatcher of
interdomain routes. However, router configuration
languages offer operators the flexibility of
fine-tuning iBGP. In this paper, we study the impact of
deploying routing policies in iBGP. First, we devise a
provably correct inference technique to pinpoint iBGP
policies from public BGP data. We show that the
majority of large transit providers and many small
transit providers do apply policies in iBGP. Then, we
discuss how iBGP policies can help achieve traffic
engineering and routing objectives. We prove that,
unfortunately, the presence of iBGP policies
exacerbates the iBGP convergence problem and
invalidates fundamental assumptions for previous
results, affecting their applicability. Hence, we
propose provably correct configuration guidelines to
achieve traffic engineering goals with iBGP policies,
without sacrificing BGP convergence guarantees.
Finally, for the cases in which our guidelines are not
applicable, we propose a novel technique to verify the
correctness of an iBGP configuration with iBGP
policies. We implement a prototype tool and show the
feasibility of offline analyses of arbitrary policies
on both real-world and in vitro configurations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Shahzad:2015:FAE,
author = "Muhammad Shahzad and Alex X. Liu",
title = "Fast and accurate estimation of {RFID} tags",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "241--254",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2298039",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Radio frequency identification (RFID) systems have
been widely deployed for various applications such as
object tracking, 3-D positioning, supply chain
management, inventory control, and access control. This
paper concerns the fundamental problem of estimating
RFID tag population size, which is needed in many
applications such as tag identification, warehouse
monitoring, and privacy-sensitive RFID systems. In this
paper, we propose a new scheme for estimating tag
population size called Average Run-based Tag estimation
(ART). The technique is based on the average run length
of ones in the bit string received using the
standardized framed slotted Aloha protocol. ART is
significantly faster than prior schemes. For example,
given a required confidence interval of 0.1\% and a
required reliability of 99.9\%, ART is consistently 7
times faster than the fastest existing schemes (UPE and
EZB) for any tag population size. Furthermore, ART's
estimation time is provably independent of the tag
population sizes. ART works with multiple readers with
overlapping regions and can estimate sizes of
arbitrarily large tag populations. ART is easy to
deploy because it neither requires modification to tags
nor to the communication protocol between tags and
readers. ART only needs to be implemented on readers as
a software module.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Lai:2015:OSA,
author = "Yuan-Cheng Lai and Ling-Yen Hsiao and Bor-Shen Lin",
title = "Optimal slot assignment for binary tracking tree
protocol in {RFID} tag identification",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "255--268",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2295839",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Tag anti-collision has long been an important issue in
RFID systems. To accelerate tag identification, some
researchers have recently adopted bit tracking
technology that allows the reader to detect the
locations of collided bits in a collision slot.
However, these methods still encounter the problem of
too many collisions occurring at the beginning of
identification. This paper proposes an optimal binary
tracking tree protocol (OBTT) that tries to separate
all of the tags into smaller sets to reduce collisions
at the beginning of identification. Using bit tracking
technology, OBTT mainly adopts three proposed
approaches, bit estimation, optimal partition, and
binary tracking tree. Bit estimation first estimates
the number of tags based on the locations of collided
bits. Optimal partition then determines the optimal
number of the initial sets based on this estimation.
Binary tracking tree lets the tag utilize one counter
to achieve the split during the identification process.
This paper formally analyzes the slot efficiency of
OBTT, which represents how many tags can be identified
in a slot. Results show that the slot efficiency is
close to 0.614, the highest value published to date.
Considering slot lengths, OBTT further determines the
optimal number of the initial sets to minimize the
identification delay. The analytical results show that
the delay efficiency of OBTT achieves 0.750, where
delay efficiency represents the number of tags that can
be identified in a baseline slot, the length of which
is the complete ID sent by the tag. The simulation
results show that OBTT outperforms other existing
algorithms.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Premkumar:2015:PFC,
author = "Karumbu Premkumar and Xiaomin Chen and Douglas J.
Leith",
title = "Proportional fair coding for wireless mesh networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "269--281",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2298974",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We consider multihop wireless networks carrying
unicast flows for multiple users. Each flow has a
specified delay deadline, and the lossy wireless links
are modeled as binary symmetric channels (BSCs). Since
transmission time, also called airtime, on the links is
shared among flows, increasing the airtime for one flow
comes at the cost of reducing the airtime available to
other flows sharing the same link. We derive the joint
allocation of flow airtimes and coding rates that
achieves the proportionally fair throughput allocation.
This utility optimization problem is nonconvex, and one
of the technical contributions of this paper is to show
that the proportional fair utility optimization can
nevertheless be decomposed into a sequence of convex
optimization problems. The solution to this sequence of
convex problems is the unique solution to the original
nonconvex optimization. Surprisingly, this solution can
be written in an explicit form that yields considerable
insight into the nature of the proportional fair joint
airtime/coding rate allocation. To our knowledge, this
is the first time that the utility fair joint
allocation of airtime/coding rate has been analyzed,
and also one of the first times that utility fairness
with delay deadlines has been considered.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Godfrey:2015:SRS,
author = "P. Brighten Godfrey and Matthew Caesar and Ian Haken
and Yaron Singer and Scott Shenker and Ion Stoica",
title = "Stabilizing route selection in {BGP}",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "282--299",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2299795",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Route instability is an important contributor to data
plane unreliability on the Internet and also incurs
load on the control plane of routers. In this paper, we
study how route selection schemes can avoid these
changes in routes. Modifying route selection implies a
tradeoff between stability, deviation from operators'
preferred routes, and availability of routes. We
develop algorithms to lower-bound the feasible points
in these tradeoff spaces. We also propose a new
approach, Stable Route Selection (SRS), which uses
flexibility in route selection to improve stability
without sacrificing availability and with a controlled
amount of deviation. Through large-scale simulation, a
software-router implementation, and an emulation with
real-world BGP update feeds, we demonstrate that SRS is
a promising approach to safely stabilize route
selection.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Sun:2015:BDI,
author = "Xinghua Sun and Lin Dai",
title = "Backoff design for {IEEE} 802.11 {DCF} networks:
fundamental tradeoff and design criterion",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "300--316",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2295242",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Binary Exponential Backoff (BEB) is a key component of
the IEEE 802.11 DCF protocol. It has been shown that
BEB can achieve the theoretical limit of throughput as
long as the initial backoff window size is properly
selected. It, however, suffers from significant delay
degradation when the network becomes saturated. It is
thus of special interest for us to further design
backoff schemes for IEEE 802.11 DCF networks that can
achieve comparable throughput as BEB, but provide
better delay performance. This paper presents a
systematic study on the effect of backoff schemes on
throughput and delay performance of saturated IEEE
802.11 DCF networks. In particular, a backoff scheme is
defined as a sequence of backoff window sizes { W i }.
The analysis shows that a saturated IEEE 802.11 DCF
network has a single steady-state operating point as
long as { Wi } is a monotonic increasing sequence. The
maximum throughput is found to be independent of { Wi
}, yet the growth rate of { Wi } determines a
fundamental tradeoff between throughput and delay
performance. For illustration, Polynomial Backoff is
proposed, and the effect of polynomial power x on the
network performance is characterized. It is
demonstrated that Polynomial Backoff with a larger is
more robust against the fluctuation of the network
size, but in the meanwhile suffers from a larger second
moment of access delay. Quadratic Backoff (QB), i.e.,
Polynomial Backoff with x = 2 stands out to be a
favorable option as it strikes a good balance between
throughput and delay performance. The comparative study
between QB and BEB confirms that QB well preserves the
robust nature of BEB and achieves much better queueing
performance than BEB.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Gozupek:2015:GTA,
author = "Didem G{\"o}z{\"u}pek and Mordechai Shalom and Fatih
Alag{\"o}z",
title = "A graph-theoretic approach to scheduling in cognitive
radio networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "1",
pages = "317--328",
month = feb,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2297441",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "We focus on throughput-maximizing, max-min fair, and
proportionally fair scheduling problems for centralized
cognitive radio networks. First, we propose a
polynomial-time algorithm for the throughput-maximizing
scheduling problem. We then elaborate on certain
special cases of this problem and explore their
combinatorial properties. Second, we prove that the
max-min fair scheduling problem is NP-Hard in the
strong sense. We also prove that the problem cannot be
approximated within any constant factor better than 2
unless P = NP. Additionally, we propose an
approximation algorithm for the max-min fair scheduling
problem with approximation ratio depending on the ratio
of the maximum possible data rate to the minimum
possible data rate of a secondary users. We then focus
on the combinatorial properties of certain special
cases and investigate their relation with various
problems such as the multiple-knapsack, matching,
terminal assignment, and Santa Claus problems. We then
prove that the proportionally fair scheduling problem
is NP-Hard in the strong sense and inapproximable
within any additive constant less than log (4/3).
Finally, we evaluate the performance of our
approximation algorithm for the max-min fair scheduling
problem via simulations. This approach sheds light on
the complexity and combinatorial properties of these
scheduling problems, which have high practical
importance in centralized cognitive radio networks.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Dainotti:2015:ASS,
author = "Alberto Dainotti and Alistair King and Kimberly Claffy
and Ferdinando Papale and Antonio Pescap{\'e}",
title = "Analysis of a ``/0'' stealth scan from a botnet",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "341--354",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2013.2297678",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Botnets are the most common vehicle of cyber-criminal
activity. They are used for spamming, phishing,
denial-of-service attacks, brute-force cracking,
stealing private information, and cyber warfare.
Botnets carry out network scans for several reasons,
including searching for vulnerable machines to infect
and recruit into the botnet, probing networks for
enumeration or penetration, etc. We present the
measurement and analysis of a horizontal scan of the
entire IPv4 address space conducted by the Sality
botnet in February 2011. This 12-day scan originated
from approximately 3 million distinct IP addresses and
used a heavily coordinated and unusually covert
scanning strategy to try to discover and compromise
VoIP-related (SIP server) infrastructure. We observed
this event through the UCSD Network Telescope, a /8
darknet continuously receiving large amounts of
unsolicited traffic, and we correlate this traffic data
with other public sources of data to validate our
inferences. Sality is one of the largest botnets ever
identified by researchers. Its behavior represents
ominous advances in the evolution of modern malware:
the use of more sophisticated stealth scanning
strategies by millions of coordinated bots, targeting
critical voice communications infrastructure. This
paper offers a detailed dissection of the botnet's
scanning behavior, including general methods to
correlate, visualize, and extrapolate botnet behavior
across the global Internet",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Joe-Wong:2015:OSN,
author = "Carlee Joe-Wong and Soumya Sen and Sangtae Ha",
title = "Offering supplementary network technologies: adoption
behavior and offloading benefits",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "355--368",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300863",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "To alleviate the congestion caused by rapid growth in
demand for mobile data, wireless service providers
(WSPs) have begun encouraging users to offload some of
their traffic onto supplementary network technologies,
e.g., offloading from 3G or 4G to WiFi or femtocells.
With the growing popularity of such offerings, a deeper
understanding of the underlying economic principles and
their impact on technology adoption is necessary. To
this end, we develop a model for user adoption of a
base technology (e.g., 3G) and a bundle of the base
plus a supplementary technology (e.g., 3G + WiFi).
Users individually make their adoption decisions based
on several factors, including the technologies'
intrinsic qualities, negative congestion externalities
from other subscribers, and the flat access rates that
a WSP charges. We then show how these user-level
decisions translate into aggregate adoption dynamics
and prove that these converge to a unique equilibrium
for a given set of exogenously determined system
parameters. We fully characterize these equilibria and
study adoption behaviors of interest to a WSP. We then
derive analytical expressions for the
revenue-maximizing prices and optimal coverage factor
for the supplementary technology and examine some
resulting nonintuitive user adoption behaviors.
Finally, we develop a mobile app to collect empirical
3G/WiFi usage data and numerically investigate the
profit-maximizing adoption levels when a WSP accounts
for its cost of deploying the supplemental technology
and savings from offloading traffic onto this
technology.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Tytgat:2015:AEV,
author = "Lieven Tytgat and Opher Yaron and Sofie Pollin and
Ingrid Moerman and Piet Demeester",
title = "Analysis and experimental verification of
frequency-based interference avoidance mechanisms in
{IEEE} 802.15.4",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "369--382",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300114",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "More and more wireless networks are deployed with
overlapping coverage. Especially in the unlicensed
bands, we see an increasing density of heterogeneous
solutions, with very diverse technologies and
application requirements. As a consequence,
interference from heterogeneous sources--also called
cross-technology interference--is a major problem
causing an increase of packet error rate (PER) and
decrease of quality of service (QoS), possibly leading
to application failure. This issue is apparent, for
example, when an IEEE 802.15.4 wireless sensor network
coexists with an IEEE 802.11 wireless LAN, which is the
focus of this work. One way to alleviate
cross-technology interference is to avoid it in the
frequency domain by selecting different channels.
Different multichannel protocols suitable for
frequency-domain interference avoidance have already
been proposed in the literature. However, most of these
protocols have only been investigated from the
perspective of intratechnology interference. Within
this work, we create an objective comparison of
different candidate channel selection mechanisms based
on a new multichannel protocol taxonomy using
measurements in a real-life testbed. We assess
different metrics for the most suitable mechanism using
the same set of measurements as in the comparison
study. Finally, we verify the operation of the best
channel selection metric in a proof-of-concept
implementation running on the testbed.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Madhavan:2015:ACN,
author = "Mukundan Madhavan and Harish Ganapathy and Malolan
Chetlur and Shivkumar Kalyanaraman",
title = "Adapting cellular networks to whitespaces spectrum",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "383--397",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300491",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "TV Whitespaces, recently opened up by the Federal
Communications Commission (FCC) for unlicensed use, are
seen as a potential cellular offload and/or standalone
mechanism, especially in dense metros where the demand
for throughput is high. In this paper, we use real data
collected from whitespaces databases to empirically
demonstrate features unique to whitespaces--
power-spectrum tradeoff and spatial variation in
spectrum availability. From this study, we conclude the
need for whitespaces-specific adaptations to cellular
networks so as to be able to extract maximum throughput
and guarantee reliability. To tackle the effects of the
power-spectrum tradeoff, we propose a novel
base-station design that specifically uses low-power
transmitters as a means to maximize throughput. This
design co-locates and networks together many
low-powered mode-I devices to act as a multiple-antenna
array. We estimate the size of the array required to
meet typical rate targets, and show that the array
design significantly outperforms traditional designs in
terms of throughput for a given cost. We then turn our
attention to spatial variability and study its impact
on the problem of locating base stations in a
whitespaces network. Here, we propose spectrum-aware
placement algorithms for whitespaces, which account for
this spatial variability along with key parameters like
user density. We show that such algorithms clearly
outperform traditional placement algorithms and improve
network coverage in this band",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Deb:2015:LBU,
author = "Supratim Deb and Pantelis Monogioudis",
title = "Learning-based uplink interference management in
{$4$G} {LTE} cellular systems",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "398--411",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300448",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "LTE's uplink (UL) efficiency critically depends on how
the interference across different cells is controlled.
The unique characteristics of LTE's modulation and UL
resource assignment poses considerable challenges in
achieving this goal because most LTE deployments have
1:1 frequency reuse, and the uplink interference can
vary considerably across successive time-slots. In this
paper, we propose LeAP, a measurement data-driven
machine learning paradigm for power control to manage
uplink interference in LTE. The data-driven approach
has the inherent advantage that the solution adapts
based on network traffic, propagation, and network
topology, which is increasingly heterogeneous with
multiple cell-overlays. LeAP system design consists of
the following components: (1) design of user equipment
(UE) measurement statistics that are succinct, yet
expressive enough to capture the network dynamics, and
(2) design of two learning-based algorithms that use
the reported measurements to set the power control
parameters and optimize the network performance. LeAP
is standards-compliant and can be implemented in a
centralized self-organized networking (SON) server
resource (cloud). We perform extensive evaluations
using radio network plans from a real LTE network
operational in a major metro area in the US. Our
results show that, compared to existing approaches,
LeAP provides $ 4.9 \times $ gain in the 20th
percentile of user data rate, $ 3.25 \times $ gain in
median data rate.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Papageorgiou:2015:DRR,
author = "George Papageorgiou and Shailendra Singh and Srikanth
V. Krishnamurthy and Ramesh Govindan and Tom {La
Porta}",
title = "A distortion-resistant routing framework for video
traffic in wireless multihop networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "412--425",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2302815",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Traditional routing metrics designed for wireless
networks are application-agnostic. In this paper, we
consider a wireless network where the application flows
consist of video traffic. From a user perspective,
reducing the level of video distortion is critical. We
ask the question ``Should the routing policies change
if the end-to-end video distortion is to be
minimized?'' Popular link-quality-based routing metrics
(such as ETX) do not account for dependence (in terms
of congestion) across the links of a path; as a result,
they can cause video flows to converge onto a few paths
and, thus, cause high video distortion. To account for
the evolution of the video frame loss process, we
construct an analytical framework to, first, understand
and, second, assess the impact of the wireless network
on video distortion. The framework allows us to
formulate a routing policy for minimizing distortion,
based on which we design a protocol for routing video
traffic. We find via simulations and testbed
experiments that our protocol is efficient in reducing
video distortion and minimizing the user experience
degradation.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cohen:2015:EAP,
author = "Reuven Cohen and Guy Grebla",
title = "Efficient allocation of periodic feedback channels in
broadband wireless networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "426--436",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2298052",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Advanced wireless technologies such as
multiple-input-multiple-output (MIMO) require each
mobile station (MS) to send a lot of feedback to the
base station. This periodic feedback consumes much of
the uplink bandwidth. This expensive bandwidth is very
often viewed as a major obstacle to the deployment of
MIMO and other advanced closed-loop wireless
technologies. This paper is the first to propose a
framework for efficient allocation of periodic feedback
channels to the nodes of a wireless network. Several
relevant optimization problems are defined and
efficient algorithms for solving them are presented. A
scheme for deciding when the base station (BS) should
invoke each algorithm is also proposed and shown
through simulations to perform very well.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xie:2015:MNW,
author = "Liguang Xie and Yi Shi and Y. Thomas Hou and Wenjing
Lou and Hanif D. Sherali and Scott F. Midkiff",
title = "Multi-node wireless energy charging in sensor
networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "437--450",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2303979",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Wireless energy transfer based on magnetic resonant
coupling is a promising technology to replenish energy
to a wireless sensor network (WSN). However, charging
sensor nodes one at a time poses a serious scalability
problem. Recent advances in magnetic resonant coupling
show that multiple nodes can be charged at the same
time. In this paper, we exploit this multi-node
wireless energy transfer technology and investigate
whether it is a scalable technology to address energy
issues in a WSN. We consider a wireless charging
vehicle (WCV) periodically traveling inside a WSN and
charging sensor nodes wirelessly. Based on charging
range of the WCV, we propose a cellular structure that
partitions the two-dimensional plane into adjacent
hexagonal cells. We pursue a formal optimization
framework by jointly optimizing traveling path, flow
routing, and charging time. By employing discretization
and a novel Reformulation-Linearization Technique
(RLT), we develop a provably near-optimal solution for
any desired level of accuracy. Through numerical
results, we demonstrate that our solution can indeed
address the charging scalability problem in a WSN.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cheng:2015:EYJ,
author = "Chih-Chuan Cheng and Pi-Cheng Hsiu",
title = "Extend your journey: considering signal strength and
fluctuation in location-based applications",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "451--464",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2301171",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Reducing the communication energy is essential to
facilitate the growth of emerging mobile applications.
In this paper, we introduce signal strength into
location-based applications to reduce the energy
consumption of mobile devices for data reception.
First, we model the problem of data fetch scheduling,
with the objective of minimizing the energy required to
fetch location-based information without impacting the
application's semantics adversely. To solve the
fundamental problem, we propose a dynamic-programming
algorithm and prove its optimality in terms of energy
savings. Then, we perform postoptimal analysis to
explore the tolerance of the algorithm to signal
strength fluctuations. Finally, based on the algorithm,
we consider implementation issues. We have also
developed a virtual tour system integrated with
existing Web applications to validate the
practicability of the proposed concept. The results of
experiments conducted based on real-world case studies
are very encouraging and demonstrate the applicability
of the proposed algorithm toward signal strength
fluctuations.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Cui:2015:FFC,
author = "Yong Cui and Lian Wang and Xin Wang and Hongyi Wang
and Yining Wang",
title = "{FMTCP}: a fountain code-based multipath transmission
control protocol",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "465--478",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300140",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Ideally, the throughput of a Multipath TCP (MPTCP)
connection should be as high as that of multiple
disjoint single-path TCP flows. In reality, the
throughput of MPTCP is far lower than expected. In this
paper, we conduct an extensive simulation-based study
on this phenomenon, and the results indicate that a
subflow experiencing high delay and loss severely
affects the performance of other subflows, thus
becoming the bottleneck of the MPTCP connection and
significantly degrading the aggregate goodput. To
tackle this problem, we propose Fountain code-based
Multipath TCP (FMTCP), which effectively mitigates the
negative impact of the heterogeneity of different
paths. FMTCP takes advantage of the random nature of
the fountain code to flexibly transmit encoded symbols
from the same or different data blocks over different
subflows. Moreover, we design a data allocation
algorithm based on the expected packet arriving time
and decoding demand to coordinate the transmissions of
different subflows. Quantitative analyses are provided
to show the benefit of FMTCP. We also evaluate the
performance of FMTCP through ns-2 simulations and
demonstrate that FMTCP outperforms IETF-MPTCP, a
typical MPTCP approach, when the paths have diverse
loss and delay in terms of higher total goodput, lower
delay, and jitter. In addition, FMTCP achieves high
stability under abrupt changes of path quality.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Barghi:2015:EAA,
author = "Sanaz Barghi and Hamid Jafarkhani",
title = "Exploiting asynchronous amplify-and-forward relays to
enhance the performance of {IEEE} 802.11 networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "479--490",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300147",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Cooperative communication is a promising path to
recover from performance anomaly in IEEE 802.11
networks. However, a simple solution for employing
multiple relays to enhance the relay link quality has
not been proposed. The main obstacle for multiple relay
utilization in distributed networks is that
synchronizing relay transmissions requires huge
signaling overhead. In this paper, we investigate the
problem from both a physical-layer and MAC-layer point
of view. In the physical layer, a simple, practical
solution that provides diversity gain from asynchronous
relay transmissions is introduced. In the MAC layer, a
rate adaptation algorithm, RA-ARF, that takes the extra
relay path into account is discussed, and R-MAC is
designed to utilize relays in IEEE 802.11 networks. Our
simulation results show considerable improvement in
network performance using R-MAC.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Ye:2015:ABN,
author = "Tong Ye and Tony T. Lee and Weisheng Hu",
title = "{AWG}-based non-blocking {Clos} networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "491--504",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2300899",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "The three-stage Clos networks remain the most popular
solution to many practical switching systems to date.
The aim of this paper is to show that the modular
structure of Clos networks is invariant with respect to
the technological changes. Due to the wavelength
routing property of arrayed-waveguide gratings (AWGs),
non-blocking and contention-free
wavelength-division-multiplexing (WDM) switches require
that two calls carried by the same wavelength must be
connected by separated links; otherwise, they must be
carried by different wavelengths. Thus, in addition to
the non-blocking condition, the challenge of the design
of AWG-based multistage switching networks is to scale
down the wavelength granularity and to reduce the
conversion range of tunable wavelength converters
(TWCs). We devise a logic scheme to partition the WDM
switch network into wavelength autonomous cells and
show that the wavelength scalability problem can be
solved by recursively reusing similar, but smaller, set
of wavelengths in different cells. Furthermore, we
prove that the rearrangeably non-blocking (RNB)
condition and route assignments in these AWG-based
three-stage networks are consistent with that of
classical Clos networks. Thus, the optimal AWG-based
non-blocking Clos networks also can achieve 100\%
utilization when all input and output wavelength
channels are busy.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Huang:2015:AOT,
author = "Po-Kai Huang and Xiaojun Lin",
title = "Achieving optimal throughput utility and low delay
with {CSMA}-like algorithms: a virtual multichannel
approach",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "505--518",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2301170",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Carrier-sense multiple access (CSMA) algorithms have
recently received significant interests in the
literature for designing wireless control algorithms.
CSMA algorithms incur low complexity and can achieve
the optimal capacity under certain assumptions.
However, CSMA algorithms suffer the starvation problem
and incur large delay that may grow exponentially with
the network size. In this paper, our goal is to develop
a new algorithm that can provably achieve high
throughput utility and low delay with low complexity.
Toward this end, we propose a new CSMA-like algorithm,
called Virtual-Multi-Channel CSMA (VMC-CSMA), that can
dramatically reduce delay. The key idea of VMC-CSMA to
avoid the starvation problem is to use multiple virtual
channels (which emulate a multichannel system) and
compute a good set of feasible schedules simultaneously
(without constantly switching/recomputing schedules).
Under the protocol interference model and a single-hop
utility-maximization setting, VMC-CSMA can approach
arbitrarily close-to-optimal system utility with both
the number of virtual channels and the computation
complexity increasing logarithmically with the network
size. Furthermore, once VMC-CSMA converges to the
steady state, we can show that under certain
assumptions on the utility functions and the topology,
both the expected packet delay and the tail
distribution of the head-of-line (HOL) waiting time at
each link can be bounded independently of the network
size. Our simulation results confirm that VMC-CSMA
algorithms indeed achieve both high throughput utility
and low delay with low-complexity operations",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Xue:2015:CAD,
author = "Dongyue Xue and Robert Murawski and Eylem Ekici",
title = "Capacity achieving distributed scheduling with finite
buffers",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "519--532",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2303093",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we propose a distributed cross-layer
scheduling algorithm for wireless networks with
single-hop transmissions that can guarantee finite
buffer sizes and meet minimum utility requirements. The
algorithm can achieve a utility arbitrarily close to
the optimal value with a tradeoff in the buffer sizes.
The finite buffer property is not only important from
an implementation perspective, but, along with the
algorithm, also yields superior delay performance. In
addition, another extended algorithm is provided to
help construct the upper bounds of per-flow average
packet delays. A novel structure of Lyapunov function
is employed to prove the utility optimality of the
algorithm with the introduction of novel virtual queue
structures. Unlike traditional back-pressure-based
optimal algorithms, our proposed algorithm does not
need centralized computation and achieves fully local
implementation without global message passing. Compared
to other recent throughput/utility-optimal CSMA
distributed algorithms, we illustrate through rigorous
numerical and implementation results that our proposed
algorithm achieves far better delay performance for
comparable throughput/utility levels.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Kuo:2015:MSS,
author = "Tung-Wei Kuo and Kate Ching-Ju Lin and Ming-Jer Tsai",
title = "Maximizing submodular set function with connectivity
constraint: theory and application to networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "533--546",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2301816",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we investigate the wireless network
deployment problem, which seeks the best deployment of
a given limited number of wireless routers. We find
that many goals for network deployment, such as
maximizing the number of covered users, the size of the
coverage area, or the total throughput of the network,
can be modeled with a submodular set function.
Specifically, given a set of routers, the goal is to
find a set of locations S, each of which is equipped
with a router, such that S maximizes a predefined
submodular set function. However, this deployment
problem is more difficult than the traditional maximum
submodular set function problem, e.g., the maximum
coverage problem, because it requires all the deployed
routers to form a connected network. In addition,
deploying a router in different locations might consume
different costs. To address these challenges, this
paper introduces two approximation algorithms, one for
homogeneous deployment cost scenarios and the other for
heterogeneous deployment cost scenarios. Our
simulations, using synthetic data and real traces of
census in Taipei, Taiwan, show that the proposed
algorithms achieve better performances than other
heuristics.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Rossi:2015:PHM,
author = "Lorenzo Rossi and Jacob Chakareski and Pascal Frossard
and Stefania Colonnese",
title = "A {Poisson} hidden {Markov} model for multiview video
traffic",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "547--558",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2303162",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Multiview video has recently emerged as a means to
improve user experience in novel multimedia services.
We propose a new stochastic model to characterize the
traffic generated by a Multiview Video Coding (MVC)
variable bit-rate source. To this aim, we resort to a
Poisson hidden Markov model (P-HMM), in which the first
(hidden) layer represents the evolution of the video
activity and the second layer represents the frame
sizes of the multiple encoded views. We propose a
method for estimating the model parameters in long MVC
sequences. We then present extensive numerical
simulations assessing the model's ability to produce
traffic with realistic characteristics for a general
class of MVC sequences. We then extend our framework to
network applications where we show that our model is
able to accurately describe the sender and receiver
buffers behavior in MVC transmission. Finally, we
derive a model of user behavior for interactive view
selection, which, in conjunction with our
traffic-model, is able to accurately predict actual
network load in interactive multiview services.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Banaei:2015:ASG,
author = "Armin Banaei and Daren B. H. Cline and Costas N.
Georghiades and Shuguang Cui",
title = "On asymptotic statistics for geometric routing schemes
in wireless ad hoc networks",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "559--573",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2303477",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "In this paper, we present a methodology employing
statistical analysis and stochastic geometry to study
geometric routing schemes in wireless ad hoc networks.
In particular, we analyze the network-layer performance
of one such scheme, the random $ 1 / 2 $ disk routing
scheme, which is a localized geometric routing scheme
in which each node chooses the next relay randomly
among the nodes within its transmission range and in
the general direction of the destination. The
techniques developed in this paper enable us to
establish the asymptotic connectivity and the
convergence results for the mean and variance of the
routing path lengths generated by geometric routing
schemes in random wireless networks. In particular, we
approximate the progress of the routing path toward the
destination by a Markov process and determine the
sufficient conditions that ensure the asymptotic
connectivity for both dense and large-scale ad hoc
networks deploying the random $ 1 / 2 $ disk routing
scheme. Furthermore, using this Markov
characterization, we show that the expected length (hop
count) of the path generated by the random $ 1 / 2 $
disk routing scheme normalized by the length of the
path generated by the ideal direct-line routing,
converges to $ 3 \pi / 4 $ asymptotically. Moreover, we
show that the variance-to-mean ratio of the routing
path length converges $ 9 \pi^2 / 64 - 1 $ to
asymptotically. Through simulation, we show that the
aforementioned asymptotic statistics are in fact quite
accurate even for finite granularity and size of the
network.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Supittayapornpong:2015:QIM,
author = "Sucha Supittayapornpong and Michael J. Neely",
title = "Quality of information maximization for wireless
networks via a fully separable quadratic policy",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "574--586",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2304293",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "An information collection problem in a wireless
network with random events is considered. Wireless
devices report on each event using one of multiple
reporting formats. Each format has a different quality
and uses different data lengths. Delivering all data in
the highest-quality format can overload system
resources. The goal is to make intelligent format
selection and routing decisions to maximize
time-averaged information quality subject to network
stability. Lyapunov optimization theory can be used to
solve such a problem by repeatedly minimizing the
linear terms of a quadratic drift-plus-penalty
expression. To reduce delays, this paper proposes a
novel extension of this technique that preserves the
quadratic nature of the drift minimization while
maintaining a fully separable structure. In addition,
to avoid high queuing delay, paths are restricted to at
most 2 hops. The resulting algorithm can push average
information quality arbitrarily close to optimum, with
a tradeoff in queue backlog. The algorithm compares
favorably to the basic drift-plus-penalty scheme in
terms of backlog and delay.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Picu:2015:DMF,
author = "Andreea Picu and Thrasyvoulos Spyropoulos",
title = "{DTN-meteo}: forecasting the performance of {DTN}
protocols under heterogeneous mobility",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "587--602",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2301376",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Opportunistic or delay-tolerant networks (DTNs) may be
used to enable communication in case of failure or lack
of infrastructure (disaster, censorship, remote areas)
and to complement existing wireless technologies
(cellular, WiFi). Wireless peers communicate when in
contact, forming an impromptu network, whose
connectivity graph is highly dynamic and only partly
connected. In this harsh environment, communication
algorithms are mostly local search heuristics, choosing
a solution among the locally available ones.
Furthermore, they are routinely evaluated through
simulations only, as they are hard to model
analytically. Even when more insight is sought from
models, these usually assume homogeneous node meeting
rates, thereby ignoring the attested heterogeneity and
nontrivial structure of human mobility. We propose
DTN-Meteo, a new unified analytical model that maps an
important class of DTN optimization problems over
heterogeneous mobility/contact models into a Markov
chain traversal over the relevant solution space.
(Heterogeneous) meeting probabilities between different
pairs of nodes dictate the chain's transition
probabilities and determine neighboring solutions.
Local optimization algorithms can accept/reject
candidate transitions (deterministically or randomly),
thus ``modulating'' the above transition probabilities.
We apply our model to two example problems: routing and
content placement. We predict the performance of
state-of-the-art algorithms (SimBet, BubbleRap) in
various real and synthetic mobility scenarios and show
that surprising precision can be achieved against
simulations, despite the complexity of the problems and
diversity of settings. To our best knowledge, this is
the first analytical work that can accurately predict
performance for utility-based algorithms and
heterogeneous node contact rates.",
acknowledgement = ack-nhfb,
fjournal = "IEEE\slash ACM Transactions on Networking",
journal-URL = "http://portal.acm.org/browse_dl.cfm?idx=J771",
}
@Article{Wu:2015:WHS,
author = "Zhenyu Wu and Zhang Xu and Haining Wang",
title = "Whispers in the hyper-space: high-bandwidth and
reliable covert channel attacks inside the cloud",
journal = j-IEEE-TRANS-NETWORKING,
volume = "23",
number = "2",
pages = "603--614",
month = apr,
year = "2015",
CODEN = "IEANEP",
DOI = "https://doi.org/10.1109/TNET.2014.2304439",
ISSN = "1063-6692 (print), 1558-2566 (electronic)",
ISSN-L = "1063-6692",
bibdate = "Fri Aug 28 06:01:29 MDT 2015",
bibsource = "http://portal.acm.org/;
https://www.math.utah.edu/pub/tex/bib/ieeetransnetworking.bib",
abstract = "Privacy and information security in general are major
concerns that impede enterprise adaptation of shared or
public cloud computing. Specifically, the concern of
virtual machine (VM) physical co-residency stems from
the threat that hostile tenants can leverage various
forms of side channels (such as cache covert channels)
to exfiltrate sensitive information of victims on the
same physical system. However, on virtualized x86
systems, covert channel attacks have not yet proven to
be practical, and thus the threat is widely considered
a ``potential risk.'' In this paper, we present a novel
covert channel attack that is capable of high-bandwidth
and reliable data transmission in the cloud. We first
study the application of existing cache channel