Last update:
Sat Nov 23 17:07:15 MST 2024
Mark B. Abbott and
Larry L. Peterson A language-based approach to protocol
implementation . . . . . . . . . . . . . 4--19
P. Venkat Rangan and
Harrick M. Vin and
Srinivas Ramanathan Communication architectures and
algorithms for media mixing in
multimedia conferences . . . . . . . . . 20--30
V. Ramaswami and
Jonathan L. Wang Analysis of the link error monitoring
protocols in the common channel
signaling network . . . . . . . . . . . 31--47
Clark Wang and
Mischa Schwartz Fault detection with multiple observers 48--55
Deborah Estrin and
Martha Steenstrup and
Gene Tsudik A protocol for route establishment and
packet forwarding across multidomain
Internets . . . . . . . . . . . . . . . 56--70
Mark W. Garrett and
Martin Vetterli Joint source/channel coding of
statistically multiplexed real-time
services on packet networks . . . . . . 71--80
Pierre Humblet and
Amit Bhargava and
Michael G. Hluchyj Ballot theorems applied to the transient
analysis of nD/D/1 queues . . . . . . . 81--95
Oran Sharon and
Adrian Segall A simple scheme for slot reuse without
latency for a dual bus configuration . . 96--104
Shun-Ping Chung and
Arik Kashper and
Keith W. Ross Computing approximate blocking
probabilities for large loss networks
with state-dependent routing . . . . . . 105--115
Raymond E. Miller and
Sanjoy Paul On the generation of minimal-length
conformance tests for communication
protocols . . . . . . . . . . . . . . . 116--129
J. J. Garcia-Lunes-Aceves Loop-free routing using diffusing
computations . . . . . . . . . . . . . . 130--141
David X. Chen and
Jon W. Mark SCOQ: a fast packet switch with shared
concentration and output queueing . . . 142--151
Wen De Zhong and
Jaidev Kaniyil and
Y. Onozato A copy network with shared buffers for
large-scale multicast ATM switching . . 157--165
Subramanian Ramanathan and
Errol L. Lloyd Scheduling algorithms for multihop radio
networks . . . . . . . . . . . . . . . . 166--177
C. Murray Woodside and
R. Greg Franks Alternative software architectures for
parallel protocol execution with
synchronous IPC . . . . . . . . . . . . 178--186
Ariel Orda and
Raphael Rom and
Moshe Sidi Minimum delay routing in stochastic
networks . . . . . . . . . . . . . . . . 187--198
Christos Papadopoulos and
Gurudatta M. Parulkar Experimental evaluation of SUNOS IPC and
TCP/IP protocol implementation . . . . . 199--216
David M. Kristol and
David Lee and
Arun N. Netravali and
Krishan Sabnani A polynomial algorithm for gateway
generation from formal specifications 217--229
Qinglin Wang and
Victor S. Frost Efficient estimation of cell blocking
probability for ATM systems . . . . . . 230--235
Kin K. Leung and
Raymond W. Yeung and
Bhaskar Sengupta A credit manager for traffic regulation
in high-speed networks: a queueing
analysis . . . . . . . . . . . . . . . . 236--245
Srinivas Ramanathan and
P. Venkat Rangan Adaptive feedback techniques for
synchronized multimedia retrieval over
integrated networks . . . . . . . . . . 246--260
Richard J. Gibbens and
Frank P. Kelly and
Stephen R. E. Turner Dynamic routing in multiparented
networks . . . . . . . . . . . . . . . . 261--270
Mehran Bagheri and
Dennis T. Kong and
Wayne S. Holden and
Fernando C. Irizarry and
Derek D. Mahoney An STS-N byte-interleaving
multiplexer/scrambler and
demultiplexer/descrambler architecture
and its experimental OC-48
implementation . . . . . . . . . . . . . 282--285
Vachaspathi P. Kompella and
Joseph C. Pasquale and
George C. Polyzos Multicast routing for multimedia
communication . . . . . . . . . . . . . 286--292
Michael Devetsikiotis and
J. Keith Townsend Statistical optimization of dynamic
importance sampling parameters for
efficient simulation of communication
networks . . . . . . . . . . . . . . . . 293--305
Ilan Kessler and
Arvind Krishna On the cost of fairness in ring networks 306--313
Achille Pattavina and
Giacomo Bruzzi Analysis of input and output queueing
for nonblocking ATM switches . . . . . . 314--328
Anwar I. Elwalid and
Debasis Mitra Effective bandwidth of general Markovian
traffic sources and admission control of
high speed networks . . . . . . . . . . 329--343
Abhay K. Parekh and
Robert G. Gallager A generalized processor sharing approach
to flow control in integrated services
networks: the single-node case . . . . . 344--357
Hasan Ural and
Keqin Zhu Optimal length test sequence generation
using distinguishing sequences . . . . . 358--371
Opher Yaron and
Moshe Sidi Performance and stability of
communication networks via robust
exponential bounds . . . . . . . . . . . 372--385
Hosame Abu-Amara A fast topology maintenance algorithm
for high-bandwidth networks . . . . . . 386--394
Sally Floyd and
Van Jacobson Random early detection gateways for
congestion avoidance . . . . . . . . . . 397--413
Luping Liang and
Gerald W. Neufeld and
Samuel T. Chanson A name model for nested group
communication . . . . . . . . . . . . . 414--423
George Kesidis and
Jean Walrand and
Cheng-Shang Chang Effective bandwidths for multiclass
Markov fluids and other ATM sources . . 424--428
Craig Partridge and
Stephen Pink A faster UDP . . . . . . . . . . . . . . 429--440
Gerard R. Pieris and
Galen H. Sasaki A linear lightwave Benes network . . . . 441--445
Paul Skelly and
Mischa Schwartz and
Sudhir Dixit A histogram-based model for video
traffic behavior in an ATM multiplexer 446--459
André Girard and
Bernard Liau Dimensioning of adaptively routed
networks . . . . . . . . . . . . . . . . 460--468
Israel Cidon and
Inder S. Gopal and
Adrian Segall Connection establishment in high-speed
networks . . . . . . . . . . . . . . . . 469--481
Giuseppe Bianchi and
Jonathan S. Turner Improved queueing analysis of shared
buffer switching networks . . . . . . . 482--490
Michael P. Rumsewicz Analysis of the effects of SS7 message
discard schemes on call completion rates
during overload . . . . . . . . . . . . 491--502
Mohammad Ghanbari and
Charles J. Hughes Packing coded video signals into ATM
cells . . . . . . . . . . . . . . . . . 505--509
Ariel Orda and
Raphael Rom and
Nahum Shimkin Competitive routing in multiuser
communication networks . . . . . . . . . 510--521
San-qi Li and
Chia-Lin Hwang Queue response to input correlation
functions: discrete spectral analysis 522--533
M. Ajmone Marsan and
Andrea Bianco and
Emilio Leonardi and
Fabio Neri Topologies for wavelength-routing
all-optical networks . . . . . . . . . . 534--546
Steven H. Low and
Pravin P. Varaiya A new approach to service provisioning
in ATM networks . . . . . . . . . . . . 547--553
Chandramohan A. Thekkath and
Thu D. Nguyen and
Evelyn Moy and
Edward D. Lazowska Implementing network protocols at user
level . . . . . . . . . . . . . . . . . 554--565
Paolo Coppo and
Matteo D'Ambrosio and
Riccardo Melen Optimal cost/performance design of ATM
switches . . . . . . . . . . . . . . . . 566--575
Randall Landry and
Ioannis Stavrakakis Queueing study of a $3$-priority policy
with distinct service strategies . . . . 576--589
Deepinder P. Sidhu and
Howard Motteler and
Raghu Vallurupalli On testing hierarchies for protocols . . 590--599
Mark B. Abbott and
Larry L. Peterson Increasing network throughput by
integrating protocol layers . . . . . . 600--610
Ron Cocchi and
Scott Shenker and
Deborah Estrin and
Lixia Zhang Pricing in computer networks:
motivation, formulation, and example . . 614--627
Andrea Baiocchi and
Nicola Bléfari-Melazzi An error-controlled approximate analysis
of a stochastic fluid flow model applied
to an ATM multiplexer with heterogeneous
On-Off sources . . . . . . . . . . . . . 628--637
Xing Chen and
Jeremiah F. Hayes Access control in multicast packet
switching . . . . . . . . . . . . . . . 638--649
Matthias Kaiserswerth The Parallel Protocol Engine . . . . . . 650--663
Erik A. van Doorn and
Frans J. M. Panken Blocking probabilities in a loss system
with arrivals in geometrically
distributed batches and heterogeneous
service requirements . . . . . . . . . . 664--667
Limin Hu Distributed code assignments for CDMA
Packet Radio Network . . . . . . . . . . 668--677
San-qi Li and
Chia-Lin Hwang Queue response to input correlation
functions: continuous spectral analysis 678--692
Lotfi Benmohamed and
Semyon M. Meerkov Feedback control of congestion in packet
switching networks: the case of a single
congested node . . . . . . . . . . . . . 693--708
Duan-Shin Lee and
Bhaskar Sengupta Queueing analysis of a threshold based
priority scheme for ATM networks . . . . 709--717
Leonidas Georgiadis and
Roch Guérin and
Israel Cidon Throughput properties of fair policies
in ring networks . . . . . . . . . . . . 718--728
Frank Y. S. Lin Link set sizing for networks supporting
SMDS . . . . . . . . . . . . . . . . . . 729--739
Thomas F. La Porta and
Mischa Schwartz Performance analysis of MSP:
feature-rich high-speed transport
protocol . . . . . . . . . . . . . . . . 740--753
Will E. Leland and
Murad S. Taqqu and
Walter Willinger and
Daniel V. Wilson On the self-similar nature of Ethernet
traffic (extended version) . . . . . . . 1--15
A. J. McAuley Weighted sum codes for error detection
and their comparison with existing codes 16--22
Imrich Chlamtac and
András Faragó Making transmission schedules immune to
topology changes in multi-hop packet
radio networks . . . . . . . . . . . . . 23--29
Zsehong Tsai and
Wen-der Wang and
Chien-Hwa Chiou and
Jin-Fu Chang and
Lung-Sing Liang Performance analysis of two echo control
designs in ATM networks . . . . . . . . 30--39
Tsong-Ho Wu A passive protected self-healing mesh
network architecture and applications 40--52
Hong-Dah Sheng and
San-Qi Li Spectral analysis of packet loss rate at
a statistical multiplexer for multimedia
services . . . . . . . . . . . . . . . . 53--65
Gerard Tel and
Ephraim Korach and
Shmuel Zaks Synchronizing ABD networks . . . . . . . 66--69
Kumar N. Sivarajan and
Rajiv Ramaswami Lightwave networks based on de Bruijn
graphs . . . . . . . . . . . . . . . . . 70--79
Jane M. Simmons and
Robert G. Gallager Design of error detection scheme for
class C service in ATM . . . . . . . . . 80--88
Oran Sharon and
Adrian Segall On the efficiency of slot reuse in the
Dual Bus configuration . . . . . . . . . 89--100
Gerard R. Pieris and
Galen H. Sasaki Scheduling transmissions in WDM
broadcast-and-select networks . . . . . 105--110
Julio Escobar and
Craig Partridge and
Debra Deutsch Flow synchronization protocol . . . . . 111--121
Sally Floyd and
Van Jacobson The synchronization of periodic routing
messages . . . . . . . . . . . . . . . . 122--136
Abhay K. Parekh and
Robert G. Gallagher A generalized processor sharing approach
to flow control in integrated services
networks: the multiple node case . . . . 137--150
Marco Ajmone Marsan and
Andrea Bianco and
Luigi Ciminiera and
Riccardo Sisto and
Adriano Valenzano A LOTOS extension for the performance
analysis of distributed systems . . . . 151--165
Chung-Ju Chang and
Tian-Tsair Su and
Yueh-Yiing Chiang Analysis of a cutoff priority cellular
radio system with finite queueing and
reneging/dropping . . . . . . . . . . . 166--175
David M. Lucantoni and
Marcel F. Neuts and
Amy R. Reibman Methods for performance evaluation of
VBR video traffic models . . . . . . . . 176--180
Daniel S. Omundsen and
A. Roger Kaye and
Samy A. Mahmoud A pipelined, multiprocessor architecture
for a connectionless server for
broadband ISDN . . . . . . . . . . . . . 181--192
George W. Hart and
Samir G. Kelekar Automated repair of complex systems by
fault compensation . . . . . . . . . . . 193--205
Seung Ho Hong Approximate analysis of timer-controlled
priority scheme in the single-service
token-passing systems . . . . . . . . . 206--215
Aura Ganz and
Xudong Wang Efficient algorithm for virtual topology
design in multihop lightwave networks 217--225
Inder Gopal and
Roch Guérin Network transparency: the plaNET
approach . . . . . . . . . . . . . . . . 226--239
Israel Cidon and
Roch Guérin and
Asad Khamisy On protective buffer policies . . . . . 240--246
Piera Barcaccia and
Maurizio A. Bonuccelli Polynomial time optimal algorithms for
time slot assignment of variable
bandwidth systems . . . . . . . . . . . 247--251
Dragomir D. Dimitrijevic and
Basil Maglaris and
Robert R. Boorstyn Routing in multidomain networks . . . . 252--262
Reuven Cohen ``Session swapping'': a new approach for
optimal bandwidth sharing of ring
circuit switched channels . . . . . . . 263--268
Oran Sharon and
Adrian Segall Schemes for slot reuse in CRMA . . . . . 269--278
Terence D. Todd The token grid network . . . . . . . . . 279--287
Jae W. Byun and
Tony T. Lee The design and analysis of an ATM
multicast switch with adaptive traffic
controller . . . . . . . . . . . . . . . 288--298
Emmanouel A. Varvarigos and
Dimitri P. Bertsekas Performance of hypercube routing schemes
with or without buffering . . . . . . . 299--311
Vern Paxson Empirically derived analytic models of
wide-area TCP connections . . . . . . . 316--336
Allen R. and
J. r. Bonde and
Sumit Ghosh A comparative study of fuzzy versus
``fixed'' thresholds for robust queue
management in cell-switching networks 337--344
Philip P. To and
Tak-Shing P. Yum and
Yiu-Wing Leung Multistar implementation of expandable
shufflenets . . . . . . . . . . . . . . 345--351
Martina Zitterbart and
Ahmed N. Tantawy and
Dimitrios N. Serpanos A high performance transparent bridge 352--362
Jon M. Peha and
Fouad A. Tobagi Analyzing the fault tolerance of
double-loop networks . . . . . . . . . . 363--373
Leandros Tassiulas and
Yao Chung Hung and
Shivendra S. Panwar Optimal buffer control during congestion
in an ATM network node . . . . . . . . . 374--386
Catherine Rosenberg and
Bruno Laguë A heuristic framework for source
policing in ATM networks . . . . . . . . 387--397
Stefano Gianatti and
Achille Pattavina Performance analysis of ATM Banyan
networks with shared queueing --- part
I: random offered traffic . . . . . . . 398--410
Achille Pattavina and
Stefano Gianatti Performance analysis of ATM Banyan
networks with shared queueing --- part
II: correlated/unbalanced offered
traffic . . . . . . . . . . . . . . . . 411--424
Michael F. Schwartz and
Calton Pu Applying an information gathering
architecture to Netfind: a white pages
tool for a changing and growing Internet 426--439
Paul D. Amer and
Christophe Chassot and
Thomas J. Connolly and
Michel Diaz and
Phillip Conrad Partial-order transport service for
multimedia and other applications . . . 440--456
Raymond E. Miller and
Sanjoy Paul Structural analysis of protocol
specifications and generation of maximal
fault coverage conformance test
sequences . . . . . . . . . . . . . . . 457--470
Richard O. LaMaire and
Dimitrios N. Serpanos Two-dimensional round-robin schedulers
for packet switches with multiple input
queues . . . . . . . . . . . . . . . . . 471--482
Gilbert M. Lundy and
H. Alphan Tipici Specification and analysis of the SNR
high-speed transport protocol . . . . . 483--496
Tsern-Huei Lee and
Jin-Jye Chou Diagnosis of single faults in bitonic
sorters . . . . . . . . . . . . . . . . 497--507
Mohamed Abdelaziz and
Ioannis Stavrakakis Some optimal traffic regulation schemes
for ATM networks: a Markov decision
approach . . . . . . . . . . . . . . . . 508--519
Dimitris Logothetis and
Kishor S. Trivedi Reliability analysis of the double
counter-rotating ring with concentrator
attachments . . . . . . . . . . . . . . 520--532
James V. Luciani and
C. Y. Roger Chen An analytical model for partially
blocking finite-buffered switching
networks . . . . . . . . . . . . . . . . 533--540
Reuven Cohen and
Yoram Ofek Self-termination mechanism for label
swapping routing . . . . . . . . . . . . 541--545
Yiu-Wing Leung and
Tak-Shing Yum A modular multirate video distribution
system: design and dimensioning . . . . 549--557
Debasis Mitra and
John A. Morrison Erlang capacity and uniform
approximations for shared unbuffered
resources . . . . . . . . . . . . . . . 558--570
Hyong S. Kim Design and performance of Multinet
switch: a multistage ATM switch
architecture with partially shared
buffers . . . . . . . . . . . . . . . . 571--580
Imrich Chlamtac and
András Faragó and
Tao Zhang Optimizing the system of virtual paths 581--587
Chun-Chong Huang and
Alberto Leon-Garcia Separation principle of dynamic
transmission and enqueueing priorities
for real- and nonreal-time traffic in
ATM multiplexers . . . . . . . . . . . . 588--601
Jacob Sharony The universality of multidimensional
switching networks . . . . . . . . . . . 602--612
Michael P. Rumsewicz and
Donald E. Smith A comparison of SS7 congestion control
options during mass call-in situations 1--9
San-Qi Li and
Song Chong and
Chia-Lin Hwang Link capacity allocation and network
control by filtered input rate in
high-speed networks . . . . . . . . . . 10--25
Wei-Tsong Lee and
Ling-Yang Kung Binary addressing and routing schemes in
the Manhattan street network . . . . . . 26--30
Ray Bird and
Inder Gopal and
Amir Herzberg and
Phil Janson and
Shay Kutten and
Refik Molva and
Moti Yung The KryptoKnight family of light-weight
protocols for authentication and key
distribution . . . . . . . . . . . . . . 31--41
Judah Levine An algorithm to synchronize the time of
a computer to universal time . . . . . . 42--50
Thomas Gutekunst and
Daniel Bauer and
Germano Caronni and
Bernhard Plattner and
Hasan A distributed and policy-free
general-purpose shared window system . . 51--62
P. C. Wong and
M. S. Yeung Design and analysis of a novel fast
packet switch: pipeline Banyan . . . . . 63--69
Jeong Gyu Lee and
Byeong Gi Lee A new distribution network based on
controlled switching elements and its
applications . . . . . . . . . . . . . . 70--81
Zhen Liu and
Don Towsley Burst reduction properties of
rate-control throttles: downstream queue
behavior . . . . . . . . . . . . . . . . 82--90
Christopher Ward and
Cheong H. Choi and
Thomas F. Hain A data link control protocol for LEO
satellite networks providing a reliable
datagram service . . . . . . . . . . . . 91--103
Paul Barker An analysis of user input to an X.500
white pages directory service . . . . . 112--125
H. Jonathan Chao and
Byeong-Seog Choe Design and analysis of a large-scale
multicast output buffered ATM switch . . 126--138
Hyong W. Lee and
Jon W. Mark Capacity allocation in statistical
multiplexing of ATM sources . . . . . . 139--151
Wen-Huei Chen and
Hasan Ural Synchronizable test sequences based on
multiple UIO sequences . . . . . . . . . 152--157
David A. Levine and
Ian F. Akyildiz PROTON: a media access control protocol
for optical networks with star topology 158--168
Yoram Ofek and
Moti Yung METANET: principles of an arbitrary
topology LAN . . . . . . . . . . . . . . 169--180
P. S. Min and
H. Saidi and
M. V. Hegde A nonblocking architecture for broadband
multichannel switching . . . . . . . . . 181--198
Myung J. Lee and
David S. Ahn Cell loss analysis and design trade-offs
of nonblocking ATM switches with
nonuniform traffic . . . . . . . . . . . 199--210
George N. Rouskas and
Mostafa H. Ammar Analysis and optimization of
transmission schedules for single-hop
WDM networks . . . . . . . . . . . . . . 211--221
Peter Farka\us Comments on ``Weighted sum codes for
error detection and their comparison
with existing codes'' . . . . . . . . . 222--223
Vern Paxson and
Sally Floyd Wide area traffic: the failure of
Poisson modeling . . . . . . . . . . . . 226--244
David L. Mills Improved algorithms for synchronizing
computer network clocks . . . . . . . . 245--254
A. Udaya Shankar and
David Lee Minimum-latency transport protocols with
modulo-$N$ . . . . . . . . . . . . . . . 255--268
Rajesh K. Pankaj and
Robert G. Gallager Wavelength requirements of all-optical
networks . . . . . . . . . . . . . . . . 269--280
Zhensheng Zhang and
Anthony S. Acampora A heuristic wavelength assignment
algorithm for multihop WDM networks with
wavelength routing and wavelength re-use 281--288
H. Saidi and
P. S. Min and
M. V. Hegde A new structural property of statistical
data forks . . . . . . . . . . . . . . . 289--298
Xi-Ren Cao and
Don Towsley A performance model for ATM switches
with general packet length distributions 299--309
David McMillan Delay analysis of a cellular mobile
priority queueing system . . . . . . . . 310--319
Reuven Cohen and
Yoram Ofek and
Adrian Segall A new label-based source routing for
multi-ring networks . . . . . . . . . . 320--328
Amy R. Reibman and
Arthur W. Berger Traffic descriptors for VBR video
teleconferencing over ATM networks . . . 329--339
Moncef Hamdaoui and
Parameswaran Ramanathan Selection of timed token protocol
parameters to guarantee message
deadlines . . . . . . . . . . . . . . . 340--351
Chin-Tau Lea and
Anwar Alyatama Bandwidth quantization and states
reduction in the broadband ISDN . . . . 352--360
Sally Floyd and
Van Jacobson Link-sharing and resource management
models for packet networks . . . . . . . 365--386
Ellen Witte Zegura Evaluating blocking probability in
generalized connectors . . . . . . . . . 387--398
Norival R. Figueira and
Joseph Pasquale An upper bound on delay for the
VirtualClock service discipline . . . . 399--408
Kjersti Moldeklev and
Per Gunningberg How a large ATM MTU causes deadlocks in
TCP data transfers . . . . . . . . . . . 409--422
Takis Konstantopoulos and
Venkat Anantharam Optimal flow control schemes that
regulate the burstiness of traffic . . . 423--432
Guang-Liang Li and
Patrick W. Dowd An analysis of network performance
degradation induced by workload
fluctuations . . . . . . . . . . . . . . 433--440
Alan A. Bertossi and
Maurizio A. Bonuccelli Code assignment for hidden terminal
interference avoidance in multihop
packet radio networks . . . . . . . . . 441--449
Kyeong Soo Kim and
Byeong Gi Lee Three-level traffic shaper and its
application to source clock frequency
recovery for VBR services in ATM
networks . . . . . . . . . . . . . . . . 450--458
Krishna Bala and
Thomas E. Stern and
David Simchi-Levi and
Kavita Bala Routing in a linear lightwave network 459--469
Jason Iness and
Subrata Banerjee and
Biswanath Mukherjee GEMNET: a generalized,
shuffle-exchange-based, regular,
scalable, modular, multihop, WDM
lightwave network . . . . . . . . . . . 470--476
Feiling Jia and
Biswanath Mukherjee and
Jason Iness Scheduling variable-length messages in a
single-hop multichannel local lightwave
network . . . . . . . . . . . . . . . . 477--488
Rajiv Ramaswami and
Kumar N. Sivarajan Routing and wavelength assignment in
all-optical networks . . . . . . . . . . 489--500
Amit Gupta and
Domenico Ferrari Resource partitioning for real-time
communication . . . . . . . . . . . . . 501--508
Joseph Bannister and
Flaminio Borgonovo and
Luigi Fratta and
Mario Gerla A performance model of deflection
routing in multibuffer networks with
nonuniform traffic . . . . . . . . . . . 509--520
Arif Merchant and
Bhaskar Sengupta Assignment of cells to switches in PCS
networks . . . . . . . . . . . . . . . . 521--526
Krishnan Padmanabhan An efficient architecture for
fault-tolerant ATM switches . . . . . . 527--537
Donald E. Smith Ensuring robust call throughput and
fairness for SCP overload controls . . . 538--548
Ming H. Chan and
John P. Princen Prioritized statistical multiplexing of
PCM sources . . . . . . . . . . . . . . 549--559
Edmundo de Souza e. Silva and
H. Richard Gail and
Richard R. Muntz Polling systems with server timeouts and
their application to token passing
networks . . . . . . . . . . . . . . . . 560--575
Leandros Tassiulas and
Jinoo Joung Performance measures and scheduling
policies in ring networks . . . . . . . 576--584
Gagan L. Choudhury and
Kin K. Leung and
Ward Whitt An inversion algorithm to compute
blocking probabilities in loss networks
with state-dependent rates . . . . . . . 585--601
Sem C. Borst and
Onno J. Boxma and
Hanoch Levy The use of service limits for efficient
operation of multistation single-medium
communication systems . . . . . . . . . 602--612
Whay Chiou Lee and
Pierre A. Humblet Space-time characteristics of ALOHA
protocols in high-speed bidirectional
bus networks . . . . . . . . . . . . . . 613--622
Ren-Hung Hwang and
James F. Kurose and
Don Towsley On-call processing delay in high speed
networks . . . . . . . . . . . . . . . . 628--639
David C. Feldmeier Fast software implementation of error
detection codes . . . . . . . . . . . . 640--651
H. Jonathan Chao and
Necdet Uzun An ATM queue manager handling multiple
delay and loss priorities . . . . . . . 652--659
Guo-Liang Wu and
Jon W. Mark A buffer allocation scheme for ATM
networks: complete sharing based on
virtual partition . . . . . . . . . . . 660--670
Hemant Kanakia and
Partho P. Mishra and
Amy R. Reibman An adaptive congestion control scheme
for real time packet video transport . . 671--682
Geoffrey G. Xie and
Simon S. Lam Delay guarantee of virtual clock server 683--689
Jianxu Shi and
John P. Fonseka Hierarchical self-healing rings . . . . 690--697
Upamanyu Madhow and
Michael L. Honig and
Kenneth Steiglitz Optimization of wireless resources for
personal communications mobility
tracking . . . . . . . . . . . . . . . . 698--707
C. Y. Roger Chen and
Shuo-Hsien Hsiao and
Abdulaziz S. Almazyad A new model for the performance
evaluation of synchronous circuit
switched multistage interconnection
networks . . . . . . . . . . . . . . . . 708--715
Dipak Ghosal and
T. V. Lakshman and
Yennun Huang Parallel architectures for processing
high speed network signaling protocols 716--728
Sijing Zhang and
Alan Burns An optimal synchronous bandwidth
allocation scheme for guaranteeing
synchronous message deadlines with the
timed-token MAC protocol . . . . . . . . 729--741
Dong Guen Jeong and
Chong-Ho Choi and
Wha Sook Jeon Design and performance evaluation of a
new medium access control protocol for
local wireless data communications . . . 742--752
Irene Katzela and
Mischa Schwartz Schemes for fault identification in
communication networks . . . . . . . . . 753--764
Gregory P. Pollini and
Kathleen S. Meier-Hellstern Efficient routing of information between
interconnected cellular mobile switching
centers . . . . . . . . . . . . . . . . 765--774
Meir Herzberg and
Stephen J. Bye and
Anthony Utano The hop-limit approach for
spare-capacity assignment in survivable
networks . . . . . . . . . . . . . . . . 775--784
Ikhlaq Sidhu and
Scott Jordan Multiplexing gains in bit stream
multiplexors . . . . . . . . . . . . . . 785--797
Donald E. Smith and
H. Jonathan Chao Sizing a packet reassembly buffer at a
host computer in an ATM network . . . . 798--808
D. Medhi Multi-hour, multi-traffic class network
design for virtual path-based
dynamically reconfigurable wide-area ATM
networks . . . . . . . . . . . . . . . . 809--818
Scott J. Shenker Making greed work in networks: a
game-theoretic analysis of switch
service disciplines . . . . . . . . . . 819--831
Matteo D'Ambrosio and
Riccardo Melen Evaluating the limit behavior of the ATM
traffic within a network . . . . . . . . 832--841
Izhak Rubin and
James Chien-Hsing Wu Analysis of an M/G/1/N queue with
vacations and its iterative application
to FDDI timed-token rings . . . . . . . 842--856
Paul S. Min and
Manjunath V. Hegde and
Hossein Saidi and
Alex Chandra Nonblocking copy networks in
multi-channel switching . . . . . . . . 857--871
C. Y. Roger Chen and
Georges A. Makhoul and
Dikran S. Meliksetian A queueing analysis of the performance
of DQDB . . . . . . . . . . . . . . . . 872--881
Anindo Banerjea and
Domenico Ferrari and
Bruce A. Mah and
Mark Moran and
Dinesh C. Verma and
Hui Zhang The Tenet real-time protocol suite:
design, implementation, and experiences 1--10
R. L. Cruz and
Jung-Tsung Tsai COD: alternative architectures for high
speed packet switching . . . . . . . . . 11--21
Kazutaka Murakami and
Hyong S. Kim Virtual path routing for survivable ATM
networks . . . . . . . . . . . . . . . . 22--39
Daniel P. Heyman and
T. V. Lakshman Source models for VBR broadcast-video
traffic . . . . . . . . . . . . . . . . 40--48
Anthony Hung and
George Kesidis Bandwidth scheduling for wide-area ATM
networks using virtual finishing times 49--54
Stefan Leue and
Philippe A. Oechslin On parallelizing and optimizing the
implementation of communication
protocols . . . . . . . . . . . . . . . 55--70
Dan Picker and
Ronald D. Fellman and
Paul M. Chau An extension to the SCI flow control
protocol for increased network
efficiency . . . . . . . . . . . . . . . 71--85
Willibald Doeringer and
Günter Karjoth and
Mehdi Nassehi Routing on longest-matching prefixes . . 86--97
Daniel Chonghwan Lee Worst-case fraction of CBR teletraffic
unpunctual due to statistical
multiplexing . . . . . . . . . . . . . . 98--105
David M. Koppelman Congested Banyan network analysis using
congested-queue states and
neighboring-queue effects . . . . . . . 106--111
Zvi Rosberg Cell multiplexing in ATM networks . . . 112--122
Zbigniew Dziong and
Lorne G. Mason Fair-efficient call admission control
policies for broadband networks --- a
game theoretic framework . . . . . . . . 123--136
Girish P. Chandranmenon and
George Varghese Trading packet headers for packet
processing . . . . . . . . . . . . . . . 141--152
Stephen Deering and
Deborah L. Estrin and
Dino Farinacci and
Van Jacobson and
Ching-Gung Liu and
Liming Wei The PIM architecture for wide-area
multicast routing . . . . . . . . . . . 153--162
Hua Jiang and
Stephen S. Rappaport Prioritized channel borrowing without
locking: a channel sharing strategy for
cellular communications . . . . . . . . 163--172
Panagiotis N. Zarros and
Myung J. Lee and
Tarek N. Saadawi Interparticipant synchronization in
real-time multimedia conferencing using
feedback . . . . . . . . . . . . . . . . 173--180
Fred Bauer and
Anujan Varma Distributed algorithms for multicast
path setup in data networks . . . . . . 181--191
Hong Liu and
Raymond E. Miller Generalized fair reachability analysis
for cyclic protocols . . . . . . . . . . 192--204
Leandros Tassiulas and
Leonidas Georgiadis Any work-conserving policy stabilizes
the ring with spatial re-use . . . . . . 205--208
Ashok Erramilli and
Onuttom Narayan and
Walter Willinger Experimental queueing analysis with
long-range dependent packet traffic . . 209--223
Partho Pratim Mishra and
Hemant Kanakia and
Satish K. Tripathi On hop-by-hop rate-based congestion
control . . . . . . . . . . . . . . . . 224--239
Hongbo Zho and
Victor S. Frost In-service monitoring for cell loss
quality of service violations in ATM
networks . . . . . . . . . . . . . . . . 240--248
Dominique Ga\"\iti and
Guy Pujolle Performance management issues in ATM
networks: traffic and congestion control 249--257
Lillykutty Jacob and
Anurag Kumar Delay performance of some scheduling
strategies in an input queuing ATM
switch with multiclass bursty traffic 258--271
Andrea E. F. Clementi and
Miriam Di Ianni On the hardness of approximating optimum
schedule problems in store and forward
networks . . . . . . . . . . . . . . . . 272--280
Fotios K. Liotopoulos and
Suresh Chalasani Semi-rearrangeably nonblocking operation
of Clos networks in the multirate
environment . . . . . . . . . . . . . . 281--291
Eitan Altman and
Daniel Kofman Bounds for performance measures of token
rings . . . . . . . . . . . . . . . . . 292--299
Daniel P. Heyman and
T. V. Lakshman What are the implications of long-range
dependence for VBR-video traffic
engineering? . . . . . . . . . . . . . . 301--317
Torsten Braun and
Christophe Diot Performance evaluation and cache
analysis of an ILP protocol
implementation . . . . . . . . . . . . . 318--330
Mete Kabatepe and
Kenneth S. Vastola The fair distributed queue (FDQ)
protocol for high-speed
metropolitan-area networks . . . . . . . 331--339
Thierry Turletti and
Christian Huitema Videoconferencing on the Internet . . . 340--351
Dallas E. Wrege and
Edward W. Knightly and
Hui Zhang and
Jörg Liebeherr Deterministic delay bounds for VBR video
in packet-switching networks:
fundamental limits and practical
trade-offs . . . . . . . . . . . . . . . 352--362
Reuven Cohen and
Baiju V. Patel and
Frank Schaffa and
Marc Willebeek-LeMair The sink tree paradigm: connectionless
traffic support on ATM LAN's . . . . . . 363--374
M. Shreedhar and
George Varghese Efficient fair queueing using deficit
round-robin . . . . . . . . . . . . . . 375--385
Guo-Liang Wu and
Jon W. Mark Computational methods for performance
evaluation of a statistical multiplexer
supporting bursty traffic . . . . . . . 386--397
Leandros Tassiulas Push forward link-level scheduling for
network-wide performance . . . . . . . . 398--406
Georgios I. Papadimitriou and
Dimitris G. Maritsas Learning automata-based receiver
conflict avoidance algorithms for WDM
broadcast-and-select star networks . . . 407--412
Sassan Pejhan and
Mischa Schwartz and
Dimitris Anastassiou Error control using retransmission
schemes in multicast transport protocols
for real-time media . . . . . . . . . . 413--427
Manjari Asawa and
Wayne E. Stark Optimal scheduling of handoffs in
cellular networks . . . . . . . . . . . 428--441
Yitzhak Birk and
Noam Bloch The effects of destructive interference
and wasted transmissions on the
uniform-traffic capacity of
non-bus-oriented single-hop
interconnections . . . . . . . . . . . . 442--448
Vincenzo Catania and
Giuseppe Ficili and
Sergio Palazzo and
Daniela Panno A comparative analysis of fuzzy versus
conventional policing mechanisms for ATM
networks . . . . . . . . . . . . . . . . 449--459
Ray-Guang Cheng and
Chung-Ju Chang Design of a fuzzy traffic controller for
ATM networks . . . . . . . . . . . . . . 460--469
Jacek \'Swiderski Approximate performance analysis of
real-time traffic over heavily loaded
networks with timed token protocols . . 470--478
Leonidas Georgiadis and
Roch Guérin and
Vinod Peris and
Kumar N. Sivarajan Efficient network QoS provisioning based
on per node traffic shaping . . . . . . 482--501
R. Ahuja and
S. Keshav and
H. Saran Design, implementation, and performance
measurement of a native-mode ATM
transport layer (extended version) . . . 502--515
James D. Salehi and
James F. Kurose and
Don Towsley The effectiveness of affinity-based
scheduling in multiprocessor network
protocol processing (extended version) 516--530
Debasis Mitra and
John A. Morrison and
K. G. Ramakrishnan ATM network design and optimization: a
multirate loss network framework . . . . 531--543
Suresh Subramaniam and
Murat Azizo\uglu and
Arun K. Somani All-optical networks with sparse
wavelength conversion . . . . . . . . . 544--557
S. Ramanathan Multicast tree generation in networks
with asymmetric links . . . . . . . . . 558--568
Anna Charny and
K. K. Ramakrishnan and
Anthony Lauck Time scale analysis scalability issues
for explicit rate allocation in ATM
networks . . . . . . . . . . . . . . . . 569--581
Israel Zibman and
Carl Woolf and
Peter O'Reilly and
Larry Strickland and
David Willis and
John Visser An architectural approach to minimizing
feature interactions in
telecommunications . . . . . . . . . . . 582--596
William S. Marcus An architecture for QoS analysis and
experimentation . . . . . . . . . . . . 597--603
Peter J. Smith and
Mansoor Shafi The impact of G.826 on the performance
of transport systems . . . . . . . . . . 604--614
Pratyush Moghé and
Izhak Rubin Enhanced call: a paradigm for
applications with dynamic
client-membership and client-level
binding in ATM networks . . . . . . . . 615--628
Ian F. Akyildiz and
Joseph S. M. Ho and
Yi-Bing Lin Movement-based location update and
selective paging for PCS networks . . . 629--638
Eytan Modiano and
Anthony Ephremides Efficient algorithms for performing
packet broadcasts in a mesh network . . 639--648
Izhak Rubin and
Ho-Ting Wu Performance analysis and design of CQBT
algorithm for a ring network with
spatial reuse . . . . . . . . . . . . . 649--659
András L. Oláh and
Sonia M. Heemstra de Groot Comments on ``Minimum-latency transport
protocols with modulo-$N$'' . . . . . . 660--666
Fengmin Gong and
Gurudatta M. Parulkar An application-oriented error control
scheme for high-speed networks . . . . . 669--683
Biswanath Mukherjee and
Dhritiman Banerjee and
S. Ramamurthy and
Amarnath Mukherjee Some principles for designing a
wide-area WDM optical network . . . . . 684--696
Simon S. Lam and
Simon Chow and
David K. Y. Yau A lossless smoothing algorithm for
compressed video . . . . . . . . . . . . 697--708
Joseph S. M. Ho and
Ian F. Akyildiz Local anchor scheme for reducing
signaling costs in personal
communications networks . . . . . . . . 709--725
Alberto Bononi and
Paul R. Prucnal Analytical evaluation of improved access
techniques in deflection routing
networks . . . . . . . . . . . . . . . . 726--730
Kenneth J. Schultz and
P. Glenn Gulak Multicast contention resolution with
single-cycle windowing using content
addressable FIFO's . . . . . . . . . . . 731--742
Jong Suk Ahn and
Peter B. Danzig Packet network simulation: speedup and
accuracy versus timing granularity . . . 743--757
Tsern-Huei Lee and
Kuen-Chu Lai and
Shii-Tyng Duann Design of a real-time call admission
controller for ATM networks . . . . . . 758--765
Reuven Elbaum and
Moshe Sidi Topological design of local-area
networks using genetic algorithms . . . 766--778
Bhagirath Narahari and
Sunil Shende and
Rahul Simha Efficient algorithms for erasure node
placement on slotted dual bus networks 779--784
Anjali Agarwal and
J. William Atwood A unified approach to fault-tolerance in
communication protocols based on
recovery procedures . . . . . . . . . . 785--795
Cesar Vargas and
Manjunath V. Hegde and
Morteza Naraghi-Pour and
Paul S. Min Shadow prices for LLR and ALBA . . . . . 796--807
Steven H. Low and
Nicholas F. Maxemchuk and
Sanjoy Paul Anonymous credit cards and their
collusion analysis . . . . . . . . . . . 809--816
Jonathan Kay and
Joseph Pasquale Profiling and reducing processing
overheads in TCP/IP . . . . . . . . . . 817--828
Carey L. Williamson Dynamic bandwidth allocation using
loss-load curves . . . . . . . . . . . . 829--839
Thomas F. La Porta and
Malathi Veeraraghavan and
Richard W. Buskens Comparison of signaling loads for PCS
systems . . . . . . . . . . . . . . . . 840--856
Symeon Papavassiliou and
Leandros Tassiulas Joint optimal channel base station and
power assignment for wireless access . . 857--872
Ornan Gerstel and
Israel Cidon and
Shmuel Zaks The layout of virtual paths in ATM
networks . . . . . . . . . . . . . . . . 873--884
Jörg Liebeherr and
Dallas E. Wrege and
Domenico Ferrari Exact admission control for networks
with a bounded delay service . . . . . . 885--901
Hosame Abu-Amara and
Brian A. Coan and
Shlomi Dolev and
Arkady Kanevsky and
Jennifer L. Welch Self-stabilizing topology maintenance
protocols for high-speed networks . . . 902--912
Hongsik Choi and
Hyeong-Ah Choi and
Murat Azizo\uglu Efficient scheduling of transmissions in
optical broadcast networks . . . . . . . 913--920
Sung-hark Chung and
Hu-gon Kim and
Yong-seok Yoon and
Dong-wan Tcha Cost-minimizing construction of a
unidirectional SHR with diverse
protection . . . . . . . . . . . . . . . 921--928
Ahmed E. Kamal Performance modeling of partial packet
discarding using the end-of-packet
indicator in AAL type 5 . . . . . . . . 929--940
Sridhar Ramesh and
Catherine Rosenberg and
Anurag Kumar Revenue maximization in ATM networks
using the CLP capability and buffer
priority management . . . . . . . . . . 941--950
Olaf Henniger and
Michel Barbeau and
Behçet Sarikaya Specification and testing of the
behavior of network management agents
using SDL-92 . . . . . . . . . . . . . . 951--962
David A. Levine and
Ian F. Akyildiz and
Mahmoud Naghshineh A resource estimation and call admission
algorithm for wireless multimedia
networks using the shadow cluster
concept . . . . . . . . . . . . . . . . 1--12
Chih-Lin I. and
Gregory P. Pollini and
Richard D. Gitlin PCS mobility management using the
reverse virtual call setup algorithm . . 13--24
Yi-Bing Lin Reducing location update cost in a PCS
network . . . . . . . . . . . . . . . . 25--33
Dong-wan Tcha and
Yong-joo Chung and
Taek-jin Choi A new lower bound for the frequency
assignment problem . . . . . . . . . . . 34--39
Charles R. Kalmanek and
Srinivasan Keshav and
William T. Marshall and
Samuel P. Morgan and
Robert C. Restrick III Xunet 2: lessons from an early wide-area
ATM testbed . . . . . . . . . . . . . . 40--55
Sugih Jamin and
Peter B. Danzig and
Scott J. Shenker and
Lixia Zhang A measurement-based admission control
algorithm for integrated service packet
networks . . . . . . . . . . . . . . . . 56--70
Walter Willinger and
Murad S. Taqqu and
Robert Sherman and
Daniel V. Wilson Self-similarity through
high-variability: statistical analysis
of Ethernet LAN traffic at the source
level . . . . . . . . . . . . . . . . . 71--86
Soung C. Liew On the stability of shuffle-exchange and
bidirectional shuffle-exchange
deflection networks . . . . . . . . . . 87--94
San-qi Li and
Chia-lin Hwang On the convergence of traffic
measurement and queueing analysis: a
statistical-matching and queueing (SMAQ)
tool . . . . . . . . . . . . . . . . . . 95--110
Yoram Ofek and
Khosrow Sohraby and
Ho-Ting Wu Integration of synchronous and
asynchronous traffic on the MetaRing and
its performance study . . . . . . . . . 111--121
Wassim Matragi and
Khosrow Sohraby and
Chatschik Bisdikian Jitter calculus in ATM networks:
multiple nodes . . . . . . . . . . . . . 122--133
Zbigniew Dziong and
Marek Juda and
Lorne G. Mason A framework for bandwidth management in
ATM networks --- aggregate equivalent
bandwidth estimation approach . . . . . 134--147
J. J. Garcia-Luna-Aceves and
Shree Murthy A path-finding algorithm for loop-free
routing . . . . . . . . . . . . . . . . 148--160
Yannis A. Korilis and
Aurel A. Lazar and
Ariel Orda Achieving network optima using
Stackelberg routing strategies . . . . . 161--173
Terence D. Todd and
Ellen L. Hahne Multi-access mesh (multimesh) networks 181--189
Israel Cidon and
Leonidas Georgiadis and
Roch Guérin and
Yuval Shavitt Improved fairness algorithms for rings
with spatial reuse . . . . . . . . . . . 190--204
Simon S. Lam and
Geoffrey G. Xie Group priority scheduling . . . . . . . 205--218
Edward W. Knightly and
Hui Zhang D-BIND: an accurate traffic model for
providing QoS guarantees to VBR traffic 219--231
Norival R. Figueira and
Joseph Pasquale A schedulability condition for
deadline-ordered service disciplines . . 232--244
John M. Spinelli Self-stabilizing sliding window ARQ
protocols . . . . . . . . . . . . . . . 245--254
Michael Andersin and
Jens Zander and
Zvi Rosberg Soft and safe admission control in
cellular networks . . . . . . . . . . . 255--265
Albert G. Greenberg and
R. Srikant Computational techniques for accurate
performance evaluation of multirate,
multihop communication networks . . . . 266--277
Hiroyuki Ohsaki and
Naoki Wakamiya and
Masayuki Murata and
Hideo Miyahara Performance of an input/output
buffered-type ATM LAN switch with
back-pressure function . . . . . . . . . 278--290
Raffaele Bolla and
Franco Davoli Control of multirate synchronous streams
in hybrid TDM access networks . . . . . 291--304
Joel E. Cohen and
Clark Jeffries Congestion resulting from increased
capacity in single-server queueing
networks . . . . . . . . . . . . . . . . 305--310
Marc Willebeek-LeMair and
Perwez Shahabuddin Approximating dependability measures of
computer networks: an FDDI case study 311--327
Fabrizio Sestini Recursive copy generation for multicast
ATM switching . . . . . . . . . . . . . 329--335
T. V. Lakshman and
Upamanyu Madhow The performance of TCP/IP for networks
with high bandwidth-delay products and
random loss . . . . . . . . . . . . . . 336--350
Jean-François P. Labourdette Performance impact of partial
reconfiguration on multihop lightwave
networks . . . . . . . . . . . . . . . . 351--358
George N. Rouskas and
Vijay Sivaraman Packet scheduling in broadcast WDM
networks with arbitrary transceiver
tuning latencies . . . . . . . . . . . . 359--370
Bhargav R. Bellur and
Galen H. Sasaki A SAT-based network access scheme for
fairness in high speed networks . . . . 371--381
Wing-cheong Lau and
San-qi Li Statistical multiplexing and buffer
sharing in multimedia high-speed
networks: a frequency-domain perspective 382--396
Boris Tsybakov and
Nicoals D. Georganas On self-similar traffic in ATM queues:
definitions, overflow probability bound,
and cell delay distribution . . . . . . 397--409
Oran Sharon A proof for lack of starvation in DQDB
with and without slot reuse . . . . . . 410--420
George M. Stamatelos and
Vassilios N. Koukoulidis Reservation-based bandwidth allocation
in a radio ATM network . . . . . . . . . 420--428
San-qi Li and
James D. Pruneski The linearity of low frequency traffic
flow: an intrinsic I/O property in
queueing systems . . . . . . . . . . . . 429--443
Bobby Krupczak and
Kenneth L. Calvert and
Mostafa H. Ammar Increasing the portability and
re-usability of protocol code . . . . . 445--459
Deborah A. Wallach and
Dawson R. Engler and
M. Frans Kaashoek ASHs: application-specific handlers for
high-performance messaging . . . . . . . 460--474
David K. Y. Yau and
Simon S. Lam Adaptive rate-controlled scheduling for
multimedia applications . . . . . . . . 475--488
Thomas F. La Porta and
Kuo-Wei Herman Chen A direct signaling system for flexible
access and deployment of
telecommunication services . . . . . . . 489--501
Duke Tantiprasut and
John Neil and
Craig Farrell ASN.1 protocol specification for use
with arbitrary encoding schemes . . . . 502--513
Claude Castelluccia and
Walid Dabbous and
Sean O'Malley Generating efficient protocol code from
an abstract specification . . . . . . . 514--524
András L. Oláh and
Sonia M. Heemstra de Groot Alternative specification and
verification of a periodic state
exchange protocol . . . . . . . . . . . 525--529
Bülent Yener and
Spyridon Matsoukas and
Yoram Ofek Iterative approach to optimizing
convergence routing priorities . . . . . 530--542
Randall Landry and
Ioannis Stavrakakis Study of delay jitter with and without
peak rate enforcement . . . . . . . . . 543--553
Daniel P. Heyman The GBAR source model for VBR
videoconferences . . . . . . . . . . . . 554--560
Pawan Goyal and
Harrick M. Vin Generalized guaranteed rate scheduling
algorithms: a framework . . . . . . . . 561--571
Brahim Bensaou and
Shirley T. C. Lam and
Hon-Wai Chu and
Danny H. K. Tsang Estimation of the cell loss ratio in ATM
networks with a fuzzy system and
application to measurement-based call
admission control . . . . . . . . . . . 572--584
Kshirasagar Naik Efficient computation of unique
input/output sequences in finite-state
machines . . . . . . . . . . . . . . . . 585--599
Willibald Doeringer and
Günter Karjoth and
Mehdi Nassehi Corrections to ``Routing on
longest-matching prefixes'' . . . . . . 600--600
Vern Paxson End-to-end routing behavior in the
Internet . . . . . . . . . . . . . . . . 601--615
John Heidemann and
Katia Obraczka and
Joe Touch Modeling the performance of HTTP over
several transport protocols . . . . . . 616--630
Martin F. Arlitt and
Carey L. Williamson Internet Web servers: workload
characterization and performance
implications . . . . . . . . . . . . . . 631--645
Joseph S. M. Ho and
Ian F. Akyildiz Dynamic hierarchical database
architecture for location management in
PCS networks . . . . . . . . . . . . . . 646--660
Jorge A. Cobb and
Mohamed G. Gouda Flow theory . . . . . . . . . . . . . . 661--674
Jon C. R. Bennett and
Hui Zhang Hierarchical packet fair queueing
algorithms . . . . . . . . . . . . . . . 675--689
Pawan Goyal and
Harrick M. Vin and
Haichen Cheng Start-time fair queueing: a scheduling
algorithm for integrated services packet
switching networks . . . . . . . . . . . 690--704
Emmanouel A. Varvarigos and
Vishal Sharma The ready-to-go virtual circuit
protocol: a loss-free protocol for
multigigabit networks using FIFO buffers 705--718
Srini B. Tridandapani and
Biswanath Mukherjee and
Geir Hallingstad Channel sharing in multi-hop WDM
lightwave networks: do we need more
channels? . . . . . . . . . . . . . . . 719--727
Abhijit K. Choudhury and
Ellen L. Hahne A new buffer management scheme for
hierarchical shared memory switches . . 728--738
Matthias Grossglauser and
Srinivasan Keshav and
David N. C. Tse RCBR: a simple and efficient service for
multiple time-scale traffic . . . . . . 741--755
Hari Balakrishnan and
Venkata N. Padmanabhan and
Srinivasan Seshan and
Randy H. Katz A comparison of mechanisms for improving
TCP performance over wireless links . . 756--769
Ellen W. Zegura and
Kenneth L. Calvert and
Michael J. Donahoo A quantitative comparison of graph-based
models for Internet topology . . . . . . 770--783
Sally Floyd and
Van Jacobson and
Ching-Gung Liu and
Steven McCanne and
Lixia Zhang A reliable multicast framework for
light-weight sessions and application
level framing . . . . . . . . . . . . . 784--803
Imrich Chlamtac and
András Faragó and
Hongbiao Zhang Time-spread multiple-access (TSMA)
protocols for multihop mobile radio
networks . . . . . . . . . . . . . . . . 804--812
Timothy Weller and
Bruce Hajek Scheduling nonuniform traffic in a
packet-switching system with small
propagation delay . . . . . . . . . . . 813--823
George Varghese and
Anthony Lauck Hashed and hierarchical timing wheels:
efficient data structures for
implementing a timer facility . . . . . 824--834
Mark E. Crovella and
Azer Bestavros Self-similarity in World Wide Web
traffic: evidence and possible causes 835--846
Shai Herzog and
Scott Shenker and
Deborah Estrin Sharing the ``cost'' of multicast trees:
an axiomatic analysis . . . . . . . . . 847--860
Aurel A. Lazar and
Ariel Orda and
Dimitrios E. Pendarakis Virtual path bandwidth allocation in
multiuser networks . . . . . . . . . . . 861--871
John O. Limb and
Dolors Sala A protocol for efficient transfer of
data over hybrid fiber/coax systems . . 872--881
Giuseppe Bianchi and
Riccardo Melen The role of local storage in supporting
video retrieval services on ATM networks 882--892
Yuguang Fang and
Imrich Chlamtac and
Yi-Bing Lin Modeling PCS networks under general call
holding time and cell residence time
distributions . . . . . . . . . . . . . 893--906
Partha P. Bhattacharya and
Leonidas Georgiadis and
Arvind Krishna Distributed channel allocation for PCN
with variable rate traffic . . . . . . . 907--923
Ramaswamy Murali and
Brian L. Hughes Random access with large propagation
delay . . . . . . . . . . . . . . . . . 924--935
Rajiv Ramaswami and
Adrian Segall Distributed network control for optical
networks . . . . . . . . . . . . . . . . 936--943
D. Medhi and
Sujit Guptan Network dimensioning and performance of
multiservice, multirate loss networks
with dynamic routing . . . . . . . . . . 944--957
Alfio Lombardo and
Giovanni Schembra An analytical paradigm to compare
routing strategies in an ATM multimedia
environment . . . . . . . . . . . . . . 958--969
Rauf Izmailov and
Duan-Shin Lee and
Bhaskar Sengupta Design and analysis of a congestion-free
overlay on a high-speed network . . . . 970--980
M. H. MacGregor and
Wayne D. Grover Distributed partial-express routing of
broad-band transport network demands . . 981--988
Bülent Yener and
Yoram Ofek and
Moti Yung Combinatorial design of congestion-free
networks . . . . . . . . . . . . . . . . 989--1000
David G. Thaler and
Chinya V. Ravishankar Using name-based mappings to increase
hit rates . . . . . . . . . . . . . . . 1--14
Reuven Cohen and
Srinivas Ramanathan TCP for high performance in hybrid fiber
coaxial broad-band access networks . . . 15--29
Geoffrey G. Xie and
Simon S. Lam Real-time block transfer under a
link-sharing hierarchy . . . . . . . . . 30--41
Soung C. Liew and
Derek Chi-yin Tse A control-theoretic approach to adapting
VBR compressed video for transport over
a CBR communications channel . . . . . . 42--55
Sudhir S. Dixit and
Sharad Kumar Traffic descriptor mapping and traffic
control for frame relay over ATM network 56--70
Bruce S. Northcote and
Donald E. Smith Service control point overload rules to
protect intelligent network services . . 71--81
Andre Girard and
Brunilde Sansó Multicommodity flow models, failure
propagation, and reliable loss network
design . . . . . . . . . . . . . . . . . 82--93
K. Ravindran and
Ting-Jian Gong Cost analysis of multicast transport
architectures in multiservice networks 94--109
Peter Newman and
Greg Minshall and
Thomas L. Lyon IP switching --- ATM under IP . . . . . 117--129
Abhijit K. Choudhury and
Ellen L. Hahne Dynamic queue length thresholds for
shared-memory packet switches . . . . . 130--140
Aleksandr Privalov and
Khosrow Sohraby Per-stream jitter analysis in CBR ATM
multiplexors . . . . . . . . . . . . . . 141--149
Cathy A. Fulton and
San-qi Li Delay jitter first-order and
second-order statistical functions of
general traffic on high-speed multimedia
networks . . . . . . . . . . . . . . . . 150--163
Dimitrios Stiliadis and
Anujan Varma Rate-proportional servers: a design
methodology for fair queueing algorithms 164--174
Dimitrios Stiliadis and
Anujan Varma Efficient fair queueing algorithms for
packet-switched networks . . . . . . . . 175--185
Ezhan Karasan and
Ender Ayanoglu Effects of wavelength routing and
selection algorithms on wavelength
conversion gain in WDM optical networks 186--196
Ahmed Mokhtar and
Murat Azizo\uglu Adaptive wavelength routing in
all-optical networks . . . . . . . . . . 197--206
Kazutaka Murakami and
Hyong S. Kim Optimal capacity and flow assignment for
self-healing ATM networks based on line
and end-to-end restoration . . . . . . . 207--221
Nikolaos Anerousis and
Aurel A. Lazar Virtual path control for ATM networks
with call level quality of service
guarantees . . . . . . . . . . . . . . . 222--236
Craig Partridge and
Philip P. Carvey and
Ed Burgess and
Isidro Castineyra and
Tom Clarke and
Lise Graham and
Michael Hathaway and
Phil Herman and
Allen King and
Steve Kohalmi and
Tracy Ma and
John Mcallen and
Trevor Mendez and
Walter C. Milliken and
Ronald Pettyjohn and
John Rokosz and
Joshua Seeger and
Michael Sollins and
Steve Storch and
Benjamin Tober and
Gregory D. Troxel A 50-Gb/s IP router . . . . . . . . . . 237--248
Ramachandran Ramjee and
Thomas F. La Porta and
Jim Kurose and
Don Towsley Performance evaluation of connection
rerouting schemes for ATM-based wireless
networks . . . . . . . . . . . . . . . . 249--261
Mats Björkman and
Per Gunningberg Performance modeling of multiprocessor
implementations of protocols . . . . . . 262--273
Jorge A. Cobb and
Mohamed G. Gouda and
Amal El-Nahas Time-shift scheduling --- fair
scheduling of flows in high-speed
networks . . . . . . . . . . . . . . . . 274--285
Ehud Aharoni and
Reuven Cohen Restricted dynamic Steiner trees for
scalable multicast in datagram networks 286--297
Ji-Her Ju and
Victor O. K. Li An optimal topology-transparent
scheduling method in multihop packet
radio networks . . . . . . . . . . . . . 298--306
Soung C. Liew and
Ming-Hung Ng and
Cathy W. Chan Blocking and nonblocking multirate Clos
switching networks . . . . . . . . . . . 307--318
Kwan Lawrence Yeung and
Tak-Shing Peter Yum Node placement optimization in
ShuffleNets . . . . . . . . . . . . . . 319--324
Rainer R. Iraschko and
M. H. MacGregor and
Wayne D. Grover Optimal capacity placement for path
restoration in STM or ATM
mesh-survivable networks . . . . . . . . 325--336
B. Neelakantan and
S. V. Raghavan Scientific foundations to the multilevel
method . . . . . . . . . . . . . . . . . 337--346
Jörg Nonnenmacher and
Ernst W. Biersack and
Don Towsley Parity-based loss recovery for reliable
multicast transmission . . . . . . . . . 349--361
David D. Clark and
Wenjia Fang Explicit allocation of best-effort
packet delivery service . . . . . . . . 362--373
R. Gopalakrishnan and
Gurudatta M. Parulkar Efficient user-space protocol
implementations with QoS guarantees
using real-time upcalls . . . . . . . . 374--388
Philipp Hoschka Compact and efficient presentation
conversion code . . . . . . . . . . . . 389--396
James D. Salehi and
Shi-Li Zhang and
Jim Kurose and
Don Towsley Supporting stored video: reducing rate
variability and end-to-end resource
requirements through optimal smoothing 397--410
Ness B. Shroff and
Mischa Schwartz Improved loss calculations at an ATM
multiplexer . . . . . . . . . . . . . . 411--421
Imrich Chlamtac and
Hongbiao Zhang and
András Faragó and
Andrea Fumagalli A deterministic approach to the
end-to-end analysis of packet flows in
connection-oriented networks . . . . . . 422--431
Ornan Ori Gerstel and
Israel Cidon and
Shmuel Zaks Efficient support for client/server
applications over heterogeneous ATM
network . . . . . . . . . . . . . . . . 432--446
Arthur W. Berger and
Ward Whitt Effective bandwidths with priorities . . 447--460
Mehrdad Parsa and
Qing Zhu and
J. J. Garcia-Luna-Aceves An iterative algorithm for
delay-constrained minimum-cost
multicasting . . . . . . . . . . . . . . 461--474
Nen-Fu Huang and
Huey-Ing Liu A study of isochronous channel reuse in
DQDB metropolitan area networks . . . . 475--484
Anurag Kumar Comparative performance analysis of
versions of TCP in a local network with
a lossy link . . . . . . . . . . . . . . 485--498
Tsern-Huei Lee and
Kuen-Chu Lai Characterization of delay-sensitive
traffic . . . . . . . . . . . . . . . . 499--504
David L. Mills Adaptive hybrid clock discipline
algorithm for the network time protocol 505--514
Craig Labovitz and
G. Robert Malan and
Farnam Jahanian Internet routing instability . . . . . . 515--528
Jonathan Stone and
Michael Greenwald and
Craig Partridge and
James Hughes Performance of checksums and CRC's over
real data . . . . . . . . . . . . . . . 529--543
Hao Che and
San-qi Li and
Arthur Lin Adaptive resource management for
flow-based IP/ATM hybrid switching
systems . . . . . . . . . . . . . . . . 544--557
Victor Firoiu and
Jim Kurose and
Don Towsley Efficient admission control of piecewise
linear traffic envelopes at EDF
schedulers . . . . . . . . . . . . . . . 558--570
Shivakant Mishra and
Lei Wu An evaluation of flow control in group
communication . . . . . . . . . . . . . 571--587
Bruce Hajek and
Linhai He On variations of queue response for
inputs with the same mean and
autocorrelation function . . . . . . . . 588--598
Lampros Kalampoukas and
Anujan Varma Analysis of source policy and its
effects on TCP in rate-controlled ATM
networks . . . . . . . . . . . . . . . . 599--610
Dimitrios Stiliadis and
Anujan Varma Latency-rate servers: a general model
for analysis of traffic scheduling
algorithms . . . . . . . . . . . . . . . 611--624
Kohei Shiomoto and
Shinichiro Chaki and
Naoaki Yamanaka A simple bandwidth management strategy
based on measurements of instantaneous
virtual path utilization in ATM networks 625--634
Abdelnaser Mohammad Adas Using adaptive linear prediction to
support real-time VBR video under RCBR
network service model . . . . . . . . . 635--644
Peter Kim Deterministic service guarantees in IEEE
802.12 networks --- part I: the
single-hub case . . . . . . . . . . . . 645--658
Jinwoo Choe and
Ness B. Shroff A central-limit-theorem-based approach
for analyzing queue behavior in
high-speed networks . . . . . . . . . . 659--671
Anja Feldmann and
Jennifer Rexford and
Ramón Cáceres Efficient policies for carrying Web
traffic over flow-switched networks . . 673--685
Ching-Gung Liu and
Deborah Estrin and
Scott Shenker and
Lixia Zhang Local error recovery in SRM: comparison
of two approaches . . . . . . . . . . . 686--699
David K. Y. Yau and
Simon S. Lam Migrating sockets --- end system support
for networking with quality of service
guarantees . . . . . . . . . . . . . . . 700--716
N. G. Duffield and
K. K. Ramakrishnan and
Amy R. Reibman SAVE: an algorithm for smoothed adaptive
video over explicit rate networks . . . 717--728
Lampros Kalampoukas and
Anujan Varma and
K. K. Ramakrishnan Two-way TCP traffic over rate controlled
channels: effects and analysis . . . . . 729--743
Rajiv Ramaswami and
Galen Sasaki Multiwavelength optical networks with
limited wavelength conversion . . . . . 744--754
Byrav Ramamurthy and
Jason Iness and
Biswanath Mukherjee Optimizing amplifier placements in a
multiwavelength optical LAN/MAN: the
unequally powered wavelengths case . . . 755--767
Dean H. Lorenz and
Ariel Orda QoS routing in networks with uncertain
parameters . . . . . . . . . . . . . . . 768--778
Debanjan Saha and
Sarit Mukherjee and
Satish K. Tripathi Carry-over round robin: a simple cell
scheduling mechanism for ATM networks 779--796
Lalita A. Kulkarni and
San-qi Li Performance analysis of a rate-based
feedback control scheme . . . . . . . . 797--810
Brian L. Mark and
Gopalakrishnan Ramamurthy Real-time estimation and dynamic
renegotiation of UPC parameters for
arbitrary traffic sources in ATM
networks . . . . . . . . . . . . . . . . 811--827
Xiaohua Jia A distributed algorithm of delay-bounded
multicast routing for multimedia
applications in wide area networks . . . 828--837
Seok-Kyu Kweon and
Kang G. Shin Providing deterministic delay guarantees
in ATM networks . . . . . . . . . . . . 838--850
Anna Ha\'c and
Bo Liu Database and location management schemes
for mobile communications . . . . . . . 851--865
Imrich Chlamtac and
Viktória Elek and
Andrea Fumagalli and
Csaba Szabó Scalable WDM access network architecture
based on photonic slot routing . . . . . 1--9
Albert G. Greenberg and
R. Srikant and
Ward Whitt Resource sharing for book-ahead and
instantaneous-request calls . . . . . . 10--22
Richard F. Hobson and
P. S. Wong A parallel embedded-processor
architecture for ATM reassembly . . . . 23--37
Junyi Li and
Ness B. Shroff and
Edwin K. P. Chong Channel carrying: a novel handoff scheme
for mobile cellular networks . . . . . . 38--50
Imrich Chlamtac and
Chiara Petrioli and
Jason Redi Energy-conserving access protocols for
identification networks . . . . . . . . 51--59
Ge Nong and
Jogesh K. Muppala and
Mounir Hamdi Analysis of nonblocking ATM switches
with multiple input queues . . . . . . . 60--74
Jeffrey M. Capone and
Ioannis Stavrakakis Delivering QoS requirements to traffic
with diverse delay tolerances in a TDMA
environment . . . . . . . . . . . . . . 75--87
Leandros Tassiulas Cut-through switching, pipelining, and
scheduling for network evacuation . . . 88--97
Yijun Xiong and
Lorne G. Mason Restoration strategies and spare
capacity requirements in self-healing
ATM networks . . . . . . . . . . . . . . 98--110
Ray-Guang Cheng and
Chung-Ju Chang and
Li-Fong Lin A QoS-Provisioning neural fuzzy
connection admission controller for
multimedia high-speed networks . . . . . 111--121
Alifo Lombardo and
Giacomo Morabito and
Giovanni Schembra A discrete-time paradigm to evaluate
skew performance in a multimedia ATM
multiplexer . . . . . . . . . . . . . . 122--139
Ian F. Akyildiz and
David A. Levine and
Inwhee Joe A slotted CDMA protocol with BER
scheduling for wireless multimedia
networks . . . . . . . . . . . . . . . . 146--158
Stuart Cheshire and
Mary Baker Consistent overhead Byte stuffing . . . 159--172
Wu-chang Feng and
Dilip D. Kandlur and
Debanjan Saha and
Kang G. Shin Understanding and improving TCP
performance over networks with minimum
rate guarantees . . . . . . . . . . . . 173--187
Nick McKeown The iSLIP scheduling algorithm for
input-queued switches . . . . . . . . . 188--201
Jennifer Rexford and
Don Towsley Smoothing variable-bit-rate video in an
Internetwork . . . . . . . . . . . . . . 202--215
Yonghwan Kim and
San-qi Li Performance analysis of data packet
discarding in ATM networks . . . . . . . 216--227
Zygmunt J. Haas and
Ben Liang Ad hoc mobility management with uniform
quorum systems . . . . . . . . . . . . . 228--240
Chunming Qiao and
Yousong Mei Off-line permutation embedding and
scheduling in multiplexed optical
networks with regular topologies . . . . 241--250
Mirjana Zafirovic-Vukotic and
Ignatius G. M. M. Niemegeers Waiting time estimates in symmetric
ATM-oriented rings with the destination
release of used slots . . . . . . . . . 251--261
Ajei Gopal and
Inder Gopal and
Shay Kutten Fast broadcast in high-speed networks 262--275
Vern Paxson End-to-end Internet packet dynamics . . 277--292
Matthias Grossglauser and
David N. C. Tse A framework for robust measurement-based
admission control . . . . . . . . . . . 293--309
Rajeev Agrawal and
Rene L. Cruz and
Clayton Okino and
Rajendran Rajan Performance bonds for flow control
protocols . . . . . . . . . . . . . . . 310--323
Butler Lampson and
Venkatachary Srinivasan and
George Varghese IP lookups using multiway and
multicolumn search . . . . . . . . . . . 324--334
Emmanouel A. Varvarigos and
Jonathan P. Lang A virtual circuit deflection protocol 335--349
Roche A. Guérin and
Ariel Orda QoS routing in networks with inaccurate
information: theory and algorithms . . . 350--364
Ariel Orda Routing with end-to-end QoS guarantees
in broadband networks . . . . . . . . . 365--374
Jörg Nonnenmacher and
Ernst W. Biersack Scalable feedback for large groups . . . 375--386
Pietro Manzoni and
Paolo Cremonesi and
Giuseppe Serazzi Workload models of VBR video traffic and
their use in resource allocation
policies . . . . . . . . . . . . . . . . 387--397
Kavitha Chandra and
Amy R. Reibman Modeling one- and two-layer variable bit
rate video . . . . . . . . . . . . . . . 398--413
Rajesh K. Pankaj Wavelength requirements for multicasting
in all-optical networks . . . . . . . . 414--424
Eytan Modiano Random algorithms for scheduling
multicast traffic in WDM
broadcast-and-select networks . . . . . 425--434
Xijun Zhang and
Chunming Qiao On scheduling all-to-all personalized
connections and cost-effective designs
in WDM rings . . . . . . . . . . . . . . 435--445
Abel Dasylva and
R. Srikant Optimal WDM schedules for optical star
networks . . . . . . . . . . . . . . . . 446--456
Sally Floyd and
Kevin Fall Promoting the use of end-to-end
congestion control in the Internet . . . 458--472
Songwu Lu and
Vaduvur Bharghavan and
R. Srikant Fair scheduling in wireless packet
networks . . . . . . . . . . . . . . . . 473--489
Francesco Lo Presti and
Zhi-Li Zhang and
Jim Kurose and
Don Towsley Source time scale and optimal
buffer/bandwidth tradeoff for
heterogeneous regulated traffic in a
network node . . . . . . . . . . . . . . 490--501
Chung Kei Wong and
Simon S. Lam Digital signatures for flows and
multicasts . . . . . . . . . . . . . . . 502--513
Sriram Raghavan and
G. Manimaran and
C. Siva Ram Murthy A rearrangeable algorithm for the
construction delay-constrained dynamic
multicast trees . . . . . . . . . . . . 514--529
Keith Kong and
Dipak Ghosal Mitigating server-side congestion in the
Internet through pseudoserving . . . . . 530--544
Gaoxi Xiao and
Yiu-Wing Leung Algorithms for allocating wavelength
converters in all-optical networks . . . 545--557
Wayne D. Grover High availability path design in
ring-based optimal networks . . . . . . 558--574
Supriya Sharma and
Yannis Viniotis Optimal buffer management policies for
shared-buffer ATM switches . . . . . . . 575--587
Jae-Hyun Park and
Hyunsoo Yoon and
Heung-Kyu Lee The deflection self-routing Banyan
network: a large-scale ATM switch using
the fully adaptive self-routing and its
performance analyses . . . . . . . . . . 588--604
Hemant M. Chaskar and
T. V. Lakshman and
U. Madhow TCP over wireless with link level error
control: analysis and design methodology 605--615
Sunghyun Choi and
Kang G. Shin An uplink CDMA system architecture with
diverse QoS guarantees for heterogeneous
traffic . . . . . . . . . . . . . . . . 616--628
Matthias Grossglauser and
Jean-Chrysostome Bolot On the relevance of long-range
dependence in network traffic . . . . . 629--640
Muriel Médard and
Steven G. Finn and
Richard A. Barry Redundant trees for preplanned recovery
in arbitrary vertex-redundant or
edge-redundant graphs . . . . . . . . . 641--652
Anindo Banerjea Fault recovery for guaranteed
performance communications connections 653--668
Hanrijanto Sariowan and
Rene L. Cruz and
George C. Polyzos SCED: a generalized scheduling policy
for guaranteeing quality-of-service . . 669--684
Wu-Chang Feng and
Dilip D. Kandlur Adaptive packet marking for maintaining
end-to-end throughput in a
differentiated-services Internet . . . . 685--697
G. Manimaran and
Hariharan Shankar Rahul and
C. Siva Ram Murthy A new distributed route selection
approach for channel establishment in
real-time networks . . . . . . . . . . . 698--709
T. V. Lakshman and
P. P. Mishra and
K. K. Ramakrishnan Transporting compressed video over ATM
networks with explicit-rate feedback
control . . . . . . . . . . . . . . . . 710--723
Mayez A. Al-Mouhamed and
Mohammed Kaleemuddin and
Habib Yousef Evaluation of pipelined dilated banyan
switch architectures for ATM networks 724--740
Aleksandar Kolarov and
G. Ramamurthy A control-theoretic approach to the
design of an explicit rate controller
for ABR service . . . . . . . . . . . . 741--753
Suresh Subramaniam and
Murat Azizo\uglu and
Arun K. Somani On optimal converter placement in
wavelength-routed networks . . . . . . . 754--766
Murat Alanyali and
Ender Ayanoglu Provisioning algorithms for WDM optical
networks . . . . . . . . . . . . . . . . 767--778
Ling Li and
Arun K. Somani Dynamic wavelength routing using
congestion and neighborhood information 779--786
Jon C. R. Bennett and
Craig Partridge and
Nicholas Shectman Packet reordering is not pathological
network behavior . . . . . . . . . . . . 789--798
Stefano Basagni and
Imrich Chlamtac and
Danilo Bruschi A mobility-transparent deterministic
broadcast mechanism for ad hoc networks 799--807
Zohar Naor and
Hanoch Levy LATS: a load-adaptive threshold scheme
for tracking mobile users . . . . . . . 808--817
Junyi Li and
Ness B. Shroff and
K. P. Chong A reduced-power channel reuse scheme for
wireless packet cellular networks . . . 818--832
Ori Gerstel and
Galen Sasaki and
Shay Kutten and
Rajiv Ramaswami Worst-case analysis of dynamic
wavelength allocation in optical
networks . . . . . . . . . . . . . . . . 833--846
Demet Aksoy and
Michael Franklin $ R \times W $: a scheduling approach
for large-scale on-demand data broadcast 846--860
Steven H. Low and
David E. Lapsley Optimization flow control, I: basic
algorithm and convergence . . . . . . . 861--874
Lavy Libman and
Ariel Orda The designer's perspective to atomic
noncooperative networks . . . . . . . . 875--884
Israel Cidon and
Raphael Rom and
Yuval Shavitt Analysis of multi-path routing . . . . . 885--896
Wei K. Tsai and
John K. Antonio and
Garng M. Huang Complexity of gradient projection method
for optimal routing in data networks . . 897--905
Eyal Felstaine and
Reuven Cohen On the distribution of routing
computation in hierarchical ATM networks 906--916
Maan A. Kousa and
Ahmed K. Elhakeem and
Hui Yang Performance of ATM networks under hybrid
ARQ/FEC error control scheme . . . . . . 917--925
Hanoch Levy and
Tzippi Mendelson and
Moshe Sidi and
Joseph Keren-Zvi Sizing exit buffers in ATM networks: an
intriguing coexistence of instability
and tiny cell loss rates . . . . . . . . 926--936
Dan Decasper and
Zubin Dittia and
Guru Parulkar and
Bernhard Plattner Router plugins: a software architecture
for next-generation routers . . . . . . 2--15
Chung Kei Wong and
Mohamed Gouda and
Simon S. Lam Secure group communications using key
graphs . . . . . . . . . . . . . . . . . 16--30
Mario Baldi and
Yoram Ofek and
Bülent Yener Adaptive group multicast with
time-driven priority . . . . . . . . . . 31--43
Sunghyun Choi and
Kang G. Shin A unified wireless LAN architecture for
real-time and non-real-time
communication services . . . . . . . . . 44--59
Steve Iatrou and
Ioannis Stavrakakis A dynamic regulation and scheduling
scheme for real-time traffic management 60--70
Nasir Ghani and
Jon W. Mark Enhanced distributed explicit rate
allocation for ABR services in ATM
networks . . . . . . . . . . . . . . . . 71--86
Shivkumar Kalyanaraman and
Raj Jain and
Sonia Fahmy and
Rohit Goyal and
Bobby Vandalore The ERICA switch algorithm for ABR
traffic management in ATM networks . . . 87--98
Ching-Fong Su and
Gustavo De Veciana Statistical multiplexing and
mix-dependent alternative routing in
multiservice VP networks . . . . . . . . 99--108
Sung Hyuk Byun and
Dan Keun Sung The UniMIN switch architecture for
large-scale ATM switches . . . . . . . . 109--120
Jitendra Padhye and
Victor Firoiu and
Donald F. Towsley and
James F. Kurose Modeling TCP Reno performance: a simple
model and its empirical validation . . . 133--145
Oliver Spatscheck and
Jòrgen S. Hansen and
John H. Hartman and
Larry L. Peterson Optimizing TCP forwarder performance . . 146--157
Luigi Rizzo and
Lorenzo Vicisano Replacement policies for a proxy cache 158--170
Ioannis Ch. Paschalidis and
John N. Tsitsiklis Congestion-dependent pricing of network
services . . . . . . . . . . . . . . . . 171--184
Ion Stoica and
Hui Zhang and
T. S. Eugene Ng A hierarchical fair service curve
algorithm for link-sharing, real-time,
and priority services . . . . . . . . . 185--199
Mark D. Corner and
Jörg Liebeherr and
Nada Golmie and
Chatschik Bisdikian and
David H. Su A priority scheme for the IEEE 802.14
MAC protocol for hybrid fiber-coax
networks . . . . . . . . . . . . . . . . 200--211
Subir K. Biswas and
Rauf Izmailov Design of a fair bandwidth allocation
policy for VBR traffic in ATM networks 212--212
Martin S. Lacher and
Jörg Nonnenmacher and
Ernst W. Biersack Performance comparison of centralized
versus distributed error recovery for
reliable multicast . . . . . . . . . . . 224--224
Douglas S. Reeves and
Hussein F. Salama A distributed algorithm for
delay-constrained unicast routing . . . 239--250
Adrian Grah and
Terence D. Todd Packet-switched local area networks
using wavelength-selective station
couplers . . . . . . . . . . . . . . . . 251--264
Jean-Marc Berthaud Time synchronization over networks using
convex closures . . . . . . . . . . . . 265--277
Li Fan and
Pei Cao and
Jussara Almeida and
Andrei Z. Broder Summary cache: a scalable wide-area Web
cache sharing protocol . . . . . . . . . 281--293
Sneha Kumar Kasera and
Gísli Hjálmtýsson and
Donald F. Towsley and
James F. Kurose Scalable reliable multicast using
multiple multicast channels . . . . . . 294--310
Shiwen Chen and
Oktay Günlük and
Bülent Yener The multicast packing problem . . . . . 311--318
Jie Li and
Hisao Kameda and
Keqin Li Optimal dynamic mobility management for
PCS networks . . . . . . . . . . . . . . 319--327
Anthony S. Acampora and
Srikanth V. Krishnamurthy A new adaptive MAC layer protocol for
broadband packet wireless networks in
harsh fading and interference
environments . . . . . . . . . . . . . . 328--336
Jeong Geun Kim and
Marwan M. Krunz Bandwidth allocation in wireless
networks with guaranteed packet-loss
performance . . . . . . . . . . . . . . 337--349
Ching-Fong Su and
Gustavo De Veciana and
Jean Walrand Explicit rate flow control for ABR
services in ATM networks . . . . . . . . 350--361
Alain Mayer and
Yoram Ofek and
Moti Yung Local and congestion-driven fairness
algorithm in arbitrary topology networks 362--372
Steven H. Low Equilibrium bandwidth and buffer
allocations for elastic traffics . . . . 373--383
Olivier Crochat and
Jean-Yves Le Boudec and
Ornan Gerstel Protection interoperability for WDM
optical networks . . . . . . . . . . . . 384--395
Biplab Sikdar and
D. Manjunath Queueing analysis of scheduling policies
in copy networks of space-based
multicast packet switches . . . . . . . 396--406
Rajgopal Kannan and
Sibabrata Ray MSXmin: a modular multicast ATM packet
switch with low delay and hardware
complexity . . . . . . . . . . . . . . . 407--418
Eric W. M. Wong and
Andy K. M. Chan and
Tak-Shing Peter Yum Analysis of rerouting in
circuit-switched networks . . . . . . . 419--427
Zhi-Li Zhang and
Yuewei Wang and
David H. C. Du and
Dongli Shu Video staging: a proxy-server-based
approach to end-to-end video delivery
over wide-area networks . . . . . . . . 429--442
Michel Abdalla and
Yuval Shavitt and
Avishai Wool Key management for restricted multicast
using broadcast encryption . . . . . . . 443--454
Ellen W. Zegura and
Mostafa H. Ammar and
Zongming Fei and
Samrat Bhattacharjee Application-layer anycasting: a server
selection architecture and use in a
replicated Web service . . . . . . . . . 455--466
Matthew Roughan and
Darryl Veitch and
Patrice Abry Real-time estimation of the parameters
of long-range dependence . . . . . . . . 467--478
Mario Baldi and
Yoram Ofek End-to-end delay analysis of
videoconferencing over packet-switched
networks . . . . . . . . . . . . . . . . 479--492
Ilias Iliadis Optimal PNNI complex node
representations for restrictive costs
and minimal path computation time . . . 493--506
José M. Barceló and
Jorge García-Vidal and
Olga Casals Worst-case traffic in a tree network of
ATM multiplexers . . . . . . . . . . . . 507--516
Wen-Tsuen Chen and
Chun-Fu Huang and
Yi-Luang Chang and
Wu-Yuin Hwang An efficient cell-scheduling algorithm
for multicast ATM switching systems . . 517--525
Dongsoo S. Kim and
Ding-Zhu Du Performance of split routing algorithm
for three-stage multicast networks . . . 526--534
Frank K. Hwang and
Sheng-Chyang Liaw On nonblocking multicast three-stage
Clos networks . . . . . . . . . . . . . 535--539
T. V. Lakshman and
Upamanyu Madhow and
Bernhard Suter TCP/IP performance with random loss and
bidirectional congestion . . . . . . . . 541--555
Jeonghoon Mo and
Jean Walrand Fair end-to-end window-based congestion
control . . . . . . . . . . . . . . . . 556--567
P. Krishnan and
Danny Raz and
Yuval Shavitt The cache location problem . . . . . . . 568--582
Nicholas Bambos and
Shou C. Chen and
Gregory J. Pottie Channel access algorithms with active
link protection for wireless
communication networks with power
control . . . . . . . . . . . . . . . . 583--597
Dhritiman Banerjee and
Biswanath Mukherjee Wavelength-routed optical networks:
linear formulation, resource budgeting
tradeoffs, and a reconfiguration study 598--607
Xijun Zhang and
Chunming Qiao An effective and comprehensive approach
for traffic grooming and wavelength
assignment in SONET/WDM rings . . . . . 608--617
Ornan Gerstel and
Rajiv Ramaswami and
Galen H. Sasaki Cost-effective traffic grooming in WDM
rings . . . . . . . . . . . . . . . . . 618--630
Jason P. Jue and
Biswanath Mukherjee Multiconfiguration multihop protocols: a
new class of protocols for
packet-switched WDM optical networks . . 631--642
Arthur W. Berger and
Yaakov Kogan Dimensioning bandwidth for elastic
traffic in high-speed data networks . . 643--654
Subir K. Biswas and
Rauf Izmailov and
Bhaskar Sengupta Connection splitting: an efficient way
of reducing call blocking in ATM . . . . 655--666
Ha\"\ikel Ya\"\iche and
Ravi R. Mazumdar and
Catherine Rosenberg A game theoretic framework for bandwidth
allocation and pricing in broadband
networks . . . . . . . . . . . . . . . . 667--678
Chi-Chung Cheung and
Danny H. K. Tsang and
Sanjay Gupta Dynamic multicast routing based on mean
number of new calls accepted before
blocking for single rate loss networks 679--688
Jean-Yves Le Boudec and
Olivier Verscheure Optimal smoothing for guaranteed service 689--696
Rose Qingyang Hu and
David W. Petr A predictive self-tuning fuzzy-logic
feedback rate controller . . . . . . . . 697--709
Michael Frey and
Son Nguyen-Quang A gamma-based framework for modeling
variable-rate MPEG video sources: the
GOP GBAR model . . . . . . . . . . . . . 710--719
Brett J. Vickers and
Célio Albuquerque and
Tatsuya Suda Source-adaptive multilayered multicast
algorithms for real-time video
distribution . . . . . . . . . . . . . . 720--733
Paolo Narváez and
Kai-Yeung Siu and
Hong-Yi Tzeng New dynamic algorithms for shortest path
tree computation . . . . . . . . . . . . 734--746
Yuhong Zhu and
George N. Rouskas and
Harry G. Perros A path decomposition approach for
computing blocking probabilities in
wavelength-routing networks . . . . . . 747--762
Eric Noel and
K. Wendy Tang Performance modeling of multihop network
subject to uniform and nonuniform
geometric traffic . . . . . . . . . . . 763--774
Reuven Cohen and
Gideon Kaempfer On the cost of virtual private networks 775--784
Frederico Cal\`\i and
Marco Conti and
Enrico Gregori Dynamic tuning of the IEEE 802.11
protocol to achieve a theoretical
throughput limit . . . . . . . . . . . . 785--799
Milosh Ivanovich and
Moshe Zukerman and
Fraser Cameron A study of deadlock models for a
multiservice medium access protocol
employing a Slotted Aloha signalling
channel . . . . . . . . . . . . . . . . 800--811
Gustavo De Veciana and
Takis Konstantopoulos and
Tae-Jin Lee Stability and performance analysis of
networks supporting elastic services . . 2--14
Santosh Paul Abraham and
Anurag Kumar A new approach for asynchronous
distributed rate control of elastic
sessions in integrated packet networks 15--30
Ikjun Yeom and
A. L. Narasimha Reddy Modeling TCP behavior in a
differentiated services network . . . . 31--46
Thierry Chich and
Pierre Fraigniaud and
Johanne Cohen Unslotted deflection routing: a
practical and efficient protocol for
multihop optical networks . . . . . . . 47--59
Guangzhi Li and
Rahul Simha On the wavelength assignment problem in
multifiber WDM star and ring networks 60--68
Faisal Shad and
Terence D. Todd and
Vytas Kezys and
John Litva Dynamic slot allocation (DSA) in indoor
SDMA/TDMA using smart antenna
basestation . . . . . . . . . . . . . . 69--81
Baruch Awerbuch and
Yuval Shavitt Topology aggregation for directed graphs 82--90
Mario Gerla and
Emilio Leonardi and
Fabio Neri and
Prasasth Palnati Routing in the bidirectional shufflenet 91--103
Emilio Leonardi and
Marco Mellia and
Fabio Neri and
Marco Ajmone Marsan On the stability of input-queued
switches with speed-up . . . . . . . . . 104--118
S.-H Gary Chan and
Fouad Tobagi Distributed servers architecture for
networked video services . . . . . . . . 125--136
Eylem Ekici and
Ian F. Akyildiz and
Michael D. Bender A distributed routing algorithm for
datagram traffic in LEO satellite
networks . . . . . . . . . . . . . . . . 137--147
Srikanth V. Krishnamurthy and
Anthony S. Acampora and
Michele Zorzi Polling-based media access protocols for
use with smart adaptive array antennas 148--161
Anees Shaikh and
Jennifer Rexford and
Kang G. Shin Evaluating the impact of stale link
state on quality-of-service routing . . 162--176
Katsuyoshi Iida and
Tetsuya Takine and
Hideki Sunahara and
Yuji Oie Delay analysis for CBR traffic under
static-priority scheduling . . . . . . . 177--185
Rajesh M. Krishnaswamy and
Kumar N. Sivarajan Design of logical topologies: a linear
formulation for wavelength-routed
optical networks with no wavelength
changers . . . . . . . . . . . . . . . . 186--198
Jingyu Qiu and
Edward W. Knightly Measurement-based admission control with
aggregate traffic envelopes . . . . . . 199--210
Shahrokh Valaee A recursive estimator of worst-case
burstiness . . . . . . . . . . . . . . . 211--222
Stefan Savage and
David Wetherall and
Anna Karlin and
Tom Anderson Network support for IP traceback . . . . 226--237
Paul Barford and
Mark Crovella Critical path analysis of TCP
transactions . . . . . . . . . . . . . . 238--248
Mikkel Christiansen and
Kevin Jeffay and
David Ott and
F. Donelson Smith Tuning RED for Web traffic . . . . . . . 249--264
Anja Feldmann and
Albert Greenberg and
Carsten Lund and
Nick Reingold and
Jennifer Rexford and
Fred True Deriving traffic demands for operational
IP networks: methodology and experience 265--280
N. G. Duffield and
Matthias Grossglauser Trajectory sampling for direct traffic
observation . . . . . . . . . . . . . . 280--292
Craig Labovitz and
Abha Ahuja and
Abhijit Bose and
Farnam Jahanian Delayed Internet routing convergence . . 293--306
Ian F. Akyildiz and
Giacomo Morabito and
Sergio Palazzo TCP-Peach: a new congestion control
scheme for satellite IP networks . . . . 307--321
Song Chong and
Sangho Lee and
Sungho Kang A simple, scalable, and stable explicit
rate allocation algorithm for MAX-MIN
flow control with minimum rate guarantee 322--335
Vincent W. S. Wong and
Mark E. Lewis and
Victor C. M. Leung Stochastic control of path optimization
for inter-switch handoffs in wireless
ATM networks . . . . . . . . . . . . . . 336--350
J. Siwko and
I. Rubin Connection admission control for
capacity-varying networks with
stochastic capacity change times . . . . 351--360
Hairong Sun and
Xinyu Zang and
Kishor S. Trivedi Performance of broadcast and unknown
server (BUS) in ATM LAN emulation . . . 361--372
Verus Pronk and
Jan Korst Comments on ``Carry-over Round Robin: A
Simple Cell Scheduling Mechanism for ATM
networks'' . . . . . . . . . . . . . . . 373--373
Sanjay Shakkottai and
Anurag Kumar and
Aditya Karnik and
Ajit Anvekar TCP performance over end-to-end rate
control and stochastic available
capacity . . . . . . . . . . . . . . . . 377--391
Sally Floyd and
Vern Paxson Difficulties in simulating the Internet 392--403
Pablo Rodriguez and
Christian Spanner and
Ernst W. Biersack Analysis of Web caching architectures:
hierarchical and distributed caching . . 404--418
Ian F. Akyildiz and
Inwhee Joe and
Henry Driver and
Yung-Lung Ho An adaptive FEC scheme for data traffic
in wireless ATM networks . . . . . . . . 419--426
Zygmunt J. Haas and
Marc R. Pearlman The performance of query control schemes
for the zone routing protocol . . . . . 427--438
Oran Sharon and
Eitan Altman An efficient polling MAC for wireless
LANs . . . . . . . . . . . . . . . . . . 439--451
Zhi-Ren Chang and
I-Chung Lee and
Cheng-Shang Chang and
Chien-Hsin Li and
Ben-Li Sui A novel scheme using the information of
departure processes for delay guarantees
of distributed VBR traffic . . . . . . . 452--463
Arnaud Legout and
Jörg Nonnenmacher and
Ernst W. Biersack Bandwidth-allocation policies for
unicast and multicast flows . . . . . . 464--478
Shalabh Bhatnagar and
Michael C. Fu and
Steven I. Marcus and
Pedram J. Fard Optimal structured feedback policies for
ABR flow control using two-timescale
SPSA . . . . . . . . . . . . . . . . . . 479--491
Yishay Mansour and
Boaz Patt-Shamir Jitter control in QoS networks . . . . . 492--502
Jonathan P. Lang and
Vishal Sharma and
Emmanouel A. Varvarigos An analysis of oblivious and adaptive
routing in optical networks with
wavelength translation . . . . . . . . . 503--517
Xiaojun Shen and
Fan Yang and
Yi Pan Equivalent permutation capabilities
between time-division optical omega
networks and non-optical extra-stage
omega networks . . . . . . . . . . . . . 518--524
Paul Francis and
Sugih Jamin and
Cheng Jin and
Yixin Jin and
Danny Raz and
Yuval Shavitt and
Lixia Zhang IDMaps: a global Internet host distance
estimation service . . . . . . . . . . . 525--540
Maurizio A. Bonuccelli and
M. Claudia Cl\`o Scheduling of real-time messages in
optical broadcast-and-select networks 541--552
G. Mohan and
C. Siva Ram Murthy and
Arun K. Somani Efficient algorithms for routing
dependable connections in WDM optical
networks . . . . . . . . . . . . . . . . 553--566
Ayan Banerjee and
Ronald A. Iltis and
Emmanouel A. Varvarigos Performance evaluation for a
quasi-synchronous packet radio network
(QSPNET) . . . . . . . . . . . . . . . . 567--577
Qiong Li and
David L. Mills Jitter-based delay-boundary prediction
of wide-area networks . . . . . . . . . 578--590
Brahim Bensaou and
Danny H. K. Tsang and
King Tung Chan Credit-based fair queueing (CBFQ): a
simple service-scheduling algorithm for
packet-switched networks . . . . . . . . 591--604
Vahid Tabatabaee and
Leonidas Georgiadis and
Leandros Tassiulas QoS provisioning and tracking fluid
policies in input queueing switches . . 605--617
Cory C. Beard and
Victor S. Frost Prioritized resource allocation for
stressed networks . . . . . . . . . . . 618--633
Sheng Ma and
Chuanyi Ji Modeling heterogeneous network traffic
in wavelet domain . . . . . . . . . . . 634--649
Manolis G. H. Katevenis and
Iakovos Mavroidis and
Georgios Sapountzis and
Eva Kalyvianaki and
Ioannis Mavroidis and
Georgios Glykopoulos Wormhole IP over (connectionless) ATM 650--661
Yiu Kwok Tham A unified algorithmic framework for
variable-rate TDM switching assignments 662--668
Efstratios Thomopoulos and
Louise E. Moser and
Peter M. Melliar-Smith Latency analysis of the totem
single-ring protocol . . . . . . . . . . 669--680
Lixin Gao and
Jennifer Rexford Stable Internet routing without global
coordination . . . . . . . . . . . . . . 681--692
Yehuda Afek and
Anat Bremler-Barr and
Sariel Har-Peled Routing with a clue . . . . . . . . . . 693--705
Paolo Narváez and
Kai-Yeung Siu and
Hong-Yi Tzeng New dynamic SPT algorithm based on a
ball-and-string model . . . . . . . . . 706--718
Piet Van Mieghem and
Gerard Hooghiemstra and
Remco van der Hofstad On the efficiency of multicast . . . . . 719--732
Lixin Gao On inferring autonomous system
relationships in the Internet . . . . . 733--745
Weilian Su and
Ian F. Akyildiz The jitter time-stamp approach for clock
recovery of real-time variable bit-rate
traffic . . . . . . . . . . . . . . . . 746--754
Han S. Kim and
Ness B. Shroff Loss probability calculations and
asymptotic analysis for finite buffer
multiplexers . . . . . . . . . . . . . . 755--768
Hannu Rummukainen and
Jorma Virtamo Polynomial cost approximations in Markov
decision theory based call admission
control . . . . . . . . . . . . . . . . 769--779
R. Radhakrishna Pillai A distributed overload control algorithm
for delay-bounded call setup . . . . . . 780--789
Mingbo Xiao and
Ness B. Shroff and
Edwin K. P. Chong Distributed admission control for
power-controlled cellular wireless
systems . . . . . . . . . . . . . . . . 790--800
Matthew K. H. Leung and
John C. S. Lui and
David K. Y. Yau Adaptive proportional delay
differentiated services:
characterization and performance
evaluation . . . . . . . . . . . . . . . 801--817
Ramesh Johari and
David Kim Hong Tan End-to-end congestion control for the
Internet: delays and stability . . . . . 818--832
James Begole and
Randall B. Smith and
Craig A. Struble and
Clifford A. Shaffer Resource sharing for replicated
synchronous groupware . . . . . . . . . 833--843
Mostafa H. Ammar Editorial . . . . . . . . . . . . . . . 1--1
Erich Nahum and
Tsipora Barzilai and
Dilip D. Kandlur Performance issues in WWW servers . . . 2--11
Constantinos Dovrolis and
Dimitrios Stiliadis and
Parameswaran Ramanathan Proportional differentiated services:
delay differentiation and packet
scheduling . . . . . . . . . . . . . . . 12--26
Martin Reisslein and
Keith W. Ross and
Srinivas Rajagopal A framework for guaranteeing statistical
QoS . . . . . . . . . . . . . . . . . . 27--42
Jorge Arturo Cobb Preserving quality of service guarantees
in spite of flow aggregation . . . . . . 43--53
Shuqian Yan and
Michalis Faloutsos and
Anindo Banerjea QoS-aware multicast routing for the
Internet: the design and evaluation of
QoSMIC . . . . . . . . . . . . . . . . . 54--66
Xi Zhang and
Kang G. Shin and
Debanjan Saha and
Dilip D. Kandlur Scalable flow control for multicast ABR
services in ATM networks . . . . . . . . 67--85
Rung-Hung Gau and
Zygmunt J. Haas and
Bhaskar Krishnamachari On multicast flow control for
heterogeneous receivers . . . . . . . . 86--101
Dean H. Lorenz and
Ariel Orda Optimal partition of QoS requirements on
unicast paths and multicast trees . . . 102--114
Aref Meddeb and
André Girard and
Catherine Rosenberg The impact of point-to-multipoint
traffic concentration on multirate
networks design . . . . . . . . . . . . 115--124
Guoqiang Mao and
Daryoush Habibi Loss performance analysis for
heterogeneous \sc ON-OFF sources with
application to connection admission
control . . . . . . . . . . . . . . . . 125--138
Srivatsan Varadarajan and
Hung Q. Ngo and
Jaideep Srivastava Error spreading: a perception-driven
approach to handling error in continuous
media streaming . . . . . . . . . . . . 139--152
Muriel Médard and
Richard A. Barry and
Steven G. Finn and
Wenbo He and
Steven S. Lumetta Generalized loop-back recovery in
optical mesh networks . . . . . . . . . 153--164
Dan Rubenstein and
Jim Kurose and
Don Towsley The impact of multicast layering on
network fairness . . . . . . . . . . . . 169--182
Eylem Ekici and
Ian F. Akyildiz and
Michael D. Bender A multicast routing algorithm for LEO
satellite IP networks . . . . . . . . . 183--192
Mark A. Smith and
K. K. Ramakrishnan Formal specification and verification of
safety and performance of TCP selective
acknowledgment . . . . . . . . . . . . . 193--207
Xi-Ren Cao and
Hong-Xia Shen and
Rodolfo Milito and
Patrica Wirth Internet pricing with a game theoretical
approach: concepts and examples . . . . 208--216
Costas A. Courcoubetis and
Antonis Dimakis and
George D. Stamoulis Traffic equivalence and substitution in
a multiplexer with applications to
dynamic available capacity estimation 217--231
Timothy G. Griffin and
F. Bruce Shepherd and
Gordon Wilfong The stable paths problem and interdomain
routing . . . . . . . . . . . . . . . . 232--243
Xin Yuan Heuristic algorithms for
multiconstrained quality-of-service
routing . . . . . . . . . . . . . . . . 244--256
Si Wu and
K. Y. Michael Wong and
Bo Li A dynamic call admission policy with
precision QoS guarantee using stochastic
control for mobile wireless networks . . 257--271
Richard J. La and
Venkat Anantharam Utility-based rate control in the
Internet for elastic traffic . . . . . . 272--286
Aleksandra Smiljani\'c Flexible bandwidth allocation in
high-capacity packet switches . . . . . 287--293
Suchitra Raman and
Hari Balakrishnan and
Murari Srinivasan ITP: an Image Transport Protocol for the
Internet . . . . . . . . . . . . . . . . 297--307
Mohamed G. Gouda and
E. N. (Mootaz) Elnozahy and
Chin-Tser Huang and
Tommy M. McGuire Hop integrity in computer networks . . . 308--319
Laurent Massoulié and
James Roberts Bandwidth sharing: objectives and
algorithms . . . . . . . . . . . . . . . 320--328
Jean-Yves Le Boudec Some properties of variable length
packet shapers . . . . . . . . . . . . . 329--337
Lampros Kalampoukas and
Anujan Varma and
K. K. Ramakrishnan Explicit window adaptation: a method to
enhance TCP performance . . . . . . . . 338--350
Ramu Ramamurthy and
Biswanath Mukherjee Fixed-alternate routing and wavelength
conversion in wavelength-routed optical
networks . . . . . . . . . . . . . . . . 351--367
Ellen L. Hahne and
Abhijit K. Choudhury Dynamic queue length thresholds for
multiple loss priorities . . . . . . . . 368--380
Dan Rubenstein and
Jim Kurose and
Don Towsley Detecting shared congestion of flows via
end-to-end measurement . . . . . . . . . 381--395
Ramachandran Ramjee and
Kannan Varadhan and
Luca Salgarelli and
Sandra R. Thuel and
Shie-Yuan Wang and
Thomas La Porta HAWAII: a domain-based approach for
supporting mobility in wide-area
wireless networks . . . . . . . . . . . 396--410
Ian F. Akyildiz and
Eylem Ekici and
Michael D. Bender MLSR: a novel routing algorithm for
multilayered satellite IP networks . . . 411--424
Ioannis Ch. Paschalidis and
Yong Liu Pricing in multiservice loss networks:
static pricing, asymptotic optimality,
and demand substitution effects . . . . 425--438
Konstantinos Psounis and
Balaji Prabhakar Efficient randomized web-cache
replacement schemes using samples from
past eviction times . . . . . . . . . . 441--455
Pablo Rodriguez and
Ernst W. Biersack Dynamic parallel access to replicated
content in the Internet . . . . . . . . 455--465
Jack Brassil and
Henning Schulzrinne Structuring Internet media streams with
cueing protocols . . . . . . . . . . . . 466--476
Matthias Grossglauser and
David N. C. Tse Mobility increases the capacity of ad
hoc wireless networks . . . . . . . . . 477--486
Elif Uysal-Biyikoglu and
Balaji Prabhakar and
Abbas El Gamal Energy-efficient packet transmission
over a wireless link . . . . . . . . . . 487--499
Augustin Chaintreau and
François Baccelli and
Christophe Diot Impact of TCP-like congestion control on
the throughput of multicast groups . . . 500--512
Wu-chang Feng and
Kang G. Shin and
Dilip D. Kandlur and
Debanjan Saha The \sc BLUE active queue management
algorithms . . . . . . . . . . . . . . . 513--528
Jon C. R. Bennett and
Kent Benson and
Anna Charny and
William F. Courtney and
Jean-Yves Le Boudec Delay jitter bounds and packet scale
rate guarantee for expedited forwarding 529--540
João Luís Sobrinho Algebra and algorithms for QoS path
computation and hop-by-hop routing in
the Internet . . . . . . . . . . . . . . 541--550
Lavy Libman and
Ariel Orda Optimal retrial and timeout strategies
for accessing network resources . . . . 551--564
Amit Kumar and
Rajeev Rastogi and
Avi Silberschatz and
Bulent Yener Algorithms for provisioning virtual
private networks in the hose model . . . 565--578
Yann d'Halluin and
Peter A. Forsyth and
Kenneth R. Vetzal Managing capacity for telecommunications
networks under uncertainty . . . . . . . 579--587
Jaeyeon Jung and
Emil Sit and
Hari Balakrishnan and
Robert Morris DNS performance and the effectiveness of
caching . . . . . . . . . . . . . . . . 589--603
Michael Mitzenmacher Compressed bloom filters . . . . . . . . 604--612
Roch Guérin and
Ariel Orda Computing shortest paths for any number
of hops . . . . . . . . . . . . . . . . 613--620
Ran Libeskind-Hadas and
Rami Melhem Multicast routing and wavelength
assignment in multihop optical networks 621--629
Zoe Antoniou and
Ioannis Stavrakakis An efficient deadline-credit-based
transport scheme for prerecorded
semisoft continuous media applications 630--643
Franco Blanchini and
Renato Lo Cigno and
Roberto Tempo Robust rate control for integrated
services packet networks . . . . . . . . 644--652
Saad Mneimneh and
Vishal Sharma and
Kai-Yeung Siu Switching using parallel input-output
queued switches with no speedup . . . . 653--665
Marco Ajmone Marsan and
Andrea Bianco and
Paolo Giaccone and
Emilio Leonardi and
Fabio Neri Packet-mode scheduling in input-queued
cell-based switches . . . . . . . . . . 666--678
N. G. Duffield and
Pawan Goyal and
Albert Greenberg and
Partho Mishra and
K. K. Ramakrishnan and
Jacobus E. van der Merwe Resource management with hoses:
point-to-cloud services for virtual
private networks . . . . . . . . . . . . 679--692
Young Lee and
James M. Tien Static and dynamic approaches to
modeling end-to-end routing in
circuit-switched networks . . . . . . . 693--705
Colleen Shannon and
David Moore and
K. C. Claffy Beyond folklore: observations on
fragmented traffic . . . . . . . . . . . 709--720
Alex C. Snoeren and
Craig Partridge and
Luis A. Sanchez and
Christine E. Jones and
Fabrice Tchakountio and
Beverly Schwartz and
Stephen T. Kent and
W. Timothy Strayer Single-packet IP traceback . . . . . . . 721--734
Evangelos P. Markatos and
Dionisios N. Pnevmatikatos and
Michail D. Flouris and
Manolis G. H. Katevenis Web-conscious storage management for Web
proxies . . . . . . . . . . . . . . . . 735--748
Yigal Bejerano and
Israel Cidon and
Joseph (Seffi) Naor Efficient handoff rerouting algorithms:
a competitive on-line algorithmic
approach . . . . . . . . . . . . . . . . 749--760
Francesco Lo Presti and
N. G. Duffield and
Joe Horowitz and
Don Towsley Multicast-based inference of
network-internal delay distributions . . 761--775
Chengzhi Li and
Edward W. Knightly Coordinated multihop scheduling: a
framework for end-to-end services . . . 776--789
Srihari Nelakuditi and
Zhi Li Zhang and
Rose P. Tsang and
David H. C. Du Adaptive proportional routing: a
localized QoS routing approach . . . . . 790--804
Cheng Shang Chang and
Rene L. Cruz and
Jean Yves Le Boudec and
Patrick Thiran A min,+ system theory for constrained
traffic regulation and dynamic service
guarantees . . . . . . . . . . . . . . . 805--817
Leonidas Georgiadis and
Panos Georgatsos and
Konstantinos Floros and
Stelios Sartzetakis Lexicographically optimal balanced
networks . . . . . . . . . . . . . . . . 818--829
Eiji Oki and
Zhigang Jing and
Roberto Rojas-Cessa and
H. Jonathan Chao Concurrent round-robin-based dispatching
schemes for Clos-network switches . . . 830--844
Mostafa Ammar Editorial . . . . . . . . . . . . . . . 1--1
Chalermek Intanagonwiwat and
Ramesh Govindan and
Deborah Estrin and
John Heidemann and
Fabio Silva Directed diffusion for wireless sensor
networking . . . . . . . . . . . . . . . 2--16
Ion Stoica and
Robert Morris and
David Liben-Nowell and
David R. Karger and
M. Frans Kaashoek and
Frank Dabek and
Hari Balakrishnan Chord: a scalable peer-to-peer lookup
protocol for Internet applications . . . 17--32
Ion Stoica and
Scott Shenker and
Hui Zhang \em Core-stateless fair queueing: a
scalable architecture to approximate
fair bandwidth allocations in high-speed
networks . . . . . . . . . . . . . . . . 33--46
Alfio Lombardo and
Giovanni Schembra Performance evaluation of an
adaptive-rate MPEG encoder matching
intserv traffic constraints . . . . . . 47--65
Neil J. Keon and
G. Anandalingam Optimal pricing for multiple services in
telecommunications networks offering
quality-of-service guarantees . . . . . 66--80
Krishna Phani Gummadi and
Madhavarapu Jnana Pradeep and
C. Siva Ram Murthy An efficient primary-segmented backup
scheme for dependable real-time
communication in multihop networks . . . 81--94
Jiafu He and
Khosrow Sohraby An extended combinatorial analysis
framework for discrete-time queueing
systems with general sources . . . . . . 95--110
R. Srinivasan and
Arun K. Somani On achieving fairness and efficiency in
high-speed shared medium access . . . . 111--124
Qing Zhao and
Lang Tong A multiqueue service room MAC protocol
for wireless networks with multipacket
reception . . . . . . . . . . . . . . . 125--137
Michael J. Neely and
Eytan Modiano and
Charles E. Rohrs Power allocation and routing in
multibeam satellites with time-varying
channels . . . . . . . . . . . . . . . . 138--152
Robert C. Chalmers and
Kevin C. Almeroth On the topology of multicast trees . . . 153--165
Joshua Auerbach and
Madan Gopal and
Marc Kaplan and
Shay Kutten Multicast group membership management 166--175
Rajeev Rastogi and
Yuri Breitbart and
Minos Garofalakis and
Amit Kumar Optimal configuration of OSPF aggregates 181--194
Anirban Mahanti and
Derek L. Eager and
Mary K. Vernon and
David J. Sundaram-Stukel Scalable on-demand media streaming with
packet loss recovery . . . . . . . . . . 195--209
Mingbo Xiao and
Ness B. Shroff and
Edwin K. P. Chong A utility-based power-control scheme in
wireless cellular systems . . . . . . . 210--221
Do Young Eun and
Ness B. Shroff A measurement-analytic approach for QoS
estimation in a network based on the
dominant time scale . . . . . . . . . . 222--235
Aysegül Gençata and
Biswanath Mukherjee Virtual-topology adaptation for WDM mesh
networks under dynamic traffic . . . . . 236--247
Hui Zang and
Canhui Ou and
Biswanath Mukherjee Path-protection routing and wavelength
assignment (RWA) in WDM mesh networks
under duct-layer constraints . . . . . . 248--258
Asuman E. Ozdaglar and
Dimitri P. Bertsekas Routing and wavelength assignment in
optical networks . . . . . . . . . . . . 259--272
Kayi Lee and
Kai-Yeung Siu On the reconfigurability of single-hub
WDM ring networks . . . . . . . . . . . 273--284
Hongyue Zhu and
Hui Zang and
Keyao Zhu and
Biswanath Mukherjee A novel generic graph model for traffic
grooming in heterogeneous WDM mesh
networks . . . . . . . . . . . . . . . . 285--299
Michael Dahlin and
Bharat Baddepudi V. Chandra and
Lei Gao and
Amol Nayate End-to-end WAN service availability . . 300--313
Sundar Iyer and
Nick W. McKeown Analysis of the parallel packet switch
architecture . . . . . . . . . . . . . . 314--324
Man Chi Chan and
Tony T. Lee Statistical performance guarantees in
large-scale cross-path packet switch . . 325--337
Andrzej Karbowski Comments on ``Optimization flow control,
I: Basic algorithm and convergence'' . . 338--339
Shudong Jin and
Liang Guo and
Ibrahim Matta and
Azer Bestavros A spectrum of TCP-friendly window-based
congestion control algorithms . . . . . 341--355
Jim Martin and
Arne Nilsson and
Injong Rhee Delay-based congestion avoidance for TCP 356--369
Farooq Anjum and
Leandros Tassiulas Comparative study of various TCP
versions over a wireless link with
correlated losses . . . . . . . . . . . 370--383
Turgay Korkmaz and
Marwan Krunz Bandwidth-delay constrained path
selection under inaccurate state
information . . . . . . . . . . . . . . 384--398
Murali Kodialam and
T. V. Lakshman Dynamic routing of restorable
bandwidth-guaranteed tunnels using
aggregated network resource usage
information . . . . . . . . . . . . . . 399--410
David Starobinski and
Mark Karpovsky and
Lev A. Zakrevski Application of network calculus to
general topologies using
turn-prohibition . . . . . . . . . . . . 411--421
Huirong Fu and
Edward W. Knightly A simple model of real-time flow
aggregation . . . . . . . . . . . . . . 422--435
Xi Zhang and
Kang G. Shin Delay analysis of
feedback-synchronization signaling for
multicast flow control . . . . . . . . . 436--450
Mario Baldi and
Yoram Ofek A comparison of ring and tree embedding
for real-time group multicast . . . . . 451--464
Marco Ajmone Marsan and
Andrea Bianco and
Paolo Giaccone and
Emilio Leonardi and
Fabio Neri Multicast traffic in input-queued
switches: optimal scheduling and maximum
throughput . . . . . . . . . . . . . . . 465--477
Hakyong Kim and
Kiseon Kim Performance analysis of the multiple
input-queued packet switch with the
restricted rule . . . . . . . . . . . . 478--487
Alvin C. Fu and
Eytan Modiano and
John N. Tsitsiklis Optimal energy allocation and admission
control for communications satellites 488--500
Andrea Fumagalli and
Isabella Cerutti and
Marco Tacca Optimal design of survivable mesh
networks based on line switched WDM
self-healing rings . . . . . . . . . . . 501--512
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 513--513
Georgos Siganos and
Michalis Faloutsos and
Petros Faloutsos and
Christos Faloutsos Power laws and the AS-level Internet
topology . . . . . . . . . . . . . . . . 514--524
Steven H. Low A duality model of TCP and queue
management algorithms . . . . . . . . . 525--536
Manish Jain and
Constantinos Dovrolis End-to-end available bandwidth:
measurement methodology, dynamics, and
relation with TCP throughput . . . . . . 537--549
Matthias Grossglauser and
David N. C. Tse A time-scale decomposition approach to
measurement-based admission control . . 550--563
Dmitri Loguinov and
Hayder Radha End-to-end rate-based congestion
control: convergence properties and
scalability analysis . . . . . . . . . . 564--577
Ariel Orda and
Alexander Sprintson Precomputation schemes for QoS routing 578--591
Hemant M. Chaskar and
Upamanyu Madhow Fair scheduling with tunable latency: a
round-robin approach . . . . . . . . . . 592--601
John N. Daigle and
Marcos Nascimento Magalhães Analysis of packet networks having
contention-based reservation with
application to GPRS . . . . . . . . . . 602--615
Roberto Rojas-Cessa and
Eiji Oki and
H. Jonathan Chao Concurrent fault detection for a
multiple-plane packet switch . . . . . . 616--627
Mihail L. Sichitiu and
Peter H. Bauer and
Kamal Premaratne The effect of uncertain time-variant
delays in ATM networks with explicit
rate feedback: a control theoretic
approach . . . . . . . . . . . . . . . . 628--637
Uttam K. Sarkar and
Subramanian Ramakrishnan and
Dilip Sarkar Modeling full-length video using
Markov-modulated Gamma-based framework 638--649
Sartaj Sahni and
Kun Suk Kim Efficient construction of multibit tries
for IP lookup . . . . . . . . . . . . . 650--662
Mohamed G. Gouda and
Marco Schneider Maximizable routing metrics . . . . . . 663--675
Murali Kodialam and
T. V. Lakshman and
Sudipta Sengupta Online multicast routing with bandwidth
guarantees: a new approach using
multicast network flow . . . . . . . . . 676--686
Srisankar Kunniyur and
R. Srikant End-to-end congestion control schemes:
utility functions, random losses and ECN
marks . . . . . . . . . . . . . . . . . 689--702
Song Cen and
Pamela C. Cosman and
Geoffrey M. Voelker End-to-end differentiation of congestion
and wireless losses . . . . . . . . . . 703--717
Ben Liang and
Zygmunt J. Haas Predictive distance-based mobility
management for multidimensional PCS
networks . . . . . . . . . . . . . . . . 718--732
Peter Marbach Priority service and max-min fairness 733--746
Athina P. Markopoulou and
Fouad A. Tobagi and
Mansour J. Karam Assessing the quality of voice
communications over Internet backbones 747--760
Guangzhi Li and
Dongmei Wang and
Charles Kalmanek and
Robert Doverspike Efficient distributed restoration path
selection for shared mesh restoration 761--771
Koushik Kar and
Murali Kodialam and
T. V. Lakshman Routing restorable bandwidth guaranteed
connections using maximum $2$-route
flows . . . . . . . . . . . . . . . . . 772--781
Ralf Koetter and
Muriel Médard An algebraic approach to network coding 782--795
Mariusz A. Fecko and
M. Ümit Uyar and
Ali Y. Duale and
Paul D. Amer A technique to generate feasible tests
for communications systems with multiple
timers . . . . . . . . . . . . . . . . . 796--809
Jean-Yves Le Boudec and
Anna Charny Packet scale rate guarantee for non-FIFO
nodes . . . . . . . . . . . . . . . . . 810--820
Sem Borst and
Michel Mandjes and
Miranda van Uitert Generalized processor sharing with
light-tailed and heavy-tailed input . . 821--834
Brian Towles and
William J. Dally Guaranteed scheduling for switches with
configuration overhead . . . . . . . . . 835--847
Matthew Andrews and
Lisa Zhang Achieving stability in networks of
input-queued switches . . . . . . . . . 848--857
Saad Mneimneh and
Kai-Yeung Siu On achieving throughput in an
input-queued switch . . . . . . . . . . 858--867
Ellen Zegura Editorial . . . . . . . . . . . . . . . 869--869
Zhenhai Duan and
Zhi-Li Zhang and
Yiwei Thomas Hou Service overlay networks: SLAs, QoS, and
bandwidth provisioning . . . . . . . . . 870--883
Lixin Gao and
Zhi-Li Zhang and
Don Towsley Proxy-assisted techniques for delivering
continuous multimedia streams . . . . . 884--894
Supratik Bhattacharyya and
James F. Kurose and
Don Towsley and
Ramesh Nagarajan Efficient rate-controlled bulk data
transfer using multiple multicast groups 895--907
X. Brian Zhang and
Simon S. Lam and
Dong-Young Lee and
Y. Richard Yang Protocol design for scalable and
reliable group rekeying . . . . . . . . 908--922
Mark Karol and
S. Jamaloddin Golestani and
David Lee Prevention of deadlocks and livelocks in
lossless backpressured packet networks 923--934
Tapan Kumar Nayak and
Kumar N. Sivarajan Dimensioning optical networks under
traffic growth models . . . . . . . . . 935--947
Daniel P. Heyman and
David Lucantoni Modeling multiple IP traffic streams
with rate limits . . . . . . . . . . . . 948--958
Biplab Sikdar and
Shivkumar Kalyanaraman and
Kenneth S. Vastola Analytic models for the latency and
steady-state throughput of TCP Tahoe,
Reno, and SACK . . . . . . . . . . . . . 959--971
Sanjay Shakkottai and
R. Srikant and
Sean P. Meyn Bounds on the throughput of congestion
controllers in the presence of feedback
delay . . . . . . . . . . . . . . . . . 972--981
Xiaohong Jiang and
Hong Shen and
Md. Mamun-ur-Rashid Khandker and
Susumu Horiguchi Blocking behaviors of crosstalk-free
optical Banyan networks on vertical
stacking . . . . . . . . . . . . . . . . 982--993
Peng-Yong Kong and
Kee-Chaing Chua and
Brahim Bensaou A novel scheduling scheme to share
dropping ratio while guaranteeing a
delay bound in a multiCode-CDMA network 994--1006
Ellen Zegura Editorial . . . . . . . . . . . . . . . 1--1
Neil Spring and
Ratul Mahajan and
David Wetherall and
Thomas Anderson Measuring ISP topologies with rocketfuel 2--16
King-Shan Lui and
Klara Nahrstedt and
Shigang Chen Routing with topology aggregation in
delay-bandwidth sensitive networks . . . 17--29
Daniel Zappala Alternate path routing for multicast . . 30--43
Ahmed Helmy and
Sandeep Gupta and
Deborah Estrin The STRESS method for boundary-point
performance analysis of end-to-end
multicast timer-suppression mechanisms 44--58
Admela Jukan and
Gerald Franzl Path selection methods with multiple
constraints in service-guaranteed WDM
networks . . . . . . . . . . . . . . . . 59--72
Pin-Han Ho and
Hussein T. Mouftah Reconfiguration of spare capacity for
MPLS-based recovery in the Internet
backbone networks . . . . . . . . . . . 73--84
Violeta Gambiroza and
Ping Yuan and
Laura Balzano and
Yonghe Liu and
Steve Sheafor and
Edward Knightly Design, analysis, and implementation of
DVSR: a fair high-performance protocol
for packet rings . . . . . . . . . . . . 85--102
Xudong Wang Wide-band TD-CDMA MAC with minimum-power
allocation and rate- and BER-scheduling
for wireless multimedia networks . . . . 103--116
Rung-Hung Gau and
Zygmunt J. Haas Concurrent search of mobile users in
cellular networks . . . . . . . . . . . 117--130
Wei Li and
Xiuli Chao Modeling and performance evaluation of a
cellular mobile network . . . . . . . . 131--145
Zuji Mao and
Christos Douligeris A distributed database architecture for
global roaming in next-generation mobile
networks . . . . . . . . . . . . . . . . 146--160
Dongyu Qiu and
Ness B. Shroff A predictive flow control scheme for
efficient network utilization and QoS 161--172
Célio Albuquerque and
Brett J. Vickers and
Tatsuya Suda Network border patrol: preventing
congestion collapse and promoting
fairness in the Internet . . . . . . . . 173--186
Ben-Jye Chang and
Ren-Hung Hwang Performance analysis for hierarchical
multirate loss networks . . . . . . . . 187--199
Ion Stoica and
Daniel Adkins and
Shelley Zhuang and
Scott Shenker and
Sonesh Surana Internet indirection infrastructure . . 205--218
Subhabrata Sen and
Jia Wang Analyzing peer-to-peer traffic across
large networks . . . . . . . . . . . . . 219--232
James R. Challenger and
Paul Dantzig and
Arun Iyengar and
Mark S. Squillante and
Li Zhang Efficiently serving dynamic data at
highly accessed Web sites . . . . . . . 233--246
Emmanuel Léty and
Thierry Turletti and
François Baccelli SCORE: a scalable communication protocol
for large-scale virtual environments . . 247--260
David Watson and
Matthew Smart and
G. Robert Malan and
Farnam Jahanian Protocol scrubbing: network security
through transparent flow modification 261--273
Supratim Deb and
R. Srikant Congestion control for fair resource
allocation in networks with multicast
flows . . . . . . . . . . . . . . . . . 274--285
Srisankar S. Kunniyur and
R. Srikant An adaptive virtual queue (AVQ)
algorithm for active queue management 286--299
Michele Garetto and
Renato Lo Cigno and
Michela Meo and
Marco Ajmone Marsan Closed queueing network models of
interacting long-lived TCP flows . . . . 300--311
Peter Marbach Analysis of a static pricing scheme for
priority services . . . . . . . . . . . 312--325
Shengquan Wang and
Dong Xuan and
Riccardo Bettati and
Wei Zhao Providing absolute differentiated
services for real-time applications in
static-priority scheduling networks . . 326--339
Moses Charikar and
Joseph Naor and
Baruch Schieber Resource optimization in QoS multicast
routing of real-time multimedia . . . . 340--348
Shanchieh Jay Yang and
Gustavo De Veciana Enhancing both network and user
performance for networks supporting best
effort traffic . . . . . . . . . . . . . 349--360
Mingyan Liu and
John S. Baras Fixed point approximation for multirate
multihop loss networks with
state-dependent routing . . . . . . . . 361--374
Jeff R. K. Hartline and
Ran Libeskind-Hadas and
Kurt M. Dresner and
Ethan W. Drucker and
Katrina J. Ray Optimal virtual topologies for
one-to-many communication in WDM paths
and rings . . . . . . . . . . . . . . . 375--383
Ashwin Sridharan and
Kumar N. Sivarajan Blocking in all-optical networks . . . . 384--397
Yuri Breitbart and
Minos Garofalakis and
Ben Jai and
Cliff Martin and
Rajeev Rastogi and
Avi Silberschatz Topology discovery in heterogeneous IP
networks: the \em NetInventory system 401--414
Constantino M. Lagoa and
Hao Che and
Bernardo A. Movsichoff Adaptive control algorithms for
decentralized optimal traffic
engineering in the Internet . . . . . . 415--428
Raymond R.-F. Liao and
Andrew T. Campbell Dynamic core provisioning for
quantitative differentiated services . . 429--442
Alfio Lombardo and
Giacomo Morabito and
Giovanni Schembra A novel analytical framework compounding
statistical traffic modeling and
aggregate-level service curve
disciplines: network performance and
efficiency implications . . . . . . . . 443--455
Christos Papadopoulos and
Guru Parulkar and
George Varghese Light-weight multicast services (LMS): a
router-assisted scheme for reliable
multicast . . . . . . . . . . . . . . . 456--468
Pavlin Radoslavov and
Christos Papadopoulos and
Ramesh Govindan and
Deborah Estrin A comparison of application-level and
router-assisted hierarchical schemes for
reliable multicast . . . . . . . . . . . 469--482
Danny Raz and
Yuval Shavitt and
Lixia Zhang Distributed council election . . . . . . 483--492
Wei Ye and
John Heidemann and
Deborah Estrin Medium access control with coordinated
adaptive sleeping for wireless sensor
networks . . . . . . . . . . . . . . . . 493--506
Peng-Jun Wan and
Gruia Cãlinescu and
Chih-Wei Yi Minimum-power multicast routing in
static ad hoc wireless networks . . . . 507--514
Feng Xie and
Joseph L. Hammond and
Daniel L. Noneaker Steady-state analysis of a
split-connection scheme for Internet
access through a wireless terminal . . . 515--525
Xiangdong Qin and
Yuanyuan Yang Multicast connection capacity of WDM
switching networks with limited
wavelength conversion . . . . . . . . . 526--538
Timothy Y. Chow and
Fabian Chudak and
Anthony M. Ffrench Fast optical layer mesh protection using
pre-cross-connected trails . . . . . . . 539--548
C. Y. Li and
P. K. A. Wai and
Victor O. K. Li The decomposition of a blocking model
for connection-oriented networks . . . . 549--558
Yu-Chee Tseng and
Yu-Chi Chueh and
Jang-Ping Sheu Seamless channel transition for the
staircase video broadcasting scheme . . 559--571
Yongtao Gong and
Peiyuan Lee and
Wanyi Gu Comments on ``Dynamic wavelength routing
using congestion and neighborhood
information'' . . . . . . . . . . . . . 572--572
Vijay K. Gurbani and
Xian-He Sun Terminating telephony services on the
Internet . . . . . . . . . . . . . . . . 571--581
Hani Jamjoom and
Padmanabhan Pillai and
Kang G. Shin Resynchronization and controllability of
bursty service requests . . . . . . . . 582--594
Prince Samar and
Marc R. Pearlman and
Zygmunt J. Haas Independent zone routing: an adaptive
hybrid routing framework for ad hoc
wireless networks . . . . . . . . . . . 595--608
Jae-Hwan Chang and
Leandros Tassiulas Maximum lifetime routing in wireless
sensor networks . . . . . . . . . . . . 609--619
Natalija Vlajic and
Charalambos D. Charalambous and
Dimitrios Makrakis Performance aspects of data broadcast in
wireless networks with user retrials . . 620--633
Özgür B. Akan and
Ian F. Akyildiz ARC: the analytical rate control scheme
for real-time traffic in wireless
networks . . . . . . . . . . . . . . . . 634--644
Yiu Kwok Tham Scheduling satellite-switched
time-division multiple access with
general switching modes . . . . . . . . 645--652
Yan Sun and
Wade Trappe and
K. J. Ray Liu A scalable multicast key management
scheme for heterogeneous wireless
networks . . . . . . . . . . . . . . . . 653--666
Xi Zhang and
Kang G. Shin Markov-chain modeling for multicast
signaling delay analysis . . . . . . . . 667--680
Luciano Lenzini and
Enzo Mingozzi and
Giovanni Stea Tradeoffs between low complexity, low
latency, and fairness with deficit
round-robin schedulers . . . . . . . . . 681--693
Ao Tang and
Jiantao Wang and
Steven H. Low Understanding CHOKe: throughput and
spatial characteristics . . . . . . . . 694--707
Zhili Zhao and
Swaroop Darbha and
A. L. Narasimha Reddy A method for estimating the proportion
of nonresponsive traffic at a router . . 708--718
James Aweya and
Michel Ouellette and
Delfin Y. Montuno Design and stability analysis of a rate
control algorithm using the
Routh--Hurwitz stability criterion . . . 719--732
Jaudelice C. de Oliveira and
Caterina Scoglio and
Ian F. Akyildiz and
George Uhl New preemption policies for
DiffServ-aware traffic engineering to
minimize rerouting in MPLS networks . . 733--745
Hanoch Levy and
Tsippy Mendelson and
Gilad Goren Dynamic allocation of resources to
virtual path agents . . . . . . . . . . 746--758
Lachlan L. H. Andrew Fast simulation of wavelength continuous
WDM networks . . . . . . . . . . . . . . 759--765
John W. Byers and
Jeffrey Considine and
Michael Mitzenmacher and
Stanislav Rost Informed content delivery across
adaptive overlay networks . . . . . . . 767--780
Ludmila Cherkasova and
Minaxi Gupta Analysis of enterprise media server
workloads: access patterns, locality,
content evolution, and rates of change 781--794
Kamil Sarac and
Kevin C. Almeroth Tracetree: a scalable mechanism to
discover multicast tree topologies in
the Internet . . . . . . . . . . . . . . 795--808
Ma\lgorzata Steinder and
Adarshpal S. Sethi Probabilistic fault localization in
communication systems using belief
networks . . . . . . . . . . . . . . . . 809--822
Ruibing Hao and
David Lee and
Rakesh K. Sinha and
Nancy Griffeth Integrated system interoperability
testing with applications to VoIP . . . 823--836
Georgios Varsamopoulos and
Sandeep K. S. Gupta Dynamically adapting registration areas
to user mobility and call patterns for
efficient location management in PCS
networks . . . . . . . . . . . . . . . . 837--850
Piet Van Mieghem and
Fernando A. Kuipers Concepts of exact QoS routing algorithms 851--864
Antonis Panagakis and
Nandita Dukkipati and
Ioannis Stavrakakis and
Joy Kuri Optimal call admission control on a
single link with a GPS scheduler . . . . 865--878
Taieb F. Znati and
Rami Melhem Node delay assignment strategies to
support end-to-end delay requirements in
heterogeneous networks . . . . . . . . . 879--892
Dirceu Cavendish and
Mario Gerla and
Saverio Mascolo A control theoretical approach to
congestion control in packet networks 893--906
Ioannis Ch. Paschalidis and
Spyridon Vassilaras Importance sampling for the estimation
of buffer overflow probabilities via
trace-driven simulations . . . . . . . . 907--919
Eric Bouillet and
Jean-François Labourdette Distributed computation of shared backup
path in mesh optical networks using
probabilistic methods . . . . . . . . . 920--930
Srinivasan Ramasubramanian and
Arun K. Somani Analysis of optical networks with
heterogeneous grooming architectures . . 931--943
Arun K. Somani and
Mani Mina and
Ling Li On trading wavelengths with fibers: a
cost-performance based study . . . . . . 944--951
Cheng-Shang Chang and
Zhen Liu A bandwidth sharing theory for a large
number of HTTP-like connections . . . . 952--962
Constantinos Dovrolis and
Parameswaran Ramanathan and
David Moore Packet-dispersion techniques and a
capacity-estimation methodology . . . . 963--977
N. G. Duffield and
Francesco Lo Presti Network tomography from measured
end-to-end delay covariance . . . . . . 978--992
Yuval Shavitt and
Tomer Tankel Big-bang simulation for embedding
network distances in Euclidean space . . 993--1006
Michael Rabinovich and
Hua Wang DHTTP: an efficient and cache-friendly
transfer protocol for the Web . . . . . 1007--1020
Ian F. Akyildiz and
Wenye Wang The predictive user mobility profile
framework for wireless multimedia
networks . . . . . . . . . . . . . . . . 1021--1035
Hsiao-Hwa Chen and
Wee-Teck Tea Hierarchy schedule-sensing protocol for
CDMA wireless data-centric networks with
multiple packet collision and capture
effect . . . . . . . . . . . . . . . . . 1036--1048
Haiyun Luo and
Jiejun Kong and
Petros Zerfos and
Songwu Lu and
Lixia Zhang URSA: ubiquitous and robust access
control for mobile ad hoc networks . . . 1049--1063
Yigal Bejerano Efficient integration of multihop
wireless and wired networks with QoS
constraints . . . . . . . . . . . . . . 1064--1078
Priya Ranjan and
Eyad H. Abed and
Richard J. La Nonlinear instabilities in TCP-RED . . . 1079--1092
Scott Jordan and
Kalpana Jogi and
Chunlin Shi and
Ikhlaq Sidhu The variation of optimal bandwidth and
buffer allocation with the number of
sources . . . . . . . . . . . . . . . . 1093--1104
Pin-Han Ho and
János Tapolcai and
Tibor Cinkler Segment shared protection in mesh
communications networks with bandwidth
guaranteed tunnels . . . . . . . . . . . 1105--1118
Hongsik Choi and
Suresh Subramaniam and
Hyeong-Ah Choi Loopback recovery from double-link
failures in optical mesh networks . . . 1119--1130
Marco Ajmone Marsan and
Mirko Franceschinis and
Emilio Leonardi and
Fabio Neri and
Alessandro Tarello Underload instabilities in packet
networks with flow schedulers . . . . . 1131--1143
Chuanxiong Guo SRR: an $ O(1) $ time-complexity packet
scheduler for flows in multiservice
packet networks . . . . . . . . . . . . 1144--1155
Guillermo del Angel and
Terrence L. Fine Optimal power and retransmission control
policies for random access systems . . . 1156--1166
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 1--1
Florin Baboescu and
George Varghese Scalable packet classification . . . . . 2--14
Jun Xu and
Richard J. Lipton On fundamental tradeoffs between delay
bounds and computational complexity in
packet scheduling algorithms . . . . . . 15--28
David K. Y. Yau and
John C. S. Lui and
Feng Liang and
Yeung Yam Defending against distributed
denial-of-service attacks with max-min
fair server-centric router throttles . . 29--42
Fernando Paganini and
Zhikui Wang and
John C. Doyle and
Steven H. Low Congestion control for high performance,
stability, and fairness in general
networks . . . . . . . . . . . . . . . . 43--56
Dongyu Qiu and
Ness B. Shroff Queueing properties of feedback flow
control systems . . . . . . . . . . . . 57--68
Yong Xia and
David Harrison and
Shivkumar Kalyanaraman and
Kishore Ramachandran and
Arvind Venkatesan Accumulation-based congestion control 69--80
Ashvin Lakshmikantha and
Carolyn L. Beck and
R. Srikant Robustness of real and virtual
queue-based active queue management
schemes . . . . . . . . . . . . . . . . 81--93
Andreas Pitsillides and
Petros Ioannou and
Marios Lestas and
Loukas Rossides Adaptive nonlinear congestion controller
for a differentiated-services framework 94--107
Aditya Karnik and
Anurag Kumar Performance of TCP congestion control
with explicit rate feedback . . . . . . 108--120
Saswati Sarkar and
Leandros Tassiulas Fair distributed congestion control in
multirate multicast networks . . . . . . 121--133
Wade Trappe and
Yuke Wang and
K. J. Ray Liu Resource-aware conference key
establishment for heterogeneous networks 134--146
Li Li and
Joseph Y. Halpern and
Paramvir Bahl and
Yi-Min Wang and
Roger Wattenhofer A cone-based distributed
topology-control algorithm for wireless
multi-hop networks . . . . . . . . . . . 147--159
Guanglei Liu and
Chuanyi Ji and
Vincent W. S. Chan On the scalability of network management
information for inter-domain light-path
assessment . . . . . . . . . . . . . . . 160--172
Li-Wei Chen and
Eytan Modiano Efficient routing and wavelength
assignment for reconfigurable WDM ring
networks with wavelength converters . . 173--186
Kejie Lu and
Gaoxi Xiao and
Imrich Chlamtac Analysis of blocking probability for
distributed lightpath establishment in
WDM optical networks . . . . . . . . . . 187--197
Yu Liu and
David Tipper and
Peerapon Siripongwutikorn Approximating optimal spare capacity
allocation by successive survivable
routing . . . . . . . . . . . . . . . . 198--211
Debasis Mitra and
Qiong Wang Stochastic traffic engineering for
demand uncertainty and risk-aware
network revenue management . . . . . . . 221--233
Ashwin Sridharan and
Roch Guérin and
Christophe Diot Achieving near-optimal traffic
engineering solutions for current
OSPF/IS-IS networks . . . . . . . . . . 234--247
Hervé Kerivin and
Dritan Nace and
Thi-Tuyet-Loan Pham Design of capacitated survivable
networks with a single facility . . . . 248--261
Giuseppe Ascia and
Vincenzo Catania and
Daniela Panno An evolutionary management scheme in
high-performance packet switches . . . . 262--275
Chengzhi Li and
Edward W. Knightly Schedulability criterion and performance
analysis of coordinated schedulers . . . 276--287
Ossama Younis and
Sonia Fahmy FlowMate: scalable on-line flow
clustering . . . . . . . . . . . . . . . 288--301
Supratim Deb and
Ayalvadi Ganesh and
Peter Key Resource allocation between persistent
and transient flows . . . . . . . . . . 302--315
Marco Mellia and
Michela Meo and
Claudio Casetti TCP smart framing: a segmentation
algorithm to reduce TCP latency . . . . 316--329
Nishanth R. Sastry and
Simon S. Lam CYRF: a theory of window-based unicast
congestion control . . . . . . . . . . . 330--342
Byung-Jae Kwak and
Nah-Oak Song and
Leonard E. Miller Performance analysis of exponential
backoff . . . . . . . . . . . . . . . . 343--355
Eitan Altman and
Konstantin Avrachenkov and
Chadi Barakat A stochastic model of TCP/IP with
stationary random losses . . . . . . . . 356--369
Ying Xu and
Roch Guérin Individual QoS versus aggregate QoS: a
loss performance study . . . . . . . . . 370--383
Weilian Su and
Ian F. Akyildiz Time-diffusion synchronization protocol
for wireless sensor networks . . . . . . 384--397
Taejoon Park and
Kang G. Shin Optimal tradeoffs for location-based
routing in large-scale ad hoc networks 398--410
Atilla Eryilmaz and
R. Srikant and
James R. Perkins Stable scheduling policies for fading
wireless channels . . . . . . . . . . . 411--424
Olivier Dousse and
François Baccelli and
Patrick Thiran Impact of interferences on connectivity
in ad hoc networks . . . . . . . . . . . 425--436
Eric Bouillet and
Jean-François Labourdette and
Ramu Ramamurthy and
Sid Chaudhuri Lightpath re-optimization in mesh
optical networks . . . . . . . . . . . . 437--447
Abel Dasylva and
Delfin Y. Montuno and
Prasad Kodaypak Optimization of optical cross-connects
with wave-mixing conversion . . . . . . 448--458
Ellen W. Zegura Editorial . . . . . . . . . . . . . . . 461--461
David D. Clark and
John Wroclawski and
Karen R. Sollins and
Robert Braden Tussle in cyberspace: defining
tomorrow's Internet . . . . . . . . . . 462--475
Bong-Jun Ko and
Dan Rubenstein Distributed self-stabilizing placement
of replicated resources in emerging
networks . . . . . . . . . . . . . . . . 476--487
Wu-chang Feng and
Francis Chang and
Wu-chi Feng and
Jonathan Walpole A traffic characterization of popular
on-line games . . . . . . . . . . . . . 488--500
Dan Rubenstein and
Sambit Sahu Can unstructured P2P protocols survive
flash crowds? . . . . . . . . . . . . . 501--512
Hyuk Lim and
Jennifer C. Hou and
Chong-Ho Choi Constructing Internet coordinate system
based on delay measurement . . . . . . . 513--525
Do Young Eun and
Ness B. Shroff Network decomposition: theory and
practice . . . . . . . . . . . . . . . . 526--539
Homayoun Yousefi'zadeh and
Hamid Jafarkhani and
Amir Habibi Layered media multicast control (LMMC):
rate allocation and partitioning . . . . 540--553
Ian F. Akyildiz and
Özgür B. Akan and
Giacomo Morabito A rate control scheme for adaptive
real-time applications in IP networks
with lossy links and long round trip
times . . . . . . . . . . . . . . . . . 554--567
Milan Vojnovi\'c and
Jean-Yves Le Boudec On the long-run behavior of
equation-based rate control . . . . . . 568--581
Jiantao Wang and
Lun Li and
Steven H. Low and
John C. Doyle Cross-layer optimization in TCP/IP
networks . . . . . . . . . . . . . . . . 582--595
Saâd Biaz and
Nitin H. Vaidya ``De-randomizing'' congestion losses to
improve TCP performance over
wired-wireless networks . . . . . . . . 596--608
Hongyi Wu and
Chong Wang and
Nian-Feng Tzeng Novel self-configurable positioning
technique for multihop wireless networks 609--621
Pierre T. Kabamba and
Semyon M. Meerkov and
Choon Yik Tang Ranking and adaptive ranking CDMA . . . 622--635
Sem Borst User-level performance of channel-aware
scheduling algorithms in wireless data
networks . . . . . . . . . . . . . . . . 636--647
Yigal Bejerano and
Yuri Breitbart and
Ariel Orda and
Rajeev Rastogi and
Alexander Sprintson Algorithms for computing QoS paths with
restoration . . . . . . . . . . . . . . 648--661
Anirban Chakrabarti and
G. Manimaran Reliability constrained routing in QoS
networks . . . . . . . . . . . . . . . . 662--675
Xiang Yu and
Ian Li-Jin Thng and
Yuming Jiang and
Chunming Qiao Queueing processes in GPS and PGPS with
LRD traffic inputs . . . . . . . . . . . 676--689
Anindya Basu and
Girija Narlikar Fast incremental updates for pipelined
forwarding engines . . . . . . . . . . . 690--703
Xiaowen Chu and
Bo Li Dynamic routing and wavelength
assignment in the presence of wavelength
conversion for all-optical networks . . 704--715
Fernando A. Kuipers and
Piet F. A. Van Mieghem Conditions that impact the complexity of
QoS routing . . . . . . . . . . . . . . 717--730
Nicholas F. Maxemchuk and
Iradj Ouveysi and
Moshe Zukerman A quantitative measure for
telecommunications networks topology
design . . . . . . . . . . . . . . . . . 731--742
Yossi Chait and
C. V. Hollot and
Vishal Misra and
Don Towsley and
Honggang Zhang and
Yong Cui Throughput differentiation using
coloring at the network edge and
preferential marking at the core . . . . 743--754
David E. Taylor and
Andreas Herkersdorf and
Andreas Döring and
Gero Dittmann Robust header compression (ROHC) in
next-generation network processors . . . 755--768
Mohammad J. Akhbarizadeh and
Mehrdad Nourani Hardware-based IP routing using
partitioned lookup table . . . . . . . . 769--781
Yashar Ganjali and
Abtin Keshavarzian and
Devavrat Shah Cell switching versus packet switching
in input-queued switches . . . . . . . . 782--789
Weiguang Shi and
M. H. MacGregor and
Pawel Gburzynski Load balancing for parallel forwarding 790--801
Rama Sangireddy and
Natsuhiko Futamura and
Srinivas Aluru and
Arun K. Somani Scalable, memory efficient, high-speed
IP lookup algorithms . . . . . . . . . . 802--812
Xiaojun Lin and
Ness B. Shroff Simplification of network dynamics in
large systems . . . . . . . . . . . . . 813--826
Jang-Won Lee and
Ravi R. Mazumdar and
Ness B. Shroff Non-convex optimization and rate control
for multi-class services in the Internet 827--840
François Baccelli and
Dohy Hong Interaction of TCP flows as billiards 841--853
Jang-Won Lee and
Ravi R. Mazumdar and
Ness B. Shroff Downlink power allocation for
multi-class wireless systems . . . . . . 854--867
Murali Kodialam and
Thyaga Nandagopal Characterizing achievable rates in
multi-hop wireless mesh networks with
orthogonal channels . . . . . . . . . . 868--880
Sushant Sinha and
C. Siva Ram Murthy Information theoretic approach to
traffic adaptive WDM networks . . . . . 881--894
Poompat Saengudomlert and
Eytan H. Modiano and
Robert G. Gallager Dynamic wavelength assignment for WDM
all-optical tree networks . . . . . . . 895--905
Jean-François Labourdette and
Eric Bouillet and
Ramu Ramamurthy and
Ahmet A. Akyamaç Fast approximate dimensioning and
performance analysis of mesh optical
networks . . . . . . . . . . . . . . . . 906--917
Lu Shen and
Xi Yang and
Byrav Ramamurthy Shared risk link group (SRLG)-diverse
path provisioning under hybrid service
level agreements in wavelength-routed
optical mesh networks . . . . . . . . . 918--931
Nick Duffield and
Carsten Lund and
Mikkel Thorup Estimating flow distributions from
sampled flow statistics . . . . . . . . 933--946
Yin Zhang and
Matthew Roughan and
Carsten Lund and
David L. Donoho Estimating point-to-point and
point-to-multipoint traffic matrices: an
information-theoretic approach . . . . . 947--960
Cliff C. Zou and
Weibo Gong and
Don Towsley and
Lixin Gao The monitoring and early detection of
Internet Worms . . . . . . . . . . . . . 961--974
Rong Pan and
Balaji Prabhakar and
Konstantinos Psounis and
Damon Wischik SHRiNK: a method for enabling scaleable
performance prediction and efficient
network simulation . . . . . . . . . . . 975--988
Yuguang Fang Modeling and performance analysis for
wireless mobile networks: a new
analytical approach . . . . . . . . . . 989--1002
Özgür B. Akan and
Ian F. Akyildiz Event-to-sink reliable transport in
wireless sensor networks . . . . . . . . 1003--1016
Sarah Koskie and
Zoran Gajic A Nash game algorithm for SIR-based
power control in $3$G wireless CDMA
networks . . . . . . . . . . . . . . . . 1017--1026
Clement Yuen and
Peter Marbach Price-based rate control in random
access networks . . . . . . . . . . . . 1027--1040
Youngmi Jin and
George Kesidis Dynamics of usage-priced communication
networks: the case of a single
bottleneck resource . . . . . . . . . . 1041--1053
Yunkai Zhou and
Harish Sethu On achieving fairness in the joint
allocation of processing and bandwidth
resources: principles and algorithms . . 1054--1067
Shao Liu and
Tamer Ba\csar and
R. Srikant Exponential-RED: a stabilizing AQM
scheme for low- and high-speed TCP
protocols . . . . . . . . . . . . . . . 1068--1081
Yu-Ping Tian Stability analysis and design of the
second-order congestion control for
networks with heterogeneous delays . . . 1082--1093
Yair Amir and
Baruch Awerbuch and
Claudiu Danilov and
Jonathan Stanton A cost-benefit flow control for reliable
multicast and unicast in overlay
networks . . . . . . . . . . . . . . . . 1094--1106
Dmitri Loguinov and
Juan Casas and
Xiaoming Wang Graph-theoretic analysis of structured
peer-to-peer systems: routing distances
and fault resilience . . . . . . . . . . 1107--1120
Hui Zhang and
Ashish Goel and
Ramesh Govindan Improving lookup latency in distributed
hash table systems using random sampling 1121--1134
Xuehong Sun and
Sartaj K. Sahni and
Yiqiang Q. Zhao Packet classification consuming small
amount of memory . . . . . . . . . . . . 1135--1145
Ariel Orda and
Alexander Sprintson A scalable approach to the partition of
QoS requirements in unicast and
multicast . . . . . . . . . . . . . . . 1146--1159
João Luís Sobrinho An algebraic theory of dynamic network
routing . . . . . . . . . . . . . . . . 1160--1173
Stavroula Siachalou and
Leonidas Georgiadis Algorithms for precomputing constrained
widest paths and multicast trees . . . . 1174--1187
Wei Sun and
Kang G. Shin End-to-end delay bounds for traffic
aggregates under guaranteed-rate
scheduling algorithms . . . . . . . . . 1188--1201
David Alderson and
Lun Li and
Walter Willinger and
John C. Doyle Understanding Internet topology:
principles, models, and validation . . . 1205--1218
Graham Cormode and
S. Muthukrishnan What's new: Finding significant
differences in network data streams . . 1219--1232
Nan Jin and
Gayathri Venkitachalam and
Scott Jordan Dynamic congestion-based pricing of
bandwidth and buffer . . . . . . . . . . 1233--1246
Haining Wang and
Abhijit Bose and
Mohamed El-Gendy and
Kang G. Shin IP Easy-pass: a light-weight
network-edge resource access control . . 1247--1260
Tansu Alpcan and
Tamer Basar A globally stable adaptive congestion
control scheme for Internet-style
networks with delay . . . . . . . . . . 1261--1274
Steven Weber and
Gustavo De Veciana Rate adaptive multimedia streams:
optimization and admission control . . . 1275--1288
Marco Ajmone Marsan and
Michele Garetto and
Paolo Giaccone and
Emilio Leonardi and
Enrico Schiattarella and
Alessandro Tarello Using partial differential equations to
model TCP mice and elephants in large IP
networks . . . . . . . . . . . . . . . . 1289--1301
Shengming Jiang and
Dajiang He and
Jianqiang Rao A prediction-based link availability
estimation for routing metrics in MANETs 1302--1312
Ning Li and
Jennifer C. Hou Localized topology control algorithms
for heterogeneous wireless networks . . 1313--1324
Peter Marbach and
Ying Qiu Cooperation in wireless ad hoc networks:
a market-based approach . . . . . . . . 1325--1338
Seema Bandyopadhyay and
Qingjiang Tian and
Edward J. Coyle Spatio-temporal sampling rates and
energy efficiency in wireless sensor
networks . . . . . . . . . . . . . . . . 1339--1352
Haibin Lu and
Sartaj Sahni Conflict detection and resolution in
two-dimensional prefix router tables . . 1353--1363
Isaac Keslassy and
Murali Kodialam and
T. V. Lakshman and
Dimitrios Stiliadis On guaranteed smooth scheduling for
input-queued switches . . . . . . . . . 1364--1375
Shahrokh Valaee and
Jean-Charles Grégoire An estimator of regulator parameters in
a stochastic setting . . . . . . . . . . 1376--1389
Tao Wu and
Arun K. Somani Cross-talk attack monitoring and
localization in all-optical networks . . 1390--1401
Eric Rosenberg Hierarchical topological network design 1402--1409
Tzu-Lun Huang and
D. T. Lee Comments and an improvement on ``A
distributed algorithm of delay-bounded
multicast routing for multimedia
applications in wide area networks'' . . 1410--1411
Jang-Won Lee and
Ravi R. Mazumdar and
Ness B. Shroff Joint resource allocation and
base-station assignment for the downlink
in CDMA networks . . . . . . . . . . . . 1--14
Koushik Kar and
Ananth Krishnamurthy and
Neeraj Jaggi Dynamic node activation in networks of
rechargeable sensors . . . . . . . . . . 15--26
Zygmunt J. Haas and
Tara Small A new networking model for biological
applications of ad hoc sensor networks 27--40
Razvan Cristescu and
Baltasar Beferull-Lozano and
Martin Vetterli and
Roger Wattenhofer Network correlated data gathering with
explicit communication: NP-completeness
and algorithms . . . . . . . . . . . . . 41--54
Himanshu Gupta and
Zongheng Zhou and
Samir R. Das and
Quinyi Gu Connected sensor cover:
self-organization of sensor networks for
efficient query execution . . . . . . . 55--67
Nicolas Hohn and
Darryl Veitch Inverting sampled traffic . . . . . . . 68--80
John W. Byers and
Gu-In Kwon and
Michael Luby and
Michael Mitzenmacher Fine-grained layered multicast with
STAIR . . . . . . . . . . . . . . . . . 81--93
Priya Ranjan and
Richard J. La and
Eyad H. Abed Global stability conditions for rate
control with arbitrary communication
delays . . . . . . . . . . . . . . . . . 94--107
Peerapol Tinnakornsrisuphap and
Richard J. La Asymptotic behavior of heterogeneous TCP
flows and RED gateway . . . . . . . . . 108--120
Hyoung-Il Lee and
Seung-Woo Seo Matching output queueing with a multiple
input/output-queued switch . . . . . . . 121--132
Eveline Veloso and
Virgílio Almeida and
Wagner Meira, Jr. and
Azer Bestavros and
Shudong Jin A hierarchical characterization of a
live streaming media workload . . . . . 133--146
Dahai Xu and
Yang Chen and
Yizhi Xiong and
Chunming Qiao and
Xin He On the complexity of and algorithms for
finding the shortest path with a
disjoint counterpart . . . . . . . . . . 147--158
Andrea Fumagalli and
Marco Tacca Differentiated reliability (DiR) in
wavelength division multiplexing rings 159--168
Jianping Wang and
Xiangtong Qi and
Biao Chen Wavelength assignment for multicast in
all-optical WDM networks with splitting
constraints . . . . . . . . . . . . . . 169--182
Ian Ferrel and
Adrian Mettler and
Edward Miller and
Ran Libeskind-Hadas Virtual topologies for multicasting with
multiple originators in WDM networks . . 183--190
Hiroaki Harai and
Masayuki Murata High-speed buffer management for 40
Gb/s-based photonic packet switches . . 191--204
Hung Q. Ngo and
Dazhen Pan and
Chunming Qiao Constructions and analyses of
nonblocking WDM switches based on
arrayed waveguide grating and limited
wavelength conversion . . . . . . . . . 205--217
Canhui Ou and
Laxman H. Sahasrabuddhe and
Keyao Zhu and
Charles U. Martel and
Biswanath Mukherjee Survivable virtual concatenation for
data over SONET/SDH in optical transport
networks . . . . . . . . . . . . . . . . 218--231
Suman Banerjee and
Seungjoon Lee and
Bobby Bhattacharjee and
Aravind Srinivasan Resilient multicast using overlays . . . 237--248
Sergey Gorinsky and
Sugat Jain and
Harrick Vin and
Yongguang Zhang Design of multicast protocols robust
against inflated subscription . . . . . 249--262
Patrick P. C. Lee and
John C. S. Lui and
David K. Y. Yau Distributed collaborative key agreement
and authentication protocols for dynamic
peer groups . . . . . . . . . . . . . . 263--276
Hanoch Levy and
Haim Zlatokrilov The effect of packet dispersion on voice
applications in IP networks . . . . . . 277--288
John Musacchio and
Jean Walrand WiFi access point pricing as a dynamic
game . . . . . . . . . . . . . . . . . . 289--301
Xiaojun Lin and
Ness B. Shroff The impact of imperfect scheduling on
cross-layer congestion control in
wireless networks . . . . . . . . . . . 302--315
Mehmet C. Vuran and
Ian F. Akyildiz Spatial correlation-based collaborative
medium access control in wireless sensor
networks . . . . . . . . . . . . . . . . 316--329
Poompat Saengudomlert and
Eytan Modiano and
Robert G. Gallager On-line routing and wavelength
assignment for dynamic traffic in WDM
ring and torus networks . . . . . . . . 330--340
Zvi Rosberg and
Andrew Zalesky and
Moshe Zukerman Packet delay in optical circuit-switched
networks . . . . . . . . . . . . . . . . 341--354
Ao Tang and
Jiantao Wang and
Steven H. Low Counter-intuitive throughput behaviors
in networks under end-to-end control . . 355--368
Stephan Bohacek and
Joao P. Hespanha and
Junsoo Lee and
Chansook Lim and
Katia Obraczka A new TCP for persistent packet
reordering . . . . . . . . . . . . . . . 369--382
Liangping Ma and
Kenneth E. Barner and
Gonzalo R. Arce Statistical analysis of TCP's
retransmission timeout algorithm . . . . 383--396
Sarang Dharmapurikar and
Praveen Krishnamurthy and
David E. Taylor Longest prefix matching using Bloom
filters . . . . . . . . . . . . . . . . 397--409
Hani Jamjoom and
Kang G. Shin On the role and controllability of
persistent clients in traffic aggregates 410--423
David Lee and
Dongluo Chen and
Ruibing Hao and
Raymond E. Miller and
Jianping Wu and
Xia Yin Network protocol system monitoring: a
formal approach with passive testing . . 424--437
Yigal Bejerano and
Mark A. Smith and
Joseph (Seffi) Naor and
Nicole Immorlica Efficient location area planning for
personal communication systems . . . . . 438--450
Zesheng Chen and
Tian Bu and
Mostafa Ammar and
Don Towsley Comments on ``Modeling TCP Reno
performance: a simple model and its
empirical validation'' . . . . . . . . . 451--453
Matthias Grossglauser and
Martin Vetterli Locating mobile nodes with EASE:
learning efficient routes from encounter
histories alone . . . . . . . . . . . . 457--469
Kin-Kwong Leung and
Chi Wan Sung An opportunistic power control algorithm
for cellular network . . . . . . . . . . 470--478
Zygmunt J. Haas and
Joseph Y. Halpern and
Li Li Gossip-based ad hoc routing . . . . . . 479--491
Guillermo Barrenetxea and
Baltasar Berefull-Lozano and
Martin Vetterli Lattice networks: capacity limits,
optimal routing, and queueing behavior 492--505
Xin Wang and
Henning Schulzrinne Pricing network resources for adaptive
applications . . . . . . . . . . . . . . 506--519
Anish Arora and
Hongwei Zhang LSRP: local stabilization in shortest
path routing . . . . . . . . . . . . . . 520--531
Aman Shaikh and
Rohit Dube and
Anujan Varma Avoiding instability during graceful
shutdown of multiple OSPF routers . . . 532--542
Luís Henrique M. K. Costa and
Serge Fdida and
Otto Carlos M. B. Duarte Incremental service deployment using the
hop-by-hop multicast routing protocol 543--556
Danny Dolev and
Osnat Mokryn and
Yuval Shavitt On multicast trees: structure and size
estimation . . . . . . . . . . . . . . . 557--567
Ayalvadi J. Ganesh and
Peter B. Key and
Damien Polis and
R. Srikant Congestion notification and probing
mechanisms for endpoint admission
control . . . . . . . . . . . . . . . . 568--578
Lei Ying and
Geir E. Dullerud and
R. Srikant Global stability of Internet congestion
controllers with heterogeneous delays 579--591
Richard W. Thommes and
Mark J. Coates Deterministic packet marking for
time-varying congestion price estimation 592--602
Ji-Cheol Moon and
Byeong Gi Lee Rate-adaptive snoop: a TCP enhancement
scheme over rate-controlled lossy links 603--615
Robert Shorten and
Fabian Wirth and
Douglas Leith A positive systems model of TCP-like
congestion control: asymptotic results 616--629
Yuming Jiang Per-domain packet scale rate guarantee
for expedited forwarding . . . . . . . . 630--643
Cheng-Shang Chang and
Duan-Shin Lee and
Chi-Yao Yue Providing guaranteed rate services in
the load balanced Birkhoff--von Neumann
switches . . . . . . . . . . . . . . . . 644--656
Yu Cheng and
Weihua Zhuang Dynamic inter-SLA resource sharing in
path-oriented differentiated services
networks . . . . . . . . . . . . . . . . 657--670
Ning Cai and
Mung Chiang and
Michelle Effros and
Ralf Koetter and
Muriel Médard and
Balaji Prabhakar and
R. Srikant and
Don Towsley and
Raymond W. Yeung Introduction to the special issue on
networking and information theory . . . 2285--2288
Feng Xue and
P. R. Kumar On the $ \theta $-coverage and
connectivity of large random networks 2289--2299
Florin Ciucu and
Almut Burchard and
Jörg Liebeherr Scaling properties of statistical
end-to-end bounds in the network
calculus . . . . . . . . . . . . . . . . 2300--2312
Liang-Liang Xie and
P. R. Kumar On the path-loss attenuation regime for
positive cost and linear scaling of
transport capacity in wireless networks 2313--2328
Michael Katz and
Shlomo Shamai Relaying protocols for two colocated
users . . . . . . . . . . . . . . . . . 2329--2344
Nicholas J. A. Harvey and
Robert Kleinberg and
April Rasala Lehman On the capacity of information networks 2345--2364
Randall Dougherty and
Chris Freiling and
Kenneth Zeger Unachievability of network coding
capacity . . . . . . . . . . . . . . . . 2365--2372
Xijin Yan and
Jun Yang and
Zhen Zhang An outer bound for multisource multisink
network coding with minimum cost
consideration . . . . . . . . . . . . . 2373--2385
Michael Langberg and
Alexander Sprintson and
Jehoshua Bruck The encoding complexity of network
coding . . . . . . . . . . . . . . . . . 2386--2397
Yunnan Wu and
Kamal Jain and
Sun-Yuan Kung A unification of network coding and
tree-packing (routing) theorems . . . . 2398--2409
Chandra Chekuri and
Christina Fragouli and
Emina Soljanin On average throughput and alphabet size
in network coding . . . . . . . . . . . 2410--2424
Niranjan Ratnakar and
Gerhard Kramer The multicast capacity of deterministic
relay networks with no interference . . 2425--2432
Xue-Bin Liang Matrix games in the multicast networks:
maximum information flows with network
switching . . . . . . . . . . . . . . . 2433--2466
Zongpeng Li and
Baochun Li and
Lap Chi Lau On achieving maximum multicast
throughput in undirected networks . . . 2467--2485
Supratim Deb and
Muriel Médard and
Clifford Choute Algebraic gossip: a network coding
approach to optimal multiple rumor
mongering . . . . . . . . . . . . . . . 2486--2507
Stephen Boyd and
Arpita Ghosh and
Balaji Prabhakar and
Devavrat Shah Randomized gossip algorithms . . . . . . 2508--2530
Birsen Sirkeci-Mergen and
Anna Scaglione and
Gökhan Mergen Asymptotic analysis of multistage
cooperative broadcast in wireless
networks . . . . . . . . . . . . . . . . 2531--2550
Amin Shokrollahi Raptor codes . . . . . . . . . . . . . . 2551--2567
Abbas El Gamal and
James Mammen and
Balaji Prabhakar and
Devavrat Shah Optimal throughput-delay scaling in
wireless networks: part I: the fluid
model . . . . . . . . . . . . . . . . . 2568--2592
Jie Luo and
Anthony Ephremides On the throughput, capacity, and
stability regions of random multiple
access . . . . . . . . . . . . . . . . . 2593--2607
Desmond S. Lun and
Niranjan Ratnakar and
Muriel Médard and
Ralf Koetter and
David R. Karger and
Tracey Ho and
Ebad Ahmed and
Fang Zhao Minimum-cost multicast over coded packet
networks . . . . . . . . . . . . . . . . 2608--2623
Marcin Sikora and
J. Nicholas Laneman and
Martin Haenggi and
Daniel J. Costello, Jr. and
Thomas E. Fuja Bandwidth- and power-efficient routing
in linear wireless networks . . . . . . 2624--2633
Gang Liang and
Nina Taft and
Bin Yu A fast lightweight approach to
origin-destination IP traffic estimation
using partial measurements . . . . . . . 2634--2648
Dragan Petrovi\'c and
Kannan Ramchandran and
Jan Rabaey Overcoming untuned radios in wireless
networks with network coding . . . . . . 2649--2657
Peng-Jun Wan and
Chih-Wei Yi Coverage by randomly deployed wireless
sensor networks . . . . . . . . . . . . 2658--2669
Saikat Ray and
Wei Lai and
Ioannis Ch. Paschalidis Statistical location detection with
sensor networks . . . . . . . . . . . . 2670--2683
Leonidas Georgiadis and
Leandros Tassiulas Optimal overload response in sensor
networks . . . . . . . . . . . . . . . . 2684--2696
Rajesh Sundaresan and
Sergio Verdú Capacity of queues via point-process
channels . . . . . . . . . . . . . . . . 2697--2709
Omer Gurewitz and
Israel Cidon and
Moshe Sidi One-way delay estimation using
network-wide measurements . . . . . . . 2710--2724
An-Swol Hu and
Sergio D. Servetto On the scalability of cooperative time
synchronization in pulse-connected
networks . . . . . . . . . . . . . . . . 2725--2748
Steven A. Borbash and
Anthony Ephremides The feasibility of matchings in a
wireless network . . . . . . . . . . . . 2749--2755
Olivier Dousse and
Massimo Franceschetti and
Patrick Thiran On the throughput scaling of wireless
relay networks . . . . . . . . . . . . . 2756--2761
Ashish Khisti and
Uri Erez and
Gregory W. Wornell Fundamental limits and scaling behavior
of cooperative multicasting in wireless
networks . . . . . . . . . . . . . . . . 2762--2770
Sahand Haji Ali Ahmad and
Aleksandar Jovi\vci\'c and
Pramod Viswanath On outer bounds to the capacity region
of wireless networks . . . . . . . . . . 2770--2776
Xiaojun Lin and
Gaurav Sharma and
Ravi R. Mazumdar and
Ness B. Shroff Degenerate delay-capacity tradeoffs in
ad-hoc networks with Brownian mobility 2777--2784
Aditya Ramamoorthy and
Kamal Jain and
Philip A. Chou and
Michelle Effros Separating distributed source coding
from network coding . . . . . . . . . . 2785--2795
Ángela I. Barbero and
Òyvind Ytrehus Cycle-logical treatment for
``Cyclopathic'' networks . . . . . . . . 2795--2804
Kamal Jain and
Vijay V. Vazirani and
Gideon Yuval On the capacity of multiple unicast
sessions in undirected graphs . . . . . 2805--2809
Alexandros G. Dimakis and
Vinod Prabhakaran and
Kannan Ramchandran Decentralized erasure codes for
distributed networked storage . . . . . 2809--2816
Razvan Cristescu and
Baltasar Beferull-Lozano Lossy network correlated data gathering
with high-resolution coding . . . . . . 2817--2824
Yitzhak Birk and
Tomer Kol Coding on demand by an informed source
(ISCOD) for efficient broadcast of
different supplemental data to caching
clients . . . . . . . . . . . . . . . . 2825--2830
Massimo Franceschetti and
Ronald Meester Critical node lifetimes in random
networks via the Chen-Stein method . . . 2831--2837
Cheng-Shang Chang and
Yi-Ting Chen and
Duan-Shin Lee Constructions of optical FIFO queues . . 2838--2843
Don Towsley Editorial . . . . . . . . . . . . . . . 673--673
Ning Cai and
Mung Chiang and
Michelle Effros and
Ralf Koetter and
Muriel Médard and
Balaji Prabhakar and
R. Srikant and
Don Towsley and
Raymond W. Yeung Introduction to the special issue on
networking and information theory . . . 674--674
Don Towsley Abstracts from the IEEE transactions on
information theory, special issue, June
2006 . . . . . . . . . . . . . . . . . . 675--682
Aleksandar Kuzmanovic and
Edward W. Knightly Low-rate TCP-targeted denial of service
attacks and counter strategies . . . . . 683--696
Nick Duffield and
Francesco Lo Presti and
Vern Paxson and
Don Towsley Network loss tomography using striped
unicast probes . . . . . . . . . . . . . 697--710
David Breitgand and
Danny Raz and
Yuval Shavitt The traveling miser problem . . . . . . 711--724
Lili Qiu and
Yang Richard Yang and
Yin Zhang and
Scott Shenker On selfish routing in Internet-like
environments . . . . . . . . . . . . . . 725--738
Aleksandar Kuzmanovic and
Edward W. Knightly TCP-LP: low-priority service via
end-point congestion control . . . . . . 739--752
Jing Zhu and
Sumit Roy and
Jae H. Kim Performance modelling of TCP
enhancements in terrestrial-satellite
hybrid networks . . . . . . . . . . . . 753--766
Martin Karsten Collected experience from implementing
RSVP . . . . . . . . . . . . . . . . . . 767--778
Xinming He and
Christos Papadopoulos and
Pavlin Radoslavov Incremental deployment strategies for
router-assisted reliable multicast . . . 779--792
Sunil Kulkarni and
Aravind Iyer and
Catherine Rosenberg An address-light, integrated MAC and
routing protocol for wireless sensor
networks . . . . . . . . . . . . . . . . 793--806
Zi-Tsan Chou and
Ching-Chi Hsu and
Shin-Neng Hsu UPCF: a new point coordination function
with QoS and power management for
multimedia over wireless LANs . . . . . 807--820
Lih-feng Tsaur and
Daniel C. Lee Closed-loop architecture and protocols
for rapid dynamic spreading gain
adaptation in CDMA networks . . . . . . 821--834
Prasanna Chaporkar and
Saswati Sarkar and
Rahul Shetty Dynamic quorum policy for maximizing
throughput in limited information
multiparty MAC . . . . . . . . . . . . . 835--848
Yigal Bejerano and
Randeep S. Bhatia MiFi: a framework for fairness and QoS
assurance for current IEEE 802.11
networks with multiple access points . . 849--862
Kai Zheng and
Chengchen Hu and
Hongbin Lu and
Bin Liu A TCAM-based distributed parallel IP
lookup scheme and performance analysis 863--875
Omer Gurewitz and
Israel Cidon and
Moshe Sidi Network classless time protocol based on
clock offset optimization . . . . . . . 876--888
Hassan Naser and
Hussein T. Mouftah A joint-ONU interval-based dynamic
scheduling algorithm for Ethernet
passive optical networks . . . . . . . . 889--899
Daniel O. Awduche and
Bijan Jabbari Demand assigned capacity management
(DACM) in IP over optical (IPO) networks 900--913
Weifa Liang and
Xiaojun Shen A general approach for all-to-all
routing in multihop WDM optical networks 914--923
Cristian Estan and
George Varghese and
Michael Fisk Bitmap algorithms for counting active
flows on high-speed links . . . . . . . 925--937
Yung Yi and
Supratim Deb and
Sanjay Shakkottai Time-scale decomposition and equivalent
rate-based marking . . . . . . . . . . . 938--950
Janardhan R. Iyengar and
Paul D. Amer and
Randall Stewart Concurrent multipath transfer using SCTP
multihoming over independent end-to-end
paths . . . . . . . . . . . . . . . . . 951--964
Yaqing Huang and
Roch Guérin and
Pranav Gupta Supporting excess real-time traffic with
active drop queue . . . . . . . . . . . 965--977
Richard T. B. Ma and
Sam C. M. Lee and
John C. S. Lui and
David K. Y. Yau Incentive and service differentiation in
P2P networks: a game theoretic approach 978--991
Patrick Maillé and
Bruno Tuffin Pricing the Internet with multibid
auctions . . . . . . . . . . . . . . . . 992--1004
Vinay J. Ribeiro and
Rudolf H. Riedi and
Richard G. Baraniuk Multiscale queueing analysis . . . . . . 1005--1018
Nedo Celandroni and
Franco Davoli and
Erina Ferro and
Alberto Gotta Long-lived TCP connections via
satellite: cross-layer bandwidth
allocation, pricing, and adaptive
control . . . . . . . . . . . . . . . . 1019--1030
Tarik Taleb and
Nei Kato and
Yoshiaki Nemoto REFWA: an efficient and fair congestion
control scheme for LEO satellite
networks . . . . . . . . . . . . . . . . 1031--1044
Pavan Nuggehalli and
Vikram Srinivasan and
Carla-Fabiana Chiasserini and
Ramesh R. Rao Efficient cache placement in multi-hop
wireless networks . . . . . . . . . . . 1045--1055
Iordanis Koutsopoulos and
Leandros Tassiulas Cross-layer adaptive techniques for
throughput enhancement in wireless
OFDM-based networks . . . . . . . . . . 1056--1066
Matthew Andrews and
Lisa Zhang Scheduling over nonstationary wireless
channels with finite rate sets . . . . . 1067--1077
Wee-Seng Soh and
Hyong S. Kim A predictive bandwidth reservation
scheme using mobile positioning and road
topology information . . . . . . . . . . 1078--1091
Yigal Bejerano and
Rajeev Rastogi Robust monitoring of link delays and
faults in IP networks . . . . . . . . . 1092--1103
Narendra K. Singhal and
Laxman H. Sahasrabuddhe and
Biswanath Mukherjee Optimal multicasting of multiple
light-trees of different bandwidth
granularities in a WDM mesh network with
sparse splitting capabilities . . . . . 1104--1117
Zvi Rosberg and
Andrew Zalesky and
Hai L. Vu and
Moshe Zukerman Analysis of OBS networks with limited
wavelength conversion . . . . . . . . . 1118--1127
Yinian Mao and
Yan Sun and
Min Wu and
K. J. Ray Liu JET: dynamic join-exit-tree amortization
and scheduling for contributory key
management . . . . . . . . . . . . . . . 1128--1140
Frank K. Hwang and
Wen-Dar Lin and
Vadim Lioubimov On noninterruptive rearrangeable
networks . . . . . . . . . . . . . . . . 1141--1149
Guillermo Barrenetxea and
Baltasar Beferull-Lozano and
Martin Vetterli Correction to `Lattice networks:
Capacity limits, optimal routing, and
queueing behavior' . . . . . . . . . . . 1150--1150
Jean-Yves Le Boudec and
Milan Vojnovic The random trip model: stability,
stationary regime, and perfect
simulation . . . . . . . . . . . . . . . 1153--1166
Jerzy Konorski A game-theoretic study of CSMA/CA under
a backoff attack . . . . . . . . . . . . 1167--1178
Chun-Ting Chou and
Kang G. Shin and
Sai Shankar N. Contention-based airtime usage control
in multirate IEEE 802.11 wireless LANs 1179--1192
David Applegate and
Edith Cohen Making routing robust to changing
traffic demands: algorithms and
evaluation . . . . . . . . . . . . . . . 1193--1206
Eddie Kohler and
Jinyang Li and
Vern Paxson and
Scott Shenker Observed structure of addresses in IP
traffic . . . . . . . . . . . . . . . . 1207--1218
Bamba Gueye and
Artur Ziviani and
Mark Crovella and
Serge Fdida Constraint-based geolocation of Internet
hosts . . . . . . . . . . . . . . . . . 1219--1232
Srinivas Shakkottai and
R. Srikant Economics of network pricing with
multiple ISPs . . . . . . . . . . . . . 1233--1245
David X. Wei and
Cheng Jin and
Steven H. Low and
Sanjay Hegde FAST TCP: motivation, architecture,
algorithms, performance . . . . . . . . 1246--1259
Huaizhong Han and
Srinivas Shakkottai and
C. V. Hollot and
R. Srikant and
Don Towsley Multi-path TCP: a joint congestion
control and routing scheme to exploit
path diversity in the Internet . . . . . 1260--1271
Dritan Nace and
Nhat-Linh Doan and
Eric Gourdin and
Bernard Liau Computing optimal max-min fair resource
allocation for elastic flows . . . . . . 1272--1281
Wei-Hua Wang and
Marimuthu Palaniswami and
Steven H. Low Application-oriented flow control:
fundamentals, algorithms and fairness 1282--1291
Anthony C. Boucouvalas and
Pi Huang OBEX over IrDA: performance analysis and
optimization by considering multiple
applications . . . . . . . . . . . . . . 1292--1301
Jacob Chakareski and
Philip A. Chou RaDiO edge: rate-distortion optimized
proxy-driven streaming from the network
edge . . . . . . . . . . . . . . . . . . 1302--1312
Xingzhe Fan and
Kartikeya Chandrayana and
Murat Arcak and
Shivkumar Kalyanaraman and
John Ting-Yung Wen A two-time-scale design for edge-based
detection and rectification of
uncooperative flows . . . . . . . . . . 1313--1322
Feng Xie and
Gang Feng and
Chee Kheong Siew The impact of loss recovery on
congestion control for reliable
multicast . . . . . . . . . . . . . . . 1323--1335
Dean H. Lorenz and
Ariel Orda and
Danny Raz and
Yuval Shavitt Efficient QoS partition and routing of
unicast and multicast . . . . . . . . . 1336--1347
Xiaojun Lin and
Ness B. Shroff An optimization-based approach for QoS
routing in high-bandwidth networks . . . 1348--1361
Sriram Ramabhadran and
Joseph Pasquale The Stratified Round Robin scheduler:
design, analysis and implementation . . 1362--1373
Michael Rosenblum and
Constantine Caramanis and
Michel X. Goemans and
Vahid Tarokh Approximating fluid schedules in
crossbar packet-switches and Banyan
networks . . . . . . . . . . . . . . . . 1374--1387
Maher Ali Generalized sharing in survivable
optical networks . . . . . . . . . . . . 1388--1399
Nathaniel E. Baughman and
Marc Liberatore and
Brian Neil Levine Cheat-proof playout for centralized and
peer-to-peer gaming . . . . . . . . . . 1--13
Ramana Rao Kompella and
Sumeet Singh and
George Varghese On scalable attack detection in the
network . . . . . . . . . . . . . . . . 14--25
Ramaswamy Ramaswamy and
Tilman Wolf High-speed prefix-preserving IP address
anonymization for passive measurement
systems . . . . . . . . . . . . . . . . 26--39
Haining Wang and
Cheng Jin and
Kang G. Shin Defense against spoofed IP traffic using
hop-count filtering . . . . . . . . . . 40--53
Sharad Jaiswal and
Gianluca Iannaccone and
Christophe Diot and
Jim Kurose and
Don Towsley Measurement and classification of
out-of-sequence packets in a Tier-1 IP
backbone . . . . . . . . . . . . . . . . 54--66
Dogu Arifler and
Gustavo de Veciana and
Brian L. Evans A factor analytic approach to inferring
congestion sharing based on flow level
measurements . . . . . . . . . . . . . . 67--79
Caixia Chi and
Dawei Huang and
David Lee and
XiaoRong Sun Lazy flooding: a new technique for
information dissemination in distributed
network systems . . . . . . . . . . . . 80--92
Seung Jun Baek and
Gustavo De Veciana Spatial energy balancing through
proactive multipath routing in wireless
multihop networks . . . . . . . . . . . 93--104
Ioannis Ch. Paschalidis and
Wei Lai and
David Starobinski Asymptotically optimal transmission
policies for large-scale low-power
wireless sensor networks . . . . . . . . 105--118
Jakob Eriksson and
Michalis Faloutsos and
Srikanth V. Krishnamurthy DART: dynamic address routing for
scalable ad hoc and mesh networks . . . 119--132
Yung Yi and
Sanjay Shakkottai Hop-by-hop congestion control over a
wireless multi-hop network . . . . . . . 133--144
Liang Song and
Dimitrios Hatzinakos A cross-layer architecture of wireless
sensor networks for target tracking . . 145--158
David Malone and
Ken Duffy and
Doug Leith Modeling the 802.11 distributed
coordination function in nonsaturated
heterogeneous conditions . . . . . . . . 159--172
Zongming Fei and
Mengkun Yang A proactive tree recovery mechanism for
resilient overlay multicast . . . . . . 173--186
Seong-Ryong Kang and
Dmitri Loguinov Modeling best-effort and FEC streaming
of scalable video in lossy network
channels . . . . . . . . . . . . . . . . 187--200
Guoliang Xue and
Arunabha Sen and
Weiyi Zhang and
Jian Tang and
Krishnaiya Thulasiraman Finding a path subject to many additive
QoS constraints . . . . . . . . . . . . 201--211
Yong Lee and
Jianyu Lou and
Junzhou Luo and
Xiaojun Shen An efficient packet scheduling algorithm
with deadline guarantees for
input-queued switches . . . . . . . . . 212--225
Ayman G. Fayoumi and
Anura P. Jayasumana A surjective-mapping based model for
optical shared-buffer cross-connect . . 226--233
Zhenghao Zhang and
Yuanyuan Yang On-line optimal wavelength assignment in
WDM networks with shared wavelength
converter pool . . . . . . . . . . . . . 234--245
Nick Feamster and
Jennifer Rexford Network-wide prediction of BGP routes 253--266
Giuseppe Di Battista and
Thomas Erlebach and
Alexander Hall and
Maurizio Patrignani and
Maurizio Pizzonia and
Thomas Schank Computing the types of the relationships
between autonomous systems . . . . . . . 267--280
Ping Ji and
Zihui Ge and
Jim Kurose and
Don Towsley A comparison of hard-state and
soft-state signaling protocols . . . . . 281--294
Predrag R. Jelenkovi\'c and
Petar Mom\vcilovi\'c and
Mark S. Squillante Scalability of wireless networks . . . . 295--308
Ping Chung Ng and
Soung Chang Liew Throughput analysis of IEEE802.11
multi-hop ad hoc networks . . . . . . . 309--322
Gennaro Boggia and
Pietro Camarda and
Luigi Alfredo Grieco and
Saverio Mascolo Feedback-based control for providing
real-time services with the 802.11e MAC 323--333
Hai Liu and
Xiaohua Jia and
Peng-Jun Wan and
Chih-Wei Yi and
S. Kami Makki and
Niki Pissinou Maximizing lifetime of sensor
surveillance systems . . . . . . . . . . 334--345
Seyit A. Çamtepe and
Bülent Yener Combinatorial design of key distribution
mechanisms for wireless sensor networks 346--358
Srihari Nelakuditi and
Sanghwan Lee and
Yinzhe Yu and
Zhi-Li Zhang and
Chen-Nee Chuah Fast local rerouting for handling
transient link failures . . . . . . . . 359--372
Sonia Fahmy and
Minseok Kwon Characterizing overlay multicast
networks and their costs . . . . . . . . 373--386
Marjan Bozinovski and
Hans P. Schwefel and
Ramjee Prasad Maximum availability server selection
policy for efficient and reliable
session control systems . . . . . . . . 387--399
Mansoor Alicherry and
Randeep Bhatia Simple pre-provisioning scheme to enable
fast restoration . . . . . . . . . . . . 400--412
Ron Banner and
Ariel Orda Multipath routing algorithms for
congestion minimization . . . . . . . . 413--424
Alexandre O. Stauffer and
Valmir C. Barbosa Probabilistic heuristics for
disseminating information in networks 425--435
Nicholas B. Chang and
Mingyan Liu Controlled flooding search in a large
network . . . . . . . . . . . . . . . . 436--449
Aggelos Ioannou and
Manolis G. H. Katevenis Pipelined heap (priority queue)
management for advanced scheduling in
high-speed networks . . . . . . . . . . 450--461
Haibin Lu and
Sartaj Sahni $ O(\log W) $ multidimensional packet
classification . . . . . . . . . . . . . 462--472
Eli Brosh and
Asaf Levin and
Yuval Shavitt Approximation and heuristic algorithms
for minimum-delay application-layer
multicast trees . . . . . . . . . . . . 473--484
Augustin Soule and
Antonio Nucci and
Rene L. Cruz and
Emilio Leonardi and
Nina Taft Estimating dynamic traffic matrices by
using viable routing changes . . . . . . 485--498
David E. Taylor and
Jonathan S. Turner ClassBench: a packet classification
benchmark . . . . . . . . . . . . . . . 499--511
Mortada Mehyar and
Demetri Spanos and
John Pongsajapan and
Steven H. Low and
Richard M. Murray Asynchronous distributed averaging on
communication networks . . . . . . . . . 512--520
Iordanis Koutsopoulos and
Leandros Tassiulas Joint optimal access point selection and
channel assignment in wireless networks 521--532
Ashutosh Sabharwal and
Ahmad Khoshnevis and
Edward Knightly Opportunistic spectral usage: bounds and
a multi-band CSMA/CA protocol . . . . . 533--545
Karthikeyan Sundaresan and
Raghupathy Sivakumar A unified MAC layer framework for ad-hoc
networks with smart antennas . . . . . . 546--559
Yigal Bejerano and
Seung-Jae Han and
Li Li Fairness and load balancing in wireless
LANs using association control . . . . . 560--573
Mehmet C. Vuran and
Ian F. Akyildiz A-MAC: adaptive medium access control
for next generation wireless terminals 574--587
Anurag Kumar and
Eitan Altman and
Daniele Miorandi and
Munish Goyal New insights from a fixed-point analysis
of single cell IEEE 802.11 WLANs . . . . 588--601
Denizhan N. Alparslan and
Khosrow Sohraby A generalized random mobility model for
wireless ad hoc networks and its
analysis: one-dimensional case . . . . . 602--615
Denizhan N. Alparslan and
Khosrow Sohraby Two-dimensional modeling and analysis of
generalized random mobility models for
wireless ad hoc networks . . . . . . . . 616--629
Junsoo Lee and
Stephan Bohacek and
João P. Hespanha and
Katia Obraczka Modeling communication networks with
hybrid systems . . . . . . . . . . . . . 630--643
Derek Leonard and
Zhongmei Yao and
Vivek Rai and
Dmitri Loguinov On lifetime-based node failure and
stochastic resilience of decentralized
peer-to-peer networks . . . . . . . . . 644--656
Michael J. Neely and
Eytan Modiano and
Yuan-Sheng Cheng Logarithmic delay for $ N \times N $
packet switches under the crossbar
constraint . . . . . . . . . . . . . . . 657--668
Nicolas Christin and
Jörg Liebeherr and
Tarek Abdelzaher Enhancing class-based service
architectures with adaptive rate
allocation and dropping mechanisms . . . 669--682
Balaji Krithikaivasan and
Yong Zeng and
Kaushik Deka and
Deep Medhi ARCH-based traffic forecasting and
dynamic bandwidth provisioning for
periodically measured nonstationary
traffic . . . . . . . . . . . . . . . . 683--696
Cheng Chen and
Zheng Guo Li and
Yeng Chai Soh MRF: a framework for source and
destination based bandwidth
differentiation service . . . . . . . . 697--708
Massimo Tornatore and
Guido Maier and
Achille Pattavina WDM network design by ILP models based
on flow aggregation . . . . . . . . . . 709--720
Chunsheng Xin Blocking analysis of dynamic traffic
grooming in mesh WDM optical networks 721--733
Ron Banner and
Ariel Orda The power of tuning: a novel approach
for the efficient design of survivable
networks . . . . . . . . . . . . . . . . 737--749
Kwok Shing Ho and
Kwok Wai Cheung Generalized survivable network . . . . . 750--760
Renata Teixeira and
Timothy G. Griffin and
Mauricio G. C. Resende and
Jennifer Rexford TIE breaking: tunable interdomain egress
selection . . . . . . . . . . . . . . . 761--774
Xiaowei Yang and
David Clark and
Arthur W. Berger NIRA: a new inter-domain routing
architecture . . . . . . . . . . . . . . 775--788
Antonio Nucci and
Supratik Bhattacharyya and
Nina Taft and
Christophe Diot IGP link weight assignment for
operational Tier-1 backbones . . . . . . 789--802
Smita Rai and
Omkar Deshpande and
Canhui Ou and
Charles U. Martel and
Biswanath Mukherjee Reliable multipath provisioning for
high-capacity backbone mesh networks . . 803--812
Bernardo A. Movsichoff and
Constantino M. Lagoa and
Hao Che End-to-end optimal algorithms for
integrated QoS, traffic engineering, and
failure recovery . . . . . . . . . . . . 813--823
Ao Tang and
Jiantao Wang and
Steven H. Low and
Mung Chiang Equilibrium of heterogeneous congestion
control: existence and uniqueness . . . 824--837
Yueping Zhang and
Seong-Ryong Kang and
Dmitri Loguinov Delay-independent stability and
performance of distributed congestion
control . . . . . . . . . . . . . . . . 838--851
Injong Rhee and
Lisong Xu Limitations of equation-based congestion
control . . . . . . . . . . . . . . . . 852--865
Robert N. Shorten and
Douglas J. Leith On queue provisioning, network
efficiency and the transmission control
protocol . . . . . . . . . . . . . . . . 866--877
Yanping Zhao and
Derek L. Eager and
Mary K. Vernon Network bandwidth requirements for
scalable on-demand streaming . . . . . . 878--891
Xiaoming Wang and
Dmitri Loguinov Load-balancing performance of consistent
hashing: asymptotic analysis of random
node join . . . . . . . . . . . . . . . 892--905
Pi-Chung Wang and
Chun-Liang Lee and
Chia-Tai Chan and
Hung-Yi Chang Performance improvement of
two-dimensional packet classification by
filter rephrasing . . . . . . . . . . . 906--917
Xiliang Liu and
Kaliappa Ravindran and
Dmitri Loguinov A queueing-theoretic foundation of
available bandwidth estimation:
single-hop analysis . . . . . . . . . . 918--931
Reuven Cohen and
Liran Katzir A generic quantitative approach to the
scheduling of synchronous packets in a
shared uplink wireless channel . . . . . 932--943
Gábor Fodor and
Miklós Telek Bounding the blocking probabilities in
multirate CDMA networks supporting
elastic services . . . . . . . . . . . . 944--956
Xiaojun Cao and
Vishal Anand and
Chunming Qiao Waveband switching for dynamic traffic
demands in multigranular optical
networks . . . . . . . . . . . . . . . . 957--968
Hung Q. Ngo and
Dazhen Pan and
Yuanyuan Yang Optical switching networks with minimum
number of limited-range wavelength
converters . . . . . . . . . . . . . . . 969--979
Gaurav Sharma and
Ravi Mazumdar and
Ness B. Shroff Delay and capacity trade-offs in mobile
ad hoc networks: a global perspective 981--992
Richard J. La and
Yijie Han Distribution of path durations in mobile
ad hoc networks and path selection . . . 993--1006
Daji Qiao and
Sunghyun Choi and
Kang G. Shin Interference analysis and transmit power
control in IEEE 802.11a/h wireless LANs 1007--1020
Longbi Lin and
Ness B. Shroff and
R. Srikant Asymptotically optimal energy-aware
routing for multihop wireless networks
with renewable energy sources . . . . . 1021--1034
Aditya Karnik and
Anurag Kumar Distributed optimal self-organization in
ad hoc wireless sensor networks . . . . 1035--1045
Shailesh Patil and
Gustavo De Veciana Managing resources and quality of
service in heterogeneous wireless
systems exploiting opportunism . . . . . 1046--1058
Robert Schweller and
Zhichun Li and
Yan Chen and
Yan Gao and
Ashish Gupta and
Yin Zhang and
Peter A. Dinda and
Ming-Yang Kao and
Gokhan Memik Reversible sketches: enabling monitoring
and analysis over high-speed data
streams . . . . . . . . . . . . . . . . 1059--1072
Bozidar Radunovi\'c and
Jean-Yves Le Boudec A unified framework for max-min and
min-max fairness with applications . . . 1073--1083
Yan Chen and
David Bindel and
Han Hee Song and
Randy H. Katz Algebra-based scalable overlay network
monitoring: algorithms, evaluation, and
applications . . . . . . . . . . . . . . 1084--1097
Yasong Jin and
Soshant Bali and
Tyrone E. Duncan and
Victor S. Frost Predicting properties of congestion
events for a queueing system with fBm
traffic . . . . . . . . . . . . . . . . 1098--1108
Yee-Ting Li and
Douglas Leith and
Robert N. Shorten Experimental evaluation of TCP protocols
for high-speed networks . . . . . . . . 1109--1122
Olivier Bonaventure and
Clarence Filsfils and
Pierre François Achieving sub-50 milliseconds recovery
upon BGP peering link failures . . . . . 1123--1135
Anton Riedl and
Dominic A. Schupke Routing optimization in IP networks
utilizing additive and concave link
metrics . . . . . . . . . . . . . . . . 1136--1148
Yanping Zhao and
Derek L. Eager and
Mary K. Vernon Scalable on-demand streaming of
nonlinear media . . . . . . . . . . . . 1149--1162
Jikai Li and
Chunming Qiao and
Jinhui Xu and
Dahai Xu Maximizing throughput for optical burst
switching networks . . . . . . . . . . . 1163--1176
Jing Zhang and
Keyao Zhu and
Hui Zang and
Norman S. Matloff and
Biswanath Mukherjee Availability-aware provisioning
strategies for differentiated protection
services in wavelength-convertible WDM
mesh networks . . . . . . . . . . . . . 1177--1190
Zhenghao Zhang and
Yuanyuan Yang A novel analytical model for switches
with shared buffer . . . . . . . . . . . 1191--1203
Dijiang Huang and
Manish Mehta and
Appie van de Liefvoort and
Deep Medhi Modeling pairwise key establishment for
random key predistribution in
large-scale sensor networks . . . . . . 1204--1215
Long Le and
Jay Aikat and
Kevin Jeffay and
F. Donelson Smith The effects of active queue management
and explicit congestion notification on
Web performance . . . . . . . . . . . . 1217--1230
Thomas Voice Stability of multi-path dual congestion
control algorithms . . . . . . . . . . . 1231--1239
Prashanth Hande and
Shengyu Zhang and
Mung Chiang Distributed rate allocation for
inelastic flows . . . . . . . . . . . . 1240--1253
Patrick G. Bridges and
Gary T. Wong and
Matti Hiltunen and
Richard D. Schlichting and
Matthew J. Barrick A configurable and extensible transport
protocol . . . . . . . . . . . . . . . . 1254--1265
Nick Feamster and
Ramesh Johari and
Hari Balakrishnan Implications of autonomy for the
expressiveness of policy routing . . . . 1266--1279
Pierre François and
Olivier Bonaventure Avoiding transient loops during the
convergence of link-state routing
protocols . . . . . . . . . . . . . . . 1280--1292
Gábor Rétvári and
József J. Bíró and
Tibor Cinkler On shortest path representation . . . . 1293--1306
Jin Xiao and
Raouf Boutaba Assessing network service profitability:
modeling from market science perspective 1307--1320
Amos Beimel and
Shlomi Dolev and
Noam Singer RT oblivious erasure correcting . . . . 1321--1332
Atilla Eryilmaz and
R. Srikant Fair resource allocation in wireless
networks using queue-length-based
scheduling and congestion control . . . 1333--1344
Mohammad Taghi Hajiaghayi and
Nicole Immorlica and
Vahab S. Mirrokni Power optimization in fault-tolerant
topology control algorithms for wireless
multi-hop networks . . . . . . . . . . . 1345--1358
Ritesh Madan and
Shuguang Cui and
Sanjay Lall and
Andrea J. Goldsmith Modeling and optimization of
transmission schemes in
energy-constrained wireless sensor
networks . . . . . . . . . . . . . . . . 1359--1372
Yaling Yang and
Jun Wang and
Robin Kravets Distributed optimal contention window
control for elastic traffic in
single-cell wireless LANs . . . . . . . 1373--1386
Xiangying Yang and
Gustavo De Veciana Inducing multiscale clustering using
multistage MAC contention in CDMA ad hoc
networks . . . . . . . . . . . . . . . . 1387--1400
Huiyu Luo and
Gregory J. Pottie Designing routes for source coding with
explicit side information in sensor
networks . . . . . . . . . . . . . . . . 1401--1413
Sandro Bosio and
Antonio Capone and
Matteo Cesana Radio planning of wireless local area
networks . . . . . . . . . . . . . . . . 1414--1427
Satish Raghunath and
K. K. Ramakrishnan and
Shivkumar Kalyanaraman Measurement-based characterization of IP
VPNs . . . . . . . . . . . . . . . . . . 1428--1441
Chengzhi Li and
Almut Burchard and
Jörg Liebeherr A network calculus with effective
bandwidth . . . . . . . . . . . . . . . 1442--1453
Paolo Valente Exact GPS simulation and optimal fair
scheduling with logarithmic complexity 1454--1466
Fang Hao and
Murali Kodialam and
T. V. Lakshman and
Shantidev Mohanty Fast, memory efficient flow rate
estimation using runs . . . . . . . . . 1467--1477
Jie Lian and
Kshirasagar Naik and
Gordon B. Agnew A framework for evaluating the
performance of cluster algorithms for
hierarchical networks . . . . . . . . . 1478--1489
Patrick P. C. Lee and
Vishal Misra and
Dan Rubenstein Distributed algorithms for secure
multipath routing in attack-resistant
networks . . . . . . . . . . . . . . . . 1490--1501
Heng Yin and
Haining Wang Building an application-aware IPsec
policy system . . . . . . . . . . . . . 1502--1513
Yan Sun and
K. J. Ray Liu Hierarchical group access control for
secure multicast communications . . . . 1514--1526
Javier Salido and
Loukas Lazos and
Radha Poovendran Energy and bandwidth-efficient key
distribution in wireless ad hoc
networks: a cross-layer approach . . . . 1527--1540
Emilio Leonardi and
Marco Mellia and
Marco Ajmone Marsan and
Fabio Neri Optimal scheduling and routing for
maximum network throughput . . . . . . . 1541--1554
Olufemi Komolafe and
David Harle An holistic framework for regular
virtual topology design . . . . . . . . 1555--1564
Haitham S. Hamza and
Jitender S. Deogun WDM optical interconnects: a balanced
design approach . . . . . . . . . . . . 1565--1578
Piotr Cho\lda and
Andrzej Jajszczyk Reliability assessment of optical
p-cycles . . . . . . . . . . . . . . . . 1579--1592
Mordechai Shalom and
Shmuel Zaks A $ 10 / 7 + \epsilon $ approximation
for minimizing the number of ADMs in
SONET rings . . . . . . . . . . . . . . 1593--1602
François Abel and
Cyriel Minkenberg and
Ilias Iliadis and
Ton Engbersen and
Mitchell Gusat and
Ferdinand Gramsamer and
Ronald P. Luijten Design issues in next-generation
merchant switch fabrics . . . . . . . . 1603--1615
Hongbin Luo and
Hongfang Yu and
Lemin Li Comments on `Segment shared protection
in mesh communication networks with
bandwidth guaranteed tunnels' . . . . . 1616--1616
Ram Keralapura and
Chen-Nee Chuah and
Nina Taft and
Gianluca Iannaccone Race conditions in coexisting overlay
networks . . . . . . . . . . . . . . . . 1--14
Michael T. Goodrich Probabilistic packet marking for
large-scale IP traceback . . . . . . . . 15--24
Yuval Shavitt and
Tomer Tankel Hyperbolic embedding of Internet graph
for distance estimation and overlay
construction . . . . . . . . . . . . . . 25--36
Nick Duffield and
Matthias Grossglauser Trajectory sampling with unreliable
reporting . . . . . . . . . . . . . . . 37--50
Fabian Kuhn and
Roger Wattenhofer and
Aaron Zollinger An algorithmic approach to geographic
routing in ad hoc and sensor networks 51--62
Thrasyvoulos Spyropoulos and
Konstantinos Psounis and
Cauligi S. Raghavendra Efficient routing in intermittently
connected mobile networks: the
single-copy case . . . . . . . . . . . . 63--76
Thrasyvoulos Spyropoulos and
Konstantinos Psounis and
Cauligi S. Raghavendra Efficient routing in intermittently
connected mobile networks: the
multiple-copy case . . . . . . . . . . . 77--90
Aditya Akella and
Bruce Maggs and
Srinivasan Seshan and
Anees Shaikh On the performance benefits of
multihoming route control . . . . . . . 91--104
Shigang Chen and
Meongchul Song and
Sartaj Sahni Two techniques for fast computation of
constrained shortest paths . . . . . . . 105--115
Venugopalan Ramasubramanian and
Daniel Mossé BRA: a bidirectional routing abstraction
for asymmetric mobile ad hoc networks 116--129
Xiliang Liu and
Kaliappa Ravindran and
Dmitri Loguinov A stochastic foundation of available
bandwidth estimation: multi-hop analysis 130--143
Maulin Patel and
R. Chandrasekaran and
S. Venkatesan Improved quasi-path restoration in mesh
networks . . . . . . . . . . . . . . . . 144--156
Srinivasan Ramasubramanian and
Amit Chandak Dual-link failure resiliency through
backup link mutual exclusion . . . . . . 157--169
Aleksandra Smiljanic Rate and delay guarantees provided by
Clos packet switches with load balancing 170--181
Ilias Iliadis and
Cyriel Minkenberg Performance of a speculative
transmission scheme for
scheduling-latency reduction . . . . . . 182--195
R. L. Cruz and
Saleh Al-Harthi A service-curve framework for packet
scheduling with switch configuration
delays . . . . . . . . . . . . . . . . . 196--205
Saad Mneimneh Matching from the first iteration: an
iterative switching algorithm for an
input queued switch . . . . . . . . . . 206--217
Adam Kirsch and
Michael Mitzenmacher Simple summaries for hashing with
choices . . . . . . . . . . . . . . . . 218--231
Xin Wang and
Henning Schulzrinne and
Dilip Kandlur and
Dinesh Verma Measurement and analysis of LDAP
performance . . . . . . . . . . . . . . 232--243
William Lau and
Gustav Filip Rosenbaum and
Sanjay Jha Comments on `Dynamic routing of
restorable bandwidth-guaranteed tunnels
using aggregated network resource usage
information' . . . . . . . . . . . . . . 244--245
Yuh-Ming Chiu and
Do Young Eun Minimizing file download time in
stochastic peer-to-peer networks . . . . 253--266
Daniel Stutzbach and
Reza Rejaie and
Subhabrata Sen Characterizing unstructured overlay
topologies in modern P2P file-sharing
systems . . . . . . . . . . . . . . . . 267--280
Kin-Wah Kwong and
H. K. Tsang Building heterogeneous peer-to-peer
networks: protocol and analysis . . . . 281--292
Lukas Kencl and
Jean-Yves Le Boudec Adaptive load sharing for network
processors . . . . . . . . . . . . . . . 293--306
Joel Sommers and
Paul Barford and
Nick Duffield and
Amos Ron A geometric approach to improving active
packet loss measurement . . . . . . . . 307--320
Y. Thomas Hou and
Yi Shi and
Hanif D. Sherali Rate allocation and network lifetime
problems for wireless sensor networks 321--334
Nima Sarshar and
Behnam A. Rezaei and
Vwani P. Roychowdhury Low latency wireless ad hoc networking:
power and bandwidth challenges and a
solution . . . . . . . . . . . . . . . . 335--346
Honghai Zhang and
Jennifer C. Hou Asymptotic critical total power for
$k$-connectivity of wireless networks 347--358
Vehbi Cagri Gungor and
Özgür B. Akan and
Ian F. Akyildiz A real-time and reliable transport
(RT)$^2$ protocol for wireless sensor
and actor networks . . . . . . . . . . . 359--370
Isabella Cerutti and
Andrea Fumagalli and
Puja Gupta Delay models of single-source
single-relay cooperative ARQ protocols
in slotted radio networks with Poisson
frame arrivals . . . . . . . . . . . . . 371--382
Holger Boche and
Martin Schubert A superlinearly and globally convergent
algorithm for power control and resource
allocation with general interference
functions . . . . . . . . . . . . . . . 383--395
Michael J. Neely and
Eytan Modiano and
Chih-Ping Li Fairness and optimal stochastic control
for heterogeneous networks . . . . . . . 396--409
Seung Yeob Nam and
Sunggon Kim and
Dan Keun Sung Measurement-based admission control at
edge routers . . . . . . . . . . . . . . 410--423
Zafar Ali and
Waseem Sheikh and
Edwin K. P. Chong and
Arif Ghafoor A scalable call admission control
algorithm . . . . . . . . . . . . . . . 424--434
Minsu Shin and
Song Chong and
Injong Rhee Dual-resource TCP/AQM for
processing-constrained networks . . . . 435--449
Christina Fragouli and
Jörg Widmer and
Jean-Yves Le Boudec Efficient broadcasting using network
coding . . . . . . . . . . . . . . . . . 450--463
Violet R. Syrotiuk and
Charles J. Colbourn and
Sruthi Yellamraju Rateless forward error correction for
topology-transparent scheduling . . . . 464--472
Srinivasan Ramasubramanian and
Arun K. Somani MICRON: a framework for connection
establishment in optical networks . . . 473--485
Dongmei Wang and
Guangzhi Li Efficient distributed bandwidth
management for MPLS fast reroute . . . . 486--495
Aditya Akella and
Bruce Maggs and
Srinivasan Seshan and
Anees Shaikh and
Ramesh K. Sitaraman Corrections to `On the performance
benefits of multihoming route control' 496--496
Sachin Katti and
Hariharan Rahul and
Wenjun Hu and
Dina Katabi and
Muriel Médard and
Jon Crowcroft XORs in the air: practical wireless
network coding . . . . . . . . . . . . . 497--510
Injong Rhee and
Ajit Warrier and
Mahesh Aia and
Jeongki Min and
Mihail L. Sichitiu Z-MAC: a hybrid MAC for wireless sensor
networks . . . . . . . . . . . . . . . . 511--524
Archan Misra and
Abhishek Roy and
Sajal K. Das Information-theory based optimal
location management schemes for
integrated multi-system wireless
networks . . . . . . . . . . . . . . . . 525--538
Behcet Sarikaya and
Xiao Zheng SIP paging and tracking of wireless LAN
hosts for VoIP . . . . . . . . . . . . . 539--548
Karthik Lakshminarayanan and
Daniel Adkins and
Adrian Perrig and
Ion Stoica Securing user-controlled routing
infrastructures . . . . . . . . . . . . 549--561
Seong Soo Kim and
A. L. Narasimha Reddy Statistical techniques for detecting
traffic anomalies through packet header
data . . . . . . . . . . . . . . . . . . 562--575
Haifeng Yu and
Michael Kaminsky and
Phillip B. Gibbons and
Abraham D. Flaxman SybilGuard: defending against sybil
attacks via social networks . . . . . . 576--589
Yung-Ming Li and
Yong Tan and
Yong-Pin Zhou Analysis of scale effects in
peer-to-peer networks . . . . . . . . . 590--602
Laurent Massoulié and
Milan Vojnovic Coupon replication systems . . . . . . . 603--616
Fabián E. Bustamante and
Yi Qiao Designing less-structured P2P systems
for the expected high churn . . . . . . 617--627
Xunqi Yu and
James W. Modestino and
Ragip Kurceren and
Yee Sin Chan A model-based approach to evaluation of
the efficacy of FEC coding in combating
network packet losses . . . . . . . . . 628--641
Weiyi Zhang and
Guoliang Xue and
Jian Tang and
Krishnaiyan Thulasiraman Faster algorithms for construction of
recovery trees enhancing QoP and QoS . . 642--655
Guoliang Xue and
Weiyi Zhang and
Jian Tang and
Krishnaiyan Thulasiraman Polynomial time approximation algorithms
for multi-constrained QoS routing . . . 656--669
Jian Chu and
Chin-Tau Lea New architecture and algorithms for fast
construction of hose-model VPNs . . . . 670--679
Chen-Shu Wang and
Ching-Ter Chang Integrated genetic algorithm and goal
programming for network topology design
problem with multiple objectives and
multiple criteria . . . . . . . . . . . 680--690
Reuven Cohen and
Gabi Nakibly On the computational complexity and
effectiveness of $N$-hub shortest-path
routing . . . . . . . . . . . . . . . . 691--704
Sundar Iyer and
Ramana Rao Kompella and
Nick McKeown Designing packet buffers for router
linecards . . . . . . . . . . . . . . . 705--717
Si-Min He and
Shu-Tao Sun and
Hong-Tao Guan and
Qiang Zheng and
You-Jian Zhao and
Wen Gao On guaranteed smooth switching for
buffered crossbar switches . . . . . . . 718--731
Xiaohong Jiang and
Achille Pattavina and
Susumu Horiguchi Strictly nonblocking $f$-cast photonic
networks . . . . . . . . . . . . . . . . 732--745
Athina Markopoulou and
Gianluca Iannaccone and
Supratik Bhattacharyya and
Chen-Nee Chuah and
Yashar Ganjali and
Christophe Diot Characterization of failures in an
operational IP backbone network . . . . 749--762
Min Sik Kim and
Taekhyun Kim and
Yong-June Shin and
Simon S. Lam and
Edward J. Powers A wavelet-based approach to detect
shared congestion . . . . . . . . . . . 763--776
Tao Ye and
Hema T. Kaur and
Shivkumar Kalyanaraman and
Murat Yuksel Large-scale network parameter
configuration using an on-line
simulation framework . . . . . . . . . . 777--790
Imad Aad and
Jean-Pierre Hubaux and
Edward W. Knightly Impact of denial of service attacks on
ad hoc networks . . . . . . . . . . . . 791--802
Daniele Micciancio and
Saurabh Panjwani Optimal communication complexity of
generic multicast key distribution . . . 803--813
Supriya Krishnamurthy and
Sameh El-Ansary and
Erik Aurell and
Seif Haridi An analytical study of a structured
overlay in the presence of dynamic
membership . . . . . . . . . . . . . . . 814--825
Loc Bui and
Atilla Eryilmaz and
R. Srikant and
Xinzhou Wu Asynchronous congestion control in
multi-hop wireless networks with maximal
matching-based scheduling . . . . . . . 826--839
Rajiv Gandhi and
Arunesh Mishra and
Srinivasan Parthasarathy Minimizing broadcast latency and
redundancy in ad hoc networks . . . . . 840--851
Vincent Lenders and
Martin May and
Bernhard Plattner Density-based anycast: a robust routing
strategy for wireless ad hoc networks 852--863
Michele Garetto and
Theodoros Salonidis and
Edward W. Knightly Modeling per-flow throughput and
capturing starvation in CSMA multi-hop
wireless networks . . . . . . . . . . . 864--877
Omesh Tickoo and
Biplab Sikdar Modeling queueing and channel access
delay in unsaturated IEEE 802.11 random
access MAC based wireless networks . . . 878--891
Cunqing Hua and
Tak-Shing Peter Yum Optimal routing and data aggregation for
maximizing lifetime of wireless sensor
networks . . . . . . . . . . . . . . . . 892--903
Xueyan Tang and
Jianliang Xu Optimizing lifetime for continuous data
aggregation with precision guarantees in
wireless sensor networks . . . . . . . . 904--917
Rami Langar and
Nizar Bouabdallah and
Raouf Boutaba A comprehensive analysis of mobility
management in MPLS-based wireless access
networks . . . . . . . . . . . . . . . . 918--931
Yiping Xing and
R. Chandramouli Stochastic learning solution for
distributed discrete power control game
in wireless data networks . . . . . . . 932--944
Do Young Eun and
Xinbing Wang Achieving 100% throughput in TCP/AQM
under aggressive packet marking with
small buffer . . . . . . . . . . . . . . 945--956
Stephen L. Spitler and
Daniel C. Lee Integration of explicit
effective-bandwidth-based QoS routing
with best-effort routing . . . . . . . . 957--969
Andrew Brzezinski and
Eytan Modiano Achieving 100% throughput in
reconfigurable optical networks . . . . 970--983
Karyn Benson and
Benjamin Birnbaum and
Esteban Molina-Estolano and
Ran Libeskind-Hadas Competitive analysis of online traffic
grooming in WDM rings . . . . . . . . . 984--997
Nan Jin and
Scott Jordan On the feasibility of dynamic
congestion-based pricing in
differentiated services networks . . . . 1001--1014
Miriam Allalouf and
Yuval Shavitt Centralized and distributed algorithms
for routing and weighted max-min fair
bandwidth allocation . . . . . . . . . . 1015--1024
Ishai Menache and
Nahum Shimkin Capacity management and equilibrium for
proportional QoS . . . . . . . . . . . . 1025--1037
Tuna Güven and
Richard J. La and
Mark A. Shayman and
Bobby Bhattacharjee A unified framework for multipath
routing for unicast and multicast
traffic . . . . . . . . . . . . . . . . 1038--1051
Shu Tao and
John Apostolopoulos and
Roch Guérin Real-time monitoring of video quality in
IP networks . . . . . . . . . . . . . . 1052--1065
Milan Vojnovic and
Ayalvadi J. Ganesh On the race of worms, alerts, and
patches . . . . . . . . . . . . . . . . 1066--1079
Venkatesh Ramaiyan and
Anurag Kumar and
Eitan Altman Fixed point analysis of single cell IEEE
802.11e WLANs: uniqueness and
multistability . . . . . . . . . . . . . 1080--1093
Hazer Inaltekin and
Stephen B. Wicker The analysis of Nash equilibria of the
one-shot random-access game for wireless
networks and the behavior of selfish
nodes . . . . . . . . . . . . . . . . . 1094--1107
Wei Wang and
Vikram Srinivasan and
Kee-Chaing Chua Extending the lifetime of wireless
sensor networks through mobile relays 1108--1120
Gaurav Sharma and
Ravi R. Mazumdar A case for hybrid sensor networks . . . 1121--1132
Sundar Subramanian and
Sanjay Shakkottai and
Ari Arapostathis Broadcasting in sensor networks: the
role of local information . . . . . . . 1133--1146
Ahmed Bader and
Eylem Ekici Performance optimization of
interference-limited multihop networks 1147--1160
Aditya Karnik and
Aravind Iyer and
Catherine Rosenberg Throughput-optimal configuration of
fixed wireless networks . . . . . . . . 1161--1174
Honghai Zhang and
Jennifer C. Hou On the asymptotic minimum transporting
energy and its implication on the
wireless network capacity . . . . . . . 1175--1187
Michael J. Neely Order optimal delay for opportunistic
scheduling in multi-user wireless
uplinks and downlinks . . . . . . . . . 1188--1199
Salah-Eddine Elayoubi and
Beno\^\it Fourestié Performance evaluation of admission
control and adaptive modulation in OFDMA
WiMax systems . . . . . . . . . . . . . 1200--1211
Juan José Jaramillo and
Fabio Milan and
R. Srikant Padded frames: a novel algorithm for
stable scheduling in load-balanced
switches . . . . . . . . . . . . . . . . 1212--1225
Bensong Chen and
George N. Rouskas and
Rudra Dutta On hierarchical traffic grooming in WDM
networks . . . . . . . . . . . . . . . . 1226--1238
Kuai Xu and
Zhi-Li Zhang and
Supratik Bhattacharyya Internet traffic behavior profiling for
network security monitoring . . . . . . 1241--1252
Minho Sung and
Jun Xu and
Jun Li and
Li Li Large-scale IP traceback in high-speed
Internet: practical techniques and
information-theoretic foundation . . . . 1253--1266
Xiaowei Yang and
David Wetherall and
Thomas Anderson TVA: a DoS-limiting network architecture 1267--1280
Yong Xia and
Lakshminarayanan Subramanian and
Ion Stoica and
Shivkumar Kalyanaraman One more bit is enough . . . . . . . . . 1281--1294
Renata Teixeira and
Aman Shaikh and
Timothy G. Griffin and
Jennifer Rexford Impact of hot-potato routing changes in
IP networks . . . . . . . . . . . . . . 1295--1307
Fernando Solano and
Thomas Stidsen and
Ramon Fabregat and
Jose Luis Marzo Label space reduction in MPLS networks:
how much can a single stacked label do? 1308--1320
Randeep S. Bhatia and
Murali Kodialam and
T. V. Lakshman and
Sudipta Sengupta Bandwidth guaranteed routing with fast
restoration against link and node
failures . . . . . . . . . . . . . . . . 1321--1330
Stamatis Stefanakos Reliable routings in networks with
generalized link failure events . . . . 1331--1339
George F. Georgakopoulos Buffered cross-bar switches, revisited:
design steps, proofs and simulations
towards optimal rate and minimum buffer
memory . . . . . . . . . . . . . . . . . 1340--1351
Srinivasan Ramasubramanian Supporting multiple protection
strategies in optical networks . . . . . 1352--1365
Lei Song and
Jing Zhang and
Biswanath Mukherjee A comprehensive study on
backup-bandwidth reprovisioning after
network-state updates in survivable
telecom mesh networks . . . . . . . . . 1366--1377
Qun Zhao and
Mohan Gurusamy Lifetime maximization for connected
target coverage in wireless sensor
networks . . . . . . . . . . . . . . . . 1378--1391
John Papandriopoulos and
Subhrakanti Dey and
Jamie Evans Optimal and distributed protocols for
cross-layer design of physical and
transport layers in MANETs . . . . . . . 1392--1405
Andrew Brzezinski and
Gil Zussman and
Eytan Modiano Distributed throughput maximization in
wireless mesh networks via
pre-partitioning . . . . . . . . . . . . 1406--1419
Prashanth Hande and
Sundeep Rangan and
Mung Chiang and
Xinzhou Wu Distributed uplink power control for
optimal SIR assignment in cellular data
networks . . . . . . . . . . . . . . . . 1420--1433
Aaron Walters and
David Zage and
Cristina Nita Rotaru A framework for mitigating attacks
against measurement-based adaptation
mechanisms in unstructured multicast
overlay networks . . . . . . . . . . . . 1434--1446
Mohamed Hefeeda and
Osama Saleh Traffic modeling and proportional
partial caching for peer-to-peer systems 1447--1460
Tao Wu and
David Starobinski A comparative analysis of server
selection in content replication
networks . . . . . . . . . . . . . . . . 1461--1474
Derek Leonard and
Zhongmei Yao and
Xiaoming Wang and
Dmitri Loguinov On static and dynamic partitioning
behavior of large-scale P2P networks . . 1475--1488
Piet Van Mieghem and
Jasmina Omic and
Robert Kooij Virus spread in networks . . . . . . . . 1--14
Yi Xie and
Shun-Zheng Yu Monitoring the application-layer DDoS
attacks for popular websites . . . . . . 15--25
Supranamaya Ranjan and
Ram Swaminathan and
Mustafa Uysal and
Antonio Nucci and
Edward Knightly DDoS-shield: DDoS-resilient scheduling
to counter application layer attacks . . 26--39
Patrick Traynor and
William Enck and
Patrick McDaniel and
Thomas La Porta Mitigating attacks on open functionality
in SMS-capable cellular networks . . . . 40--53
Yi Xie and
Shun-Zheng Yu A large-scale hidden semi-Markov model
for anomaly detection on user browsing
behaviors . . . . . . . . . . . . . . . 54--65
Franck Le and
Sihyung Lee and
Tina Wong and
Hyong S. Kim and
Darrell Newcomb Detecting network-wide and
router-specific misconfigurations
through data mining . . . . . . . . . . 66--79
Khaled Harfoush and
Azer Bestavros and
John Byers Measuring capacity bandwidth of targeted
path segments . . . . . . . . . . . . . 80--92
Piet Van Mieghem and
Huijuan Wang The observable part of a network . . . . 93--105
Han Hee Song and
Lili Qiu and
Yin Zhang NetQuest: a flexible framework for
large-scale network measurement . . . . 106--119
György Terdik and
Tibor Gyires Lévy flights and fractal modeling of
Internet traffic . . . . . . . . . . . . 120--129
Reaz Ahmed and
Raouf Boutaba Plexus: a scalable peer-to-peer protocol
enabling efficient subset search . . . . 130--143
Zhongmei Yao and
Xiaoming Wang and
Derek Leonard and
Dmitri Loguinov Node isolation model and age-based
neighbor selection in unstructured P2P
networks . . . . . . . . . . . . . . . . 144--157
Xiaoming Fu and
Henning Schulzrinne and
Hannes Tschofenig and
Christian Dickmann and
Dieter Hogrefe Overhead and performance study of the
General Internet Signaling Transport
(GIST) protocol . . . . . . . . . . . . 158--171
Pascal von Rickenbach and
Roger Wattenhofer and
Aaron Zollinger Algorithmic models of interference in
wireless ad hoc and sensor networks . . 172--185
Khaled Elmeleegy and
Alan L. Cox and
T. S. Eugene Ng Understanding and mitigating the effects
of count to infinity in Ethernet
networks . . . . . . . . . . . . . . . . 186--199
Jie Lian and
Yunhao Liu and
Kshirasagar Naik and
Lei Chen Virtual surrounding face geocasting in
wireless ad hoc and sensor networks . . 200--211
Sastry Kompella and
Shiwen Mao and
Y. Thomas Hou and
Hanif D. Sherali On path selection and rate allocation
for video in wireless mesh networks . . 212--224
Teerawat Issariyakul and
Vikram Krishnamurthy Amplify-and-forward cooperative
diversity wireless networks: model,
analysis, and monotonicity properties 225--238
Hongbin Luo and
Lemin Li and
Hongfang Yu Routing connections with differentiated
reliability requirements in WDM mesh
networks . . . . . . . . . . . . . . . . 253--266
Stefano Avallone and
Ian F. Akyildiz and
Giorgio Ventre A channel and rate assignment algorithm
and a layer-2.5 forwarding paradigm for
multi-radio wireless mesh networks . . . 267--280
Vahid Tabatabaee and
Leandros Tassiulas MNCM: a critical node matching approach
to scheduling for input buffered
switches with no speedup . . . . . . . . 294--304
Andrew Zalesky To burst or circuit switch? . . . . . . 305--318
Guanglei Liu and
Chuanyi Ji Scalability of network-failure
resilience: analysis using multi-layer
probabilistic graphical models . . . . . 319--331
Giridhar Jayavelu and
Srinivasan Ramasubramanian and
Ossama Younis Maintaining colored trees for disjoint
multipath routing under node failures 346--359
Bin Fan and
John C. S. Lui and
Dah-Ming Chiu The design trade-offs of BitTorrent-like
file sharing protocols . . . . . . . . . 365--376
Daniel Stutzbach and
Reza Rejaie and
Nick Duffield and
Subhabrata Sen and
Walter Willinger On unbiased sampling for unstructured
peer-to-peer networks . . . . . . . . . 377--390
Yihua He and
Georgos Siganos and
Michalis Faloutsos and
Srikanth Krishnamurthy Lord of the links: a framework for
discovering missing links in the
Internet topology . . . . . . . . . . . 391--404
Andrea Bianco and
Gianluca Mardente and
Marco Mellia and
Maurizio Munaf\`o and
Luca Muscariello Web user-session inference by means of
clustering techniques . . . . . . . . . 405--416
Darryl Veitch and
Julien Ridoux and
Satish Babu Korada Robust synchronization of absolute and
difference clocks over networks . . . . 417--430
Björn Scheuermann and
Wolfgang Kiess and
Magnus Roos and
Florian Jarre and
Martin Mauve On the time synchronization of
distributed log files in networks with
local broadcast media . . . . . . . . . 431--444
Ricardo Oliveira and
Beichuan Zhang and
Dan Pei and
Lixia Zhang Quantifying path exploration in the
Internet . . . . . . . . . . . . . . . . 445--458
Murali Kodialam and
T. V. Lakshman and
James B. Orlin and
Sudipta Sengupta Oblivious routing of highly variable
traffic in service overlays and IP
backbones . . . . . . . . . . . . . . . 459--472
Amund Kvalbein and
Audun Fosselie Hansen and
Tarik \vCi\vcic and
Stein Gjessing and
Olav Lysne Multiple routing configurations for fast
IP network recovery . . . . . . . . . . 473--486
Reuven Cohen and
Gabi Nakibly A traffic engineering approach for
placement and selection of network
services . . . . . . . . . . . . . . . . 487--500
Geoffrey Goodell and
Mema Roussopoulos and
Scott Bradner A directory service for perspective
access networks . . . . . . . . . . . . 501--514
Pradeep Kyasanur and
Nitin H. Vaidya Capacity of multichannel wireless
networks under the protocol model . . . 515--527
Bhaskaran Raman and
Kameswari Chebrolu and
Dattatraya Gokhale and
Sayandeep Sen On the feasibility of the link
abstraction in wireless mesh networks 528--541
Bow-Nan Cheng and
Murat Yuksel and
Shivkumar Kalyanaraman Orthogonal rendezvous routing protocol
for wireless mesh networks . . . . . . . 542--555
Mehdi Rasti and
Ahmad R. Sharafat and
Babak Seyfe Pareto-efficient and goal-driven power
control in wireless networks: a
game-theoretic approach with a novel
pricing scheme . . . . . . . . . . . . . 556--569
Reuven Cohen and
Boris Kapchits An optimal wake-up scheduling algorithm
for minimizing energy consumption while
limiting maximum delay in a mesh sensor
network . . . . . . . . . . . . . . . . 570--581
Hanan Shpungin and
Michael Segal Low-energy fault-tolerant bounded-hop
broadcast in wireless networks . . . . . 582--590
Tianji Li and
Qiang Ni and
David Malone and
Douglas Leith and
Yang Xiao and
Thierry Turletti Aggregation with fragment retransmission
for very high-speed WLANs . . . . . . . 591--604
Alvaro A. Cárdenas and
Svetlana Radosavac and
John S. Baras Evaluation of detection algorithms for
MAC layer misbehavior: theory and
experiments . . . . . . . . . . . . . . 605--617
Mingyu Chen and
Xingzhe Fan and
Manohar N. Murthi and
T. Dilusha Wickramarathna and
Kamal Premaratne Normalized queueing delay: congestion
control jointly utilizing delay and
marking . . . . . . . . . . . . . . . . 618--631
Bin Wu and
Kwan L. Yeung and
Mounir Hamdi and
Xin Li Minimizing internal speedup for
performance guaranteed switches with
optical fabrics . . . . . . . . . . . . 632--645
Matthew Andrews and
Lisa Zhang Complexity of wavelength assignment in
optical network optimization . . . . . . 646--657
Kalyan Kuppuswamy and
Daniel C. Lee An analytic approach to efficiently
computing call blocking probabilities
for multiclass WDM networks . . . . . . 658--670
Abdelhamid E. Eshoul and
Hussein T. Mouftah Survivability approaches using
$p$-cycles in WDM mesh networks under
static traffic . . . . . . . . . . . . . 671--683
Ioannis Ch. Paschalidis and
Georgios Smaragdakis Spatio-temporal network anomaly
detection by assessing deviations of
empirical measures . . . . . . . . . . . 685--697
Yan Hu and
Dah-Ming Chiu and
John C. S. Lui Entropy based adaptive flow aggregation 698--711
Kashi Venkatesh Vishwanath and
Amin Vahdat Swing: realistic and responsive network
traffic generation . . . . . . . . . . . 712--725
Xiaoming Wang and
Zhongmei Yao and
Dmitri Loguinov Residual-based estimation of peer and
link lifetimes in P2P networks . . . . . 726--739
Feng Wang and
Jian Qiu and
Lixin Gao and
Jia Wang On understanding transient interdomain
routing failures . . . . . . . . . . . . 740--751
Murali Kodialam and
T. V. Lakshman and
Sudipta Sengupta Locally restorable routing of highly
variable traffic . . . . . . . . . . . . 752--763
Barath Raghavan and
Patric Verkaik and
Alex C. Snoeren Secure and policy-compliant source
routing . . . . . . . . . . . . . . . . 764--777
Jian Chu and
Chin-Tau Lea Optimal link weights for IP-based
networks supporting hose-model VPNs . . 778--788
Nicolas Hohn and
Konstantina Papagiannaki and
Darryl Veitch Capturing router congestion and delay 789--802
Wencheng Lu and
Sartaj Sahni Succinct representation of static packet
classifiers . . . . . . . . . . . . . . 803--816
Jun Li and
Yiqiang Q. Zhao Resequencing analysis of stop-and-wait
ARQ for parallel multichannel
communications . . . . . . . . . . . . . 817--830
Vincent Borrel and
Franck Legendre and
Marcelo Dias De Amorim and
Serge Fdida SIMPS: using sociology for personal
mobility . . . . . . . . . . . . . . . . 831--842
Saurabh Ganeriwal and
Ilias Tsigkogiannis and
Hohyun Shim and
Vlassios Tsiatsis and
Mani B. Srivastava and
Deepak Ganesan Estimating clock uncertainty for
efficient duty-cycling in sensor
networks . . . . . . . . . . . . . . . . 843--856
Sungoh Kwon and
Ness B. Shroff Analysis of shortest path routing for
large multi-hop wireless networks . . . 857--869
Petar Djukic and
Shahrokh Valaee Delay aware link scheduling for
multi-hop TDMA wireless networks . . . . 870--883
Claudio Cicconetti and
Ian F. Akyildiz and
Luciano Lenzini FEBA: a bandwidth allocation algorithm
for service differentiation in IEEE
802.16 mesh networks . . . . . . . . . . 884--897
Murtaza A. Zafer and
Eytan Modiano A calculus approach to energy-efficient
data transmission with
quality-of-service constraints . . . . . 898--911
Chee Wei Tan and
Daniel P. Palomar and
Mung Chiang Energy-robustness tradeoff in cellular
network power control . . . . . . . . . 912--925
Kae Won Choi and
Wha Sook Jeon and
Dong Geun Jeong Resource allocation in OFDMA wireless
communications systems supporting
multimedia services . . . . . . . . . . 926--935
Richard T. B. Ma and
Vishal Misra and
Dan Rubenstein An analysis of generalized slotted-Aloha
protocols . . . . . . . . . . . . . . . 936--949
Xiang-Yang Li Multicast capacity of wireless ad hoc
networks . . . . . . . . . . . . . . . . 950--961
Yuan-Cheng Lai and
Chih-Chung Lin Two blocking algorithms on adaptive
binary splitting: single and pair
resolutions for RFID tag identification 962--975
Kevin Ross and
Nicholas Bambos Projective cone scheduling (PCS)
algorithms for packet switches of
maximal throughput . . . . . . . . . . . 976--989
Hung Q. Ngo and
Yang Wang and
Dazhen Pan Rearrangeable and nonblocking $ [w,
f]$-distributors . . . . . . . . . . . . 990--1001
Rodney Van Meter and
Thaddeus D. Ladd and
W. J. Munro and
Kae Nemoto System design for a long-line quantum
repeater . . . . . . . . . . . . . . . . 1002--1013
Jonathan S. Turner Strong performance guarantees for
asynchronous buffered crossbar scheduler 1017--1028
Banit Agrawal and
Timothy Sherwood High-bandwidth network memory system
through virtual pipelines . . . . . . . 1029--1041
Michael Menth and
Andreas Binzenhöfer and
Stefan Mühleck Source models for speech traffic
revisited . . . . . . . . . . . . . . . 1042--1051
Nazanin Magharei and
Reza Rejaie PRIME: peer-to-peer receiver-driven
mesh-based streaming . . . . . . . . . . 1052--1065
Vijay Sivaraman and
Hossam Elgindy and
David Moreland and
Diethelm Ostry Packet pacing in small buffer optical
packet switched networks . . . . . . . . 1066--1079
Satyajeet S. Ahuja and
Srinivasan Ramasubramanian and
Marwan M. Krunz Single-link failure detection in
all-optical networks using monitoring
cycles and paths . . . . . . . . . . . . 1080--1093
Suman Sarkar and
Hong-Hsu Yen and
Sudhir Dixit and
Biswanath Mukherjee Hybrid wireless-optical broadband access
network (WOBAN): network planning using
Lagrangean relaxation . . . . . . . . . 1094--1105
Pan Li and
Chi Zhang and
Yuguang Fang Asymptotic connectivity in wireless ad
hoc networks using directional antennas 1106--1117
Apoorva Jindal and
Konstantinos Psounis The achievable rate region of
802.11-scheduled multihop networks . . . 1118--1131
Changhee Joo and
Xiaojun Lin and
Ness B. Shroff Understanding the capacity region of the
Greedy maximal scheduling algorithm in
multihop wireless networks . . . . . . . 1132--1145
Michael J. Neely Delay analysis for maximal scheduling
with flow control in wireless networks
with bursty traffic . . . . . . . . . . 1146--1159
Paramvir Bahl and
Ranveer Chandra and
Patrick P. C. Lee and
Vishal Misra and
Jitendra Padhye and
Dan Rubenstein and
Yan Yu Opportunistic use of client repeaters to
improve performance of WLANs . . . . . . 1160--1171
Kyu-Han Kim and
Kang G. Shin On accurate and asymmetry-aware
measurement of link quality in wireless
mesh networks . . . . . . . . . . . . . 1172--1185
Mehmet C. Vuran and
Ian F. Akyildiz Error control in wireless sensor
networks: a cross layer analysis . . . . 1186--1199
Shamik Sengupta and
Mainak Chatterjee An economic framework for dynamic
spectrum access and service pricing . . 1200--1213
Gwillerm Froc and
Issam Mabrouki and
Xavier Lagrange Design and performance of wireless data
gathering networks based on unicast
random walk routing . . . . . . . . . . 1214--1227
Ming-Jer Tsai and
Hong-Yen Yang and
Bing-Hong Liu and
Wen-Qian Huang Virtual-coordinate-based
delivery-guaranteed routing protocol in
wireless sensor networks . . . . . . . . 1228--1241
Joon Ahn and
Bhaskar Krishnamachari Scaling laws for data-centric storage
and querying in wireless sensor networks 1242--1255
Ming Li and
Deepak Ganesan and
Prashant Shenoy PRESTO: feedback-driven data management
in sensor networks . . . . . . . . . . . 1256--1269
Martín Casado and
Michael J. Freedman and
Justin Pettit and
Jianying Luo and
Natasha Gude and
Nick McKeown and
Scott Shenker Rethinking enterprise network control 1270--1283
Katerina Argyraki and
David R. Cheriton Scalable network-layer defense against
Internet bandwidth-flooding attacks . . 1284--1297
Sabyasachi Roy and
Himabindu Pucha and
Zheng Zhang and
Y. Charlie Hu and
Lili Qiu On the placement of infrastructure
overlay nodes . . . . . . . . . . . . . 1298--1311
Jayakrishnan Nair and
D. Manjunath Distributed iterative optimal resource
allocation with concurrent updates of
routing and flow control variables . . . 1312--1325
Hiroyuki Okamura and
Tadashi Dohi and
Kishor S. Trivedi Markovian arrival process parameter
estimation with group data . . . . . . . 1326--1339
Françis Baccelli and
Sridhar Machiraju and
Darryl Veitch and
Jean Bolot The role of PASTA in network measurement 1340--1353
Meeyoung Cha and
Haewoon Kwak and
Pablo Rodriguez and
Yong-Yeol Ahn and
Sue Moon Analyzing the video popularity
characteristics of large-scale user
generated content systems . . . . . . . 1357--1370
Moritz Steiner and
Taoufik En-Najjary and
Ernst W. Biersack Long term study of peer behavior in the
KAD DHT . . . . . . . . . . . . . . . . 1371--1384
Yigal Bejerano Taking the skeletons out of the closets:
a simple and efficient topology
discovery scheme for large Ethernet LANs 1385--1398
Mudhakar Srivatsa and
Arun Iyengar and
Jian Yin and
Ling Liu Scalable key management algorithms for
location-based services . . . . . . . . 1399--1412
Fernando Paganini and
Enrique Mallada A unified approach to congestion control
and node-based multipath routing . . . . 1413--1426
Murali Kodialam and
T. V. Lakshman and
Sudipta Sengupta Guaranteed performance routing of
unpredictable traffic with fast path
restoration . . . . . . . . . . . . . . 1427--1438
Xin Yuan and
Wickus Nienaber and
Zhenhai Duan and
Rami Melhem Oblivious routing in fat-tree based
system area networks with uncertain
traffic demands . . . . . . . . . . . . 1439--1452
Holger Boche and
Martin Schubert Nash bargaining and proportional
fairness for wireless systems . . . . . 1453--1466
Loc X. Bui and
Sujay Sanghavi and
R. Srikant Distributed link scheduling with
constant overhead . . . . . . . . . . . 1467--1480
Changhee Joo and
Ness B. Shroff Performance of random access scheduling
schemes in multi-hop wireless networks 1481--1493
Zhenzhen Ye and
Alhussein A. Abouzeid and
Jing Ai Optimal stochastic policies for
distributed data aggregation in wireless
sensor networks . . . . . . . . . . . . 1494--1507
Yan Wu and
Sonia Fahmy and
Ness B. Shroff Optimal sleep/wake scheduling for
time-synchronized sensor networks with
QoS guarantees . . . . . . . . . . . . . 1508--1521
Michele Garetto and
Paolo Giaccone and
Emilio Leonardi Capacity scaling in ad hoc networks with
heterogeneous mobile nodes: the
super-critical regime . . . . . . . . . 1522--1535
Suli Zhao and
Dipankar Raychaudhuri Scalability and performance evaluation
of hierarchical hybrid wireless networks 1536--1549
Hui Ma and
Rajiv Vijayakumar and
Sumit Roy and
Jing Zhu Optimizing 802.11 wireless mesh networks
based on physical carrier sensing . . . 1550--1563
Wei-Jen Hsu and
Thrasyvoulos Spyropoulos and
Konstantinos Psounis and
Ahmed Helmy Modeling spatial and temporal
dependencies of user mobility in
wireless mobile networks . . . . . . . . 1564--1577
Han Cai and
Do Young Eun Crossing over the bounded domain: from
exponential to power-law intermeeting
time in mobile ad hoc networks . . . . . 1578--1591
Wei Wang and
Mehul Motani and
Vikram Srinivasan Opportunistic energy-efficient contact
probing in delay-tolerant applications 1592--1605
Soung Chang Liew and
Ying Jun Zhang and
Da Rui Chen Bounded-mean-delay throughput and
nonstarvation conditions in Aloha
network . . . . . . . . . . . . . . . . 1606--1618
Stefan Alexandru Pascu and
Ahmed A. El-Amawy On conflict-free all-to-all broadcast in
one-hop optical networks of arbitrary
topologies . . . . . . . . . . . . . . . 1619--1630
Michel Mandjes and
Remco Van De Meent Resource dimensioning through buffer
sampling . . . . . . . . . . . . . . . . 1631--1644
Ravi S. Prasad and
Constantine Dovrolis and
Marina Thottan Router buffer sizing for TCP traffic and
the role of the output/input capacity
ratio . . . . . . . . . . . . . . . . . 1645--1658
Chao-Lin Yu and
Cheng-Shang Chang and
Duan-Shin Lee CR switch: a load-balanced switch with
contention and reservation . . . . . . . 1659--1671
Georgios Y. Lazarou and
Julie Baca and
Victor S. Frost and
Joseph B. Evans Describing network traffic using the
index of variability . . . . . . . . . . 1672--1683
Reuven Cohen and
Niloofar Fazlollahi and
David Starobinski Path switching and grading algorithms
for advance channel reservation
architectures . . . . . . . . . . . . . 1684--1695
Lachlan L. H. Andrew and
Steven H. Low and
Bartek P. Wydrowski Understanding XCP: equilibrium and
fairness . . . . . . . . . . . . . . . . 1697--1710
Jerry Chi-Yuan Chou and
Bill Lin and
Subhabrata Sen and
Oliver Spatscheck Proactive surge protection: a defense
mechanism for bandwidth-based attacks 1711--1723
Yao Zhao and
Yan Chen and
David Bindel Towards unbiased end-to-end network
diagnosis . . . . . . . . . . . . . . . 1724--1737
Mehmet H. Gunes and
Kamil Sarac Resolving IP aliases in building
traceroute-based Internet maps . . . . . 1738--1751
Ao-Jan Su and
David R. Choffnes and
Aleksandar Kuzmanovic and
Fabián E. Bustamante Drafting behind Akamai: inferring
network conditions based on CDN
redirections . . . . . . . . . . . . . . 1752--1765
Michael Sirivianos and
Xiaowei Yang and
Stanislaw Jarecki Robust and efficient incentives for
cooperative content distribution . . . . 1766--1779
George N. Rouskas and
Nikhil Baradwaj On bandwidth tiered service . . . . . . 1780--1793
Huseyin Mutlu and
Murat Alanyali and
David Starobinski Spot pricing of secondary spectrum
access in wireless cellular networks . . 1794--1804
Nicholas B. Chang and
Mingyan Liu Optimal channel probing and transmission
scheduling for opportunistic spectrum
access . . . . . . . . . . . . . . . . . 1805--1818
Shrutivandana Sharma and
Demosthenis Teneketzis An externalities-based decentralized
optimal power allocation algorithm for
wireless networks . . . . . . . . . . . 1819--1831
Omer Gurewitz and
Vincenzo Mancuso and
Jingpu Shi and
Edward W. Knightly Measurement and modeling of the origins
of starvation of congestion-controlled
flows in wireless mesh networks . . . . 1832--1845
Abhinav Gupta and
Xiaojun Lin and
R. Srikant Low-complexity distributed scheduling
algorithms for wireless networks . . . . 1846--1859
Mahdi Lotfinezhad and
Ben Liang and
Elvino S. Sousa On stability region and delay
performance of linear-memory randomized
scheduling for time-varying networks . . 1860--1873
Xiaojun Lin and
Shahzada B. Rasool Distributed and provably efficient
algorithms for joint channel-assignment,
scheduling, and routing in multichannel
ad hoc wireless networks . . . . . . . . 1874--1887
Michele Garetto and
Paolo Giaccone and
Emilio Leonardi Capacity scaling in ad hoc networks with
heterogeneous mobile nodes: the
subcritical regime . . . . . . . . . . . 1888--1901
Rik Sarkar and
Xianjin Zhu and
Jie Gao Double rulings for information brokerage
in sensor networks . . . . . . . . . . . 1902--1915
Christopher J. Martinez and
Devang K. Pandya and
Wei-Ming Lin On designing fast nonuniformly
distributed IP address lookup hashing
algorithms . . . . . . . . . . . . . . . 1916--1925
Lynn Choi and
Hyogon Kim and
Sunil Kim and
Moon Hae Kim Scalable packet classification through
rulebase partitioning using the maximum
entropy hashing . . . . . . . . . . . . 1926--1935
Mario Baldi and
Guido Marchetto Pipeline forwarding of packets based on
a low-accuracy network-distributed
common time reference . . . . . . . . . 1936--1949
Michael Menth and
Michael Duelli and
Ruediger Martin and
Jens Milbrandt Resilience analysis of packet-switched
communication networks . . . . . . . . . 1950--1963
Srini Seetharaman and
Volker Hilt and
Markus Hofmann and
Mostafa Ammar Resolving cross-layer conflict between
overlay routing and traffic engineering 1964--1977
Amir Gourgy and
Ted H. Szymanski and
Douglas G. Down On tracking the behavior of an
output-queued switch using an
input-queued switch . . . . . . . . . . 1978--1988
Smita Rai and
Ching-Fong Su and
Biswanath Mukherjee On provisioning in all-optical networks:
an impairment-aware approach . . . . . . 1989--2001
Onur Turkcu and
Suresh Subramaniam Performance of optical networks with
limited reconfigurability . . . . . . . 2002--2013
Yi-Ting Chen and
Jay Cheng and
Duan-Shin Lee Constructions of linear compressors,
nonovertaking delay lines, and flexible
delay lines for optical packet switching 2014--2027
Guohan Lu and
Yan Chen and
Stefan Birrer and
Fabián E. Bustamante and
Xing Li POPI: a user-level tool for inferring
router packet forwarding priority . . . 1--14
Reuven Cohen and
Liran Katzir Computational analysis and efficient
algorithms for micro and macro OFDMA
downlink scheduling . . . . . . . . . . 15--26
Sanghwan Lee and
Zhi-Li Zhang and
Sambit Sahu and
Debanjan Saha On suitability of Euclidean embedding
for host-based network coordinate
systems . . . . . . . . . . . . . . . . 27--40
Jren-Chit Chin and
Yu Dong and
Wing-Kai Hon and
Chris Yu-Tak Ma and
David K. Y. Yau Detection of intelligent mobile target
in a mobile sensor network . . . . . . . 41--52
Lanjia Wang and
Zhichun Li and
Yan Chen and
Zhi Fu and
Xing Li Thwarting zero-day polymorphic worms
with network-level length-based
signature generation . . . . . . . . . . 53--66
Ahmed E. Kamal $ 1 + N $ network protection for mesh
networks: network coding-based
protection using $p$-cycles . . . . . . 67--80
Fong Pong and
Nian-Feng Tzeng SUSE: superior storage-efficiency for
routing tables through prefix
transformation and aggregation . . . . . 81--94
Stefan Rührup and
Hanna Kalosha and
Amiya Nayak and
Ivan Stojmenovi\'c Message-efficient beaconless georouting
with guaranteed delivery in wireless
sensor, ad hoc, and actuator networks 95--108
Ricardo Oliveira and
Dan Pei and
Walter Willinger and
Beichuan Zhang and
Lixia Zhang The (in)completeness of the observed
Internet AS-level structure . . . . . . 109--122
Jian Ni and
Haiyong Xie and
Sekhar Tatikonda and
Yang Richard Yang Efficient and dynamic routing topology
inference from end-to-end measurements 123--135
Steven Chamberland Global access network evolution . . . . 136--149
Zhen Yu and
Yong Guan A dynamic en-route filtering scheme for
data reporting in wireless sensor
networks . . . . . . . . . . . . . . . . 150--163
Damien Fay and
Hamed Haddadi and
Andrew Thomason and
Andrew W. Moore and
Richard Mortier and
Almerima Jamakovic and
Steve Uhlig and
Miguel Rio Weighted spectral distribution for
Internet topology analysis: theory and
applications . . . . . . . . . . . . . . 164--176
Yuichi Ohsita and
Takashi Miyamura and
Shin'ichi Arakawa and
Shingo Ata and
Eiji Oki and
Kohei Shiomoto and
Masayuki Murata Gradually reconfiguring virtual network
topologies based on estimated traffic
matrices . . . . . . . . . . . . . . . . 177--189
Behnam A. Rezaei and
Nima Sarshar and
Vwani P. Roychowdhury Distributed resource sharing in
low-latency wireless ad hoc networks . . 190--201
Tao Shu and
Marwan Krunz Coverage-time optimization for clustered
wireless sensor networks: a
power-balancing approach . . . . . . . . 202--215
Jonathan L. Bredin and
Erik D. Demaine and
Mohammad Taghi Hajiaghayi and
Daniela Rus Deploying sensor networks with
guaranteed fault tolerance . . . . . . . 216--228
Bo Zhang and
Tze Sing Eugene Ng and
Animesh Nandi and
Rudolf H. Riedi and
Peter Druschel and
Guohui Wang Measurement-based analysis, modeling,
and synthesis of the Internet delay
space . . . . . . . . . . . . . . . . . 229--242
Lap Kong Law and
Konstantinos Pelechrinis and
Srikanth V. Krishnamurthy and
Michalis Faloutsos Downlink capacity of hybrid cellular ad
hoc networks . . . . . . . . . . . . . . 243--256
Xiaoming Wang and
Dmitri Loguinov Understanding and modeling the Internet
topology: economics and evolution
perspective . . . . . . . . . . . . . . 257--270
Balagangadhar G. Bathula and
Vinod M. Vokkarane QoS-based manycasting over optical
burst-switched (OBS) networks . . . . . 271--283
Bin Wu and
Kwan L. Yeung and
Pin-Han Ho ILP formulations for $p$-cycle design
without candidate cycle enumeration . . 284--295
Rajgopal Kannan and
Shuangqing Wei and
Vasu Chakravarthy and
Muralidhar Rangaswamy Approximation algorithms for minimum
energy transmission scheduling in rate
and duty-cycle constrained wireless
networks . . . . . . . . . . . . . . . . 296--306
Saikat Ray and
Roch Guérin and
Kin-Wah Kwong and
Rute Sofia Always acyclic distributed path
computation . . . . . . . . . . . . . . 307--319
Mo Li and
Yunhao Liu Rendered path: range-free localization
in anisotropic sensor networks with
holes . . . . . . . . . . . . . . . . . 320--332
Gireesh Shrimali and
Aditya Akella and
Almir Mutapcic Cooperative interdomain traffic
engineering using Nash bargaining and
decomposition . . . . . . . . . . . . . 341--352
Dragos Andrei and
Massimo Tornatore and
Marwan Batayneh and
Charles U. Martel and
Biswanath Mukherjee Provisioning of deadline-driven requests
with flexible transmission rates in WDM
mesh networks . . . . . . . . . . . . . 353--366
Amit Mondal and
Aleksandar Kuzmanovic Upgrading mice to elephants: effects and
end-point solutions . . . . . . . . . . 367--378
Yufang Xi and
Edmund M. Yeh Distributed algorithms for minimum cost
multicast with network coding . . . . . 379--392
Gagan Raj Gupta and
Ness B. Shroff Delay analysis for wireless networks
with single hop traffic and general
interference constraints . . . . . . . . 393--405
Longbo Huang and
Michael J. Neely The optimality of two prices: maximizing
revenue in a stochastic communication
system . . . . . . . . . . . . . . . . . 406--419
Bo\vzidar Radunovi\'c and
Christos Gkantsidis and
Peter Key and
Pablo Rodriguez Toward practical opportunistic routing
with intra-session network coding for
mesh networks . . . . . . . . . . . . . 420--433
Satyajayant Misra and
Seung Don Hong and
Guoliang Xue and
Jian Tang Constrained relay node placement in
wireless sensor networks: formulation
and approximations . . . . . . . . . . . 434--447
Nadim Parvez and
Anirban Mahanti and
Carey Williamson An analytic throughput model for TCP
NewReno . . . . . . . . . . . . . . . . 448--461
Ashraf Al Daoud and
Murat Alanyali and
David Starobinski Pricing strategies for spectrum lease in
secondary markets . . . . . . . . . . . 462--475
Srinivas Shakkottai and
Ramesh Johari Demand-aware content distribution on the
Internet . . . . . . . . . . . . . . . . 476--489
Alex X. Liu and
Chad R. Meiners and
Eric Torng TCAM Razor: a systematic approach
towards minimizing packet classifiers in
TCAMs . . . . . . . . . . . . . . . . . 490--500
Longbi Lin and
Xiaojun Lin and
Ness B. Shroff Low-complexity and distributed energy
minimization in multihop wireless
networks . . . . . . . . . . . . . . . . 501--514
Joohwan Kim and
Xiaojun Lin and
Ness B. Shroff and
Prasun Sinha Minimizing delay and maximizing lifetime
for wireless sensor networks with
anycast . . . . . . . . . . . . . . . . 515--528
Si Qing Zheng and
Ashwin Gumaste and
Hong Shen A parallel self-routing rearrangeable
nonblocking multi-$ \log_2 N $ photonic
switching network . . . . . . . . . . . 529--539
Ilenia Tinnirello and
Giuseppe Bianchi Rethinking the IEEE 802.11e EDCA
performance modeling methodology . . . . 540--553
Nilanjan Banerjee and
Mark D. Corner and
Brian Neil Levine Design and field experimentation of an
energy-efficient architecture for DTN
throwboxes . . . . . . . . . . . . . . . 554--567
Reuven Cohen and
Gabi Nakibly Maximizing restorable throughput in MPLS
networks . . . . . . . . . . . . . . . . 568--581
Sheng Zhong and
Fan Wu A collusion-resistant routing scheme for
noncooperative wireless ad hoc networks 582--595
Aruna Balasubramanian and
Brian Neil Levine and
Arun Venkataramani Replication routing in DTNs: a resource
allocation approach . . . . . . . . . . 596--609
Mohamed Hefeeda and
Cheng-Hsin Hsu On burst transmission scheduling in
mobile TV broadcast networks . . . . . . 610--623
Chuan-Ching Sue and
Hsaing-Wen Cheng A fitting report position scheme for the
gated IPACT dynamic bandwidth algorithm
in EPONs . . . . . . . . . . . . . . . . 624--637
Atilla Eryilmaz and
Asuman Ozdaglar and
Devavrat Shah and
Eytan Modiano Distributed cross-layer algorithms for
the optimal control of multihop wireless
networks . . . . . . . . . . . . . . . . 638--651
Joel Sommers and
Paul Barford and
Nick Duffield and
Amos Ron Multiobjective monitoring for SLA
compliance . . . . . . . . . . . . . . . 652--665
Ionut Trestian and
Supranamaya Ranjan and
Aleksandar Kuzmanovic and
Antonio Nucci Googling the Internet: profiling
Internet endpoints via the World Wide
Web . . . . . . . . . . . . . . . . . . 666--679
Cheng-Hsin Hsu and
Mohamed M. Hefeeda Broadcasting video streams encoded with
arbitrary bit rates in
energy-constrained mobile TV networks 681--694
David Starobinski and
Weiyao Xiao Asymptotically optimal data
dissemination in multichannel wireless
sensor networks: single radios suffice 695--707
Martin Karsten Approximation of generalized processor
sharing with interleaved stratified
timer wheels . . . . . . . . . . . . . . 708--721
Ioannis Broustis and
Konstantina Papagiannaki and
Srikanth V. Krishnamurthy and
Michalis Faloutsos and
Vivek P. Mhatre Measurement-driven guidelines for 802.11
WLAN design . . . . . . . . . . . . . . 722--735
Suat Ozdemir and
Hasan Çam Integration of false data detection with
data aggregation and confidential
transmission in wireless sensor networks 736--749
Nina Skorin-Kapov and
Jiajia Chen and
Lena Wosinska A new approach to optical networks
security: attack-aware routing and
wavelength assignment . . . . . . . . . 750--760
Yun Mao and
Feng Wang and
Lili Qiu and
Simon Lam and
Jonathan Smith S4: small state and small stretch
compact routing protocol for large
static wireless networks . . . . . . . . 761--774
Richard T. B. Ma and
Dah Ming Chiu and
John C. S. Lui and
Vishal Misra and
Dan Rubenstein Internet economics: the use of Shapley
value for ISP settlement . . . . . . . . 775--787
V. J. Venkataramanan and
Xiaojun Lin On wireless scheduling algorithms for
minimizing the queue-overflow
probability . . . . . . . . . . . . . . 788--801
Hongseok Kim and
Gustavo De Veciana Leveraging dynamic spare capacity in
wireless systems to conserve mobile
terminals' energy . . . . . . . . . . . 802--815
Abdallah Khreishah and
Chih-Chun Wang and
Ness B. Shroff Rate control with pairwise intersession
network coding . . . . . . . . . . . . . 816--829
Enrique Campos-Náñez Decentralized algorithms for adaptive
pricing in multiclass loss networks . . 830--843
Ao Tang and
Xiaoliang Wei and
Steven H. Low and
Mung Chiang Equilibrium of heterogeneous congestion
control: optimality and stability . . . 844--857
Parbati Kumar Manna and
Shigang Chen and
Sanjay Ranka Inside the permutation-scanning worms:
propagation modeling and analysis . . . 858--870
Jun Luo and
Jean-Pierre Hubaux Joint sink mobility and routing to
maximize the lifetime of wireless sensor
networks: the case of constrained
mobility . . . . . . . . . . . . . . . . 871--884
Haifeng Yu and
Phillip B. Gibbons and
Michael Kaminsky and
Feng Xiao SybilLimit: a near-optimal social
network defense against Sybil attacks 885--898
Chris Chambers and
Wu-Chang Feng and
Sambit Sahu and
Debanjan Saha and
David Brandt Characterizing online games . . . . . . 899--910
Cesare Roseti and
Michele Luglio and
Francesco Zampognaro Analysis and performance evaluation of a
burst-based TCP for satellite DVB RCS
links . . . . . . . . . . . . . . . . . 911--921
Qingya She and
Xiaodong Huang and
Jason P. Jue How reliable can two-path protection be? 922--933
Ziqiu Yun and
Xiaole Bai and
Dong Xuan and
Ten H. Lai and
Weijia Jia Optimal deployment patterns for full
coverage and $k$-connectivity ($ k <= 6$)
wireless sensor networks . . . . . . . . 934--947
Wencheng Lu and
Sartaj Sahni Low-power TCAMs for very large
forwarding tables . . . . . . . . . . . 948--959
Libin Jiang and
Jean Walrand A distributed CSMA algorithm for
throughput and utility maximization in
wireless networks . . . . . . . . . . . 960--972
Ritesh Madan and
Stephen P. Boyd and
Sanjay Lall Fast algorithms for resource allocation
in wireless cellular networks . . . . . 973--984
Ori Gerstel and
G. Sasaki A general framework for service
availability for bandwidth-efficient
connection-oriented networks . . . . . . 985--995
Chun-I Fan and
Pei-Hsiu Ho and
Ruei-Hau Hsu Provably secure nested one-time secret
mechanisms for fast mutual
authentication and key exchange in
mobile communications . . . . . . . . . 996--1009
Milan Vojnovi\'c and
Varun Gupta and
Thomas Karagiannis and
Christos Gkantsidis Sampling strategies for epidemic-style
information dissemination . . . . . . . 1013--1025
Mariyam Mirza and
Joel Sommers and
Paul Barford and
Xiaojin Zhu A machine learning approach to TCP
throughput prediction . . . . . . . . . 1026--1039
Jörg Liebeherr and
Markus Fidler and
Shahrokh Valaee A system-theoretic approach to bandwidth
estimation . . . . . . . . . . . . . . . 1040--1053
Yufang Xi and
Edmund M. Yeh Throughput optimal distributed power
control of stochastic wireless networks 1054--1066
Song Guo and
Victor C. M. Leung A distributed algorithm for min-max tree
and max-min cut problems in
communication networks . . . . . . . . . 1067--1076
Bing Hu and
Kwan L. Yeung Feedback-based scheduling for
load-balanced two-stage switches . . . . 1077--1090
Ming Yu and
Mengchu Zhou A performance modeling scheme for
multistage switch networks with
phase-type and bursty traffic . . . . . 1091--1104
Sriram Lakshmanan and
Cheng-Lin Tsao and
Raghupathy Sivakumar Aegis: physical space security for
wireless networks with smart antennas 1105--1118
Yanming Shen and
Shivendra S. Panwar and
H. Jonathan Chao SQUID: a practical 100% throughput
scheduler for crosspoint buffered
switches . . . . . . . . . . . . . . . . 1119--1131
Yunhao Liu and
Kebin Liu and
Mo Li Passive diagnosis for wireless sensor
networks . . . . . . . . . . . . . . . . 1132--1144
Xiang-Yang Li and
Yunhao Liu and
Shi Li and
ShaoJie Tang Multicast capacity of wireless ad hoc
networks under Gaussian channel model 1145--1157
Sudipta Sengupta and
Shravan Rayanchu and
Suman Banerjee Network coding-aware routing in wireless
networks . . . . . . . . . . . . . . . . 1158--1170
Murtaza Zafer and
Bong Jun Ko and
Ivan Wang-Hei Ho Transmit power estimation using
spatially diverse measurements under
wireless fading . . . . . . . . . . . . 1171--1180
Haythem A. Bany Salameh and
Marwan Krunz and
Ossama Younis Cooperative adaptive spectrum sharing in
cognitive radio networks . . . . . . . . 1181--1194
Yong Liu Delay bounds of chunk-based peer-to-peer
video streaming . . . . . . . . . . . . 1195--1206
Can Emre Koksal Rate quantization and the speedup
required to achieve 100% throughput for
multicast over crossbar switches . . . . 1207--1219
Hassan Gobjuka and
Yuri J. Breitbart Ethernet topology discovery for networks
with incomplete information . . . . . . 1220--1233
Zubair M. Fadlullah and
Tarik Taleb and
Athanasios V. Vasilakos and
Mohsen Guizani and
Nei Kato DTRAB: combating against attacks on
encrypted protocols through
traffic-feature analysis . . . . . . . . 1234--1247
Di Wu and
Yong Liu and
Keith W. Ross Modeling and analysis of multichannel
P2P live video systems . . . . . . . . . 1248--1260
Patrick Loiseau and
Paulo Gonçalves and
Guillaume Dewaele and
Pierre Borgnat and
Patrice Abry and
Pascale Vicat-Blanc Primet Investigating self-similarity and
heavy-tailed distributions on a
large-scale experimental facility . . . 1261--1274
Mario Barbera and
Alfio Lombardo and
Carla Panarello and
Giovanni Schembra Queue stability analysis and performance
evaluation of a TCP-compliant window
management mechanism . . . . . . . . . . 1275--1288
Kishore Ramachandran and
Ravi Kokku and
Honghai Zhang and
Marco Gruteser Symphony: synchronous two-phase rate and
power control in 802.11 WLANs . . . . . 1289--1302
Lijun Chen and
Steven H. Low and
John C. Doyle Random access game and medium access
control design . . . . . . . . . . . . . 1303--1316
Changchuan Yin and
Long Gao and
Shuguang Cui Scaling laws for overlaid wireless
networks: a cognitive radio network
versus a primary network . . . . . . . . 1317--1329
Bill Lin and
Isaac Keslassy The concurrent matching switch
architecture . . . . . . . . . . . . . . 1330--1343
Xiaolong Li and
Homayoun Yousefi'zadeh Analysis, simulation, and implementation
of VCP: a wireless profiling . . . . . . 1345--1358
Mikhail Afanasyev and
Tsuwei Chen and
Geoffrey M. Voelker and
Alex C. Snoeren Usage patterns in an urban WiFi network 1359--1372
Shervan Fashandi and
Shahab Oveis Gharan and
Amir K. Khandani Path diversity over packet switched
networks: performance analysis and rate
allocation . . . . . . . . . . . . . . . 1373--1386
Jun Luo and
Catherine Rosenberg and
André Girard Engineering wireless mesh networks:
joint scheduling, routing, power
control, and rate adaptation . . . . . . 1387--1400
Leonard H. Grokop and
David N. C. Tse Spectrum sharing between wireless
networks . . . . . . . . . . . . . . . . 1401--1412
Irene Y. Chen and
Li-Da Tong and
Yi-Ming Huang Rearrangeable nonblocking optical
interconnection network fabrics with
crosstalk constraints . . . . . . . . . 1413--1421
Ao Tang and
Lachlan L. H. Andrew and
Krister Jacobsson and
Karl H. Johansson and
Håkan Hjalmarsson and
Steven H. Low Queue dynamics with window flow control 1422--1435
S. Q. Zheng and
Jianping Wang and
Bing Yang and
Mei Yang Minimum-cost multiple paths subject to
minimum link and node sharing in a
network . . . . . . . . . . . . . . . . 1436--1449
Utku Günay Acer and
Shivkumar Kalyanaraman and
Alhussein A. Abouzeid Weak state routing for large-scale
dynamic networks . . . . . . . . . . . . 1450--1463
P. S. Chandrashekhar Thejaswi and
Junshan Zhang and
Man-On Pun and
H. Vincent Poor and
Dong Zheng Distributed opportunistic scheduling
with two-level probing . . . . . . . . . 1464--1477
Eli Brosh and
Salman Abdul Baset and
Vishal Misra and
Dan Rubenstein and
Henning Schulzrinne The delay-friendliness of TCP for
real-time traffic . . . . . . . . . . . 1478--1491
Madanagopal Ramachandran and
N. Usha Rani and
Timothy A. Gonsalves Path computation algorithms for dynamic
service provisioning with protection and
inverse multiplexing in SDH/SONET
networks . . . . . . . . . . . . . . . . 1492--1504
Alessandro Finamore and
Marco Mellia and
Michela Meo and
Dario Rossi KISS: stochastic packet inspection
classifier for UDP traffic . . . . . . . 1505--1515
Domenico Giustiniano and
David Malone and
Douglas J. Leith and
Konstantina Papagiannaki Measuring transmission opportunities in
802.11 links . . . . . . . . . . . . . . 1516--1529
Eyuphan Bulut and
Zijian Wang and
Boleslaw Karol Szymanski Cost-effective multiperiod spraying for
routing in delay-tolerant networks . . . 1530--1543
MohammadHossein Bateni and
Alexandre Gerber and
MohammadTaghi Hajiaghayi and
Subhabrata Sen Multi-VPN optimization for scalable
routing via relaying . . . . . . . . . . 1544--1556
Konstantinos Christodoulopoulos and
Konstantinos Manousakis and
Emmanouel Varvarigos Offline routing and wavelength
assignment in transparent WDM networks 1557--1570
Yan Wu and
Zhoujia Mao and
Sonia Fahmy and
Ness B. Shroff Constructing maximum-lifetime data
gathering forests in sensor networks . . 1571--1584
Tianxiong Ji and
Eleftheria Athanasopoulou and
R. Srikant On optimal scheduling algorithms for
small generalized switches . . . . . . . 1585--1598
Neda Beheshti and
Emily Burmeister and
Yashar Ganjali and
John E. Bowers and
Daniel J. Blumenthal and
Nick McKeown Optical packet buffers for backbone
Internet routers . . . . . . . . . . . . 1599--1609
Shan Chu and
Xin Wang Opportunistic and cooperative spatial
multiplexing in MIMO ad hoc networks . . 1610--1623
Giusi Alfano and
Michele Garetto and
Emilio Leonardi and
Valentina Martina Capacity scaling of wireless networks
with inhomogeneous node density: lower
bounds . . . . . . . . . . . . . . . . . 1624--1636
Yung Yi and
Gustavo De Veciana and
Sanjay Shakkottai MAC scheduling with low overheads by
learning neighborhood contention
patterns . . . . . . . . . . . . . . . . 1637--1650
Agostino Forestiero and
Emilio Leonardi and
Carlo Mastroianni and
Michela Meo Self-chord: a bio-inspired P2P framework
for self-organizing distributed systems 1651--1664
Anat Bremler-Barr and
David Hay and
Danny Hendler and
Ron M. Roth PEDS: a parallel error detection scheme
for TCAM devices . . . . . . . . . . . . 1665--1675
Nizar Bouabdallah and
Rami Langar and
Raouf Boutaba Design and analysis of mobility-aware
clustering algorithms for wireless mesh
networks . . . . . . . . . . . . . . . . 1677--1690
Srinivas Shakkottai and
Xin Liu and
R. Srikant The multicast capacity of large multihop
wireless networks . . . . . . . . . . . 1691--1700
Douglas M. Blough and
G. Resta and
P. Santi Approximation algorithms for wireless
link scheduling with SINR-based
interference . . . . . . . . . . . . . . 1701--1712
Sastry Kompella and
Jeffrey E. Wieselthier and
Anthony Ephremides and
Hanif D. Sherali and
Gam D. Nguyen On optimal SINR-based scheduling in
multihop wireless networks . . . . . . . 1713--1724
Nikhil Shetty and
Galina Schwartz and
Jean Walrand Internet QoS and regulations . . . . . . 1725--1737
Young Myoung Ko and
Natarajan Gautam Epidemic-based information dissemination
in wireless mobile sensor networks . . . 1738--1751
Adam Kirsch and
Michael Mitzenmacher The power of one move: hashing schemes
for hardware . . . . . . . . . . . . . . 1752--1765
Ali Tajer and
Xiaodong Wang Multiuser diversity gain in cognitive
networks . . . . . . . . . . . . . . . . 1766--1779
Ashima Gupta and
Debalina Ghosh and
Prasant Mohapatra Scheduling prioritized services in
multihop OFDMA networks . . . . . . . . 1780--1792
Soumya Sen and
Youngmi Jin and
Roch Guérin and
Kartik Hosanagar Modeling the dynamics of network
technology adoption and the role of
converters . . . . . . . . . . . . . . . 1793--1805
Zheng Yang and
Yunhao Liu and
Xiang-Yang Li Beyond trilateration: on the
localizability of wireless ad hoc
networks . . . . . . . . . . . . . . . . 1806--1814
Zheng Zhang and
Ying Zhang and
Y. Charlie Hu and
Z. Morley Mao and
Randy Bush iSPY: detecting IP prefix hijacking on
my own . . . . . . . . . . . . . . . . . 1815--1828
Yong Liao and
Lixin Gao and
Roch Guérin and
Zhi-Li Zhang Safe interdomain routing under diverse
commercial agreements . . . . . . . . . 1829--1840
Gaurav S. Kasbekar and
Saswati Sarkar Spectrum auction framework for access
allocation in cognitive radio networks 1841--1854
Diana Berbecaru and
Luca Albertalli and
Antonio Lioy The ForwardDiffsig scheme for multicast
authentication . . . . . . . . . . . . . 1855--1868
Mohammad A. Saleh and
Ahmed E. Kamal Design and provisioning of WDM networks
with many-to-many traffic grooming . . . 1869--1882
Diego Lucerna and
Massimo Tornatore and
Achille Pattavina Algorithms and models for backup
reprovisioning in WDM networks . . . . . 1883--1894
Hyang-Won Lee and
Eytan Modiano and
Kayi Lee Diverse routing in networks with
probabilistic failures . . . . . . . . . 1895--1907
Reuven Cohen and
Guy Grebla and
Liran Katzir Cross-layer hybrid FEC/ARQ reliable
multicast with adaptive modulation and
coding in broadband wireless networks 1908--1920
Jaeok Park and
Mihaela Van Der Schaar Medium access control protocols with
memory . . . . . . . . . . . . . . . . . 1921--1934
Kaidi Huang and
Ken R. Duffy and
David Malone On the validity of IEEE 802.11 MAC
modeling hypotheses . . . . . . . . . . 1935--1948
Joseph Camp and
Edward Knightly Modulation rate adaptation in urban and
vehicular environments: cross-layer
implementation and experimental
evaluation . . . . . . . . . . . . . . . 1949--1962
Hanan Shpungin and
Michael Segal Near-optimal multicriteria spanner
constructions in wireless ad hoc
networks . . . . . . . . . . . . . . . . 1963--1976
Domenico Ficara and
Andrea Di Pietro and
Stefano Giordano and
Gregorio Procissi and
Fabio Vitucci Enhancing counting bloom filters through
Huffman-coded multilayer structures . . 1977--1987
Shrinivasa Kini and
Srinivasan Ramasubramanian and
Amund Kvalbein and
Audun Fosselie Hansen Fast recovery from dual-link or
single-node failures in IP networks
using tunneling . . . . . . . . . . . . 1988--1999
Eitan Altman and
Francesco De Pellegrini Forward correction and fountain codes in
delay-tolerant networks . . . . . . . . 1--13
Pierluigi Rolando and
Riccardo Sisto and
Fulvio Risso SPAF: stateless FSA-based packet filters 14--27
Zhong Zhou and
Zheng Peng and
Jun-Hong Cui and
Zhijie Shi Efficient multipath communication for
time-critical applications in underwater
acoustic sensor networks . . . . . . . . 28--41
Yipeng Zhou and
Dah-Ming Chiu and
John C. S. Lui A simple model for chunk-scheduling
strategies in P2P streaming . . . . . . 42--54
Hyunseok Chang and
Sugih Jamin and
Wenjie Wang Live streaming with receiver-based
peer-division multiplexing . . . . . . . 55--68
Reuven Cohen and
Boris Kapchits Continuous neighbor discovery in
asynchronous sensor networks . . . . . . 69--79
Matteo Varvello and
Stefano Ferrari and
Ernst Biersack and
Christophe Diot Exploring second life . . . . . . . . . 80--91
Adrian E. Conway Fast simulation of service availability
in mesh networks with dynamic path
restoration . . . . . . . . . . . . . . 92--101
Dan Li and
Chuanxiong Guo and
Haitao Wu and
Kun Tan and
Yongguang Zhang and
Songwu Lu and
Jianping Wu Scalable and cost-effective
interconnection of data-center servers
using dual server ports . . . . . . . . 102--114
Lihua Yuan and
Chen-Nee Chuah and
Prasant Mohapatra ProgME: towards programmable network
measurement . . . . . . . . . . . . . . 115--128
Gagan Raj Gupta and
Ness B. Shroff Delay analysis and optimality of
scheduling policies for multihop
wireless networks . . . . . . . . . . . 129--141
Andrea Bianco and
David Hay and
Fabio Neri Crosstalk-preventing scheduling in
single-and two-stage AWG-based cell
switches . . . . . . . . . . . . . . . . 142--155
Tianji Li and
Douglas Leith and
David Malone Buffer sizing for 802.11-based networks 156--169
Berk Canberk and
Ian F. Akyildiz and
Sema Oktug Primary user activity modeling using
first-difference filter clustering and
correlation in cognitive radio networks 170--183
Patrick Tague and
Sidharth Nabar and
James A. Ritcey and
Radha Poovendran Jamming-aware traffic allocation for
multiple-path routing using portfolio
selection . . . . . . . . . . . . . . . 184--194
Ivan Wang-Hei Ho and
Kin K. Leung and
John W. Polak Stochastic model and connectivity
dynamics for VANETs in signalized road
systems . . . . . . . . . . . . . . . . 195--208
Yi Xu and
Wenye Wang The limit of information propagation
speed in large-scale multihop wireless
networks . . . . . . . . . . . . . . . . 209--222
Ruogu Li and
Atilla Eryilmaz and
Lei Ying and
Ness B. Shroff A unified approach to optimizing
performance in networks serving
heterogeneous flows . . . . . . . . . . 223--236
Chad R. Meiners and
Alex X. Liu and
Eric Torng Topological transformation approaches to
TCAM-based packet classification . . . . 237--250
Ossama Mohamed Younis and
Marwan M. Krunz and
Srinivasan Ramasubramanian ROC: resilient online coverage for
surveillance applications . . . . . . . 251--264
Yuanzhe Xuan and
Chin-Tau Lea Network-coding multicast networks with
QoS guarantees . . . . . . . . . . . . . 265--274
János Tapolcai and
Bin Wu and
Pin-Han Ho and
Lajos Rónyai A novel approach for failure
localization in all-optical mesh
networks . . . . . . . . . . . . . . . . 275--285
Jerry T. Chiang and
Yih-Chun Hu Cross-layer jamming detection and
mitigation in wireless broadcast
networks . . . . . . . . . . . . . . . . 286--298
Mohammad A. Saleh and
Ahmed E. Kamal Erratum to \em Design and Provisioning
of WDM Networks With Many-to-Many
Traffic Grooming . . . . . . . . . . . . 299--299
Peng Wang and
Stephan Bohacek Practical computation of optimal
schedules in multihop wireless networks 305--318
Chi Zhang and
Yang Song and
Yuguang Fang and
Yanchao Zhang On the price of security in large-scale
wireless ad hoc networks . . . . . . . . 319--332
Henri Dubois-Ferri\`ere and
Matthias Grossglauser and
Martin Vetterli Valuable detours: least-cost anypath
routing . . . . . . . . . . . . . . . . 333--346
Ashvin Lakshmikantha and
Carolyn Beck and
R. Srikant Impact of file arrivals and departures
on buffer sizing in core routers . . . . 347--358
Ruhai Wang and
Scott C. Burleigh and
Paavan Parikh and
Che-Jen Lin and
Bo Sun Licklider transmission protocol
(LTP)-based DTN for cislunar
communications . . . . . . . . . . . . . 359--368
Cong Liu and
Jie Wu Practical routing in a cyclic MobiSpace 369--382
Christos K. Liaskos and
Sophia G. Petridou and
Georgios I. Papadimitriou Towards realizable, low-cost broadcast
systems for dynamic environments . . . . 383--392
Kyu-Han Kim and
Kang G. Shin Self-reconfigurable wireless mesh
networks . . . . . . . . . . . . . . . . 393--404
Bilal Sadiq and
Seung Jun Baek and
Gustavo De Veciana Delay-optimal opportunistic scheduling
and approximations: the log rule . . . . 405--418
Stefano Secci and
Jean-Louis Rougier and
Achille Pattavina and
Fioravante Patrone and
Guido Maier Peering equilibrium multipath routing: a
game theory framework for Internet
peering settlements . . . . . . . . . . 419--432
Ping Xu and
Xiang-Yang Li TOFU: semi-truthful online frequency
allocation mechanism for wireless
network . . . . . . . . . . . . . . . . 433--446
Matthew Andrews and
Lisa Zhang Scheduling algorithms for multicarrier
wireless data systems . . . . . . . . . 447--455
Wei Wei and
Bing Wang and
Don Towsley and
Jim Kurose Model-based identification of dominant
congested links . . . . . . . . . . . . 456--469
Gaurav S. Kasbekar and
Yigal Bejerano and
Saswati Sarkar Lifetime and coverage guarantees through
distributed coordinate-free sensor
activation . . . . . . . . . . . . . . . 470--483
Joohwan Kim and
Xiaojun Lin and
Ness B. Shroff Optimal anycast technique for
delay-sensitive energy-constrained
asynchronous sensor networks . . . . . . 484--497
Michele Flammini and
Alberto Marchetti-Spaccamela and
Gianpiero Monaco and
Luca Moscardelli and
Shmuel Zaks On the complexity of the regenerator
placement problem in optical networks 498--511
Gautam Thatte and
Urbashi Mitra and
John Heidemann Parametric methods for anomaly detection
in aggregate traffic . . . . . . . . . . 512--525
Jung-Shian Li and
Ching-Fang Yang and
Jian-Hong Chen Star-block design in two-level
survivable optical networks . . . . . . 526--539
Xiaoping Wang and
Jun Luo and
Yunhao Liu and
Shanshan Li and
Dezun Dong Component-based localization in sparse
wireless networks . . . . . . . . . . . 540--548
Libin Jiang and
Venkat Anantharam and
Jean Walrand How bad are selfish investments in
network security? . . . . . . . . . . . 549--560
Mohamed Elhawary and
Zygmunt J. Haas Energy-efficient protocol for
cooperative networks . . . . . . . . . . 561--574
Jian Ni and
R. Srikant and
Xinzhou Wu Coloring spatial point processes with
applications to peer discovery in large
wireless networks . . . . . . . . . . . 575--588
Holger Boche and
Siddharth Naik and
Martin Schubert Pareto boundary of utility sets for
multiuser wireless systems . . . . . . . 589--601
Jian Qiu and
Mohan Gurusamy and
Kee Chaing Chua and
Yong Liu Local restoration with multiple spanning
trees in metro Ethernet networks . . . . 602--614
Mahesh Balakrishnan and
Tudor Marian and
Kenneth P. Birman and
Hakim Weatherspoon and
Lakshmi Ganesh Maelstrom: transparent error correction
for communication between data centers 617--629
Injong Rhee and
Minsu Shin and
Seongik Hong and
Kyunghan Lee and
Seong Joon Kim and
Song Chong On the Levy-walk nature of human
mobility . . . . . . . . . . . . . . . . 630--643
Salim El Rouayheb and
Alex Sprintson and
Costas Georghiades Robust network codes for unicast
connections: a case study . . . . . . . 644--656
Sheng Huang and
Charles U. Martel and
Biswanath Mukherjee Survivable multipath provisioning with
differential delay constraint in telecom
mesh networks . . . . . . . . . . . . . 657--669
Nan Hua and
Jun Xu and
Bill Lin and
Haiquan Zhao BRICK: a novel exact active statistics
counter architecture . . . . . . . . . . 670--682
Domenico Ficara and
Andrea Di Pietro and
Stefano Giordano and
Gregorio Procissi and
Fabio Vitucci and
Gianni Antichi Differential encoding of DFAs for fast
regular expression matching . . . . . . 683--694
Yu-Wei Eric Sung and
Xin Sun and
Sanjay G. Rao and
Geoffrey G. Xie and
David A. Maltz Towards systematic design of enterprise
networks . . . . . . . . . . . . . . . . 695--708
Mathieu Leconte and
Jian Ni and
R. Srikant Improved bounds on the throughput
efficiency of greedy maximal scheduling
in wireless networks . . . . . . . . . . 709--720
Balaji Rengarajan and
Gustavo De Veciana Architecture and abstractions for
environment and traffic-aware
system-level coordination of wireless
networks . . . . . . . . . . . . . . . . 721--734
Kostas M. Katrinis and
Anna Tzanakaki On the dimensioning of WDM optical
networks with impairment-aware
regeneration . . . . . . . . . . . . . . 735--746
Xiaolan Joy Zhang and
Sun-Il Kim and
Steven S. Lumetta Opportunity cost analysis for dynamic
wavelength routed mesh networks . . . . 747--759
Saumitra Das and
Konstantina Papagiannaki and
Suman Banerjee and
Y. C. Tay SWARM: the power of structure in
community wireless mesh networks . . . . 760--773
Murali Kodialam and
T. V. Lakshman and
Sudipta Sengupta Traffic-oblivious routing in the hose
model . . . . . . . . . . . . . . . . . 774--787
Pere Barlet-Ros and
Gianluca Iannaccone and
Josep Sanju\`as-Cuxart and
Josep Solé-Pareta Predictive resource management of
multiple monitoring applications . . . . 788--801
Richard T. B. Ma and
Dah Ming Chiu and
John C. S. Lui and
Vishal Misra and
Dan Rubenstein On cooperative settlement between
content, transit, and eyeball Internet
service providers . . . . . . . . . . . 802--815
Libin Jiang and
Jean Walrand Approaching throughput-optimality in
distributed CSMA scheduling algorithms
with collisions . . . . . . . . . . . . 816--829
Brice Augustin and
Timur Friedman and
Renata Teixeira Measuring multipath routing in the
Internet . . . . . . . . . . . . . . . . 830--840
Lei Ying and
Sanjay Shakkottai and
Aneesh Reddy and
Shihuan Liu On combining shortest-path and
back-pressure routing over multihop
wireless networks . . . . . . . . . . . 841--854
Shuyi Chen and
Kaustubh R. Joshi and
Matti A. Hiltunen and
Richard D. Schlichting and
William H. Sanders Using link gradients to predict the
impact of network latency on multitier
applications . . . . . . . . . . . . . . 855--868
Sameh Sorour and
Shahrokh Valaee An adaptive network coded retransmission
scheme for single-hop wireless multicast
broadcast services . . . . . . . . . . . 869--878
Sushant Sharma and
Yi Shi and
Y. Thomas Hou and
Sastry Kompella An optimal algorithm for relay node
assignment in cooperative ad hoc
networks . . . . . . . . . . . . . . . . 879--892
Chi-Kin Chau and
Minghua Chen and
Soung Chang Liew Capacity of large-scale CSMA wireless
networks . . . . . . . . . . . . . . . . 893--906
Péter Babarczi and
János Tapolcai and
Pin-Han Ho Adjacent link failure localization with
monitoring trails in all-optical mesh
networks . . . . . . . . . . . . . . . . 907--920
Ming Xia and
Massimo Tornatore and
Charles U. Martel and
Biswanath Mukherjee Risk-aware provisioning for optical WDM
mesh networks . . . . . . . . . . . . . 921--931
Arun Vishwanath and
Vijay Sivaraman and
George N. Rouskas Anomalous loss performance for mixed
real-time and TCP traffic in routers
with very small buffers . . . . . . . . 933--946
Ren-Shiou Liu and
Kai-Wei Fan and
Zizhan Zheng and
Prasun Sinha Perpetual and fair data collection for
environmental energy harvesting sensor
networks . . . . . . . . . . . . . . . . 947--960
Zhipeng Yang and
Hongyi Wu FINDERS: a featherlight information
network with delay-endurable RFID
support . . . . . . . . . . . . . . . . 961--974
Sherif M. ElRakabawy and
Christoph Lindemann A practical adaptive pacing scheme for
TCP in multihop wireless networks . . . 975--988
Satyajeet S. Ahuja and
Srinivasan Ramasubramanian and
Marwan Krunz SRLG failure localization in optical
networks . . . . . . . . . . . . . . . . 989--999
Kayi Lee and
Eytan Modiano and
Hyang-Won Lee Cross-layer survivability in WDM-based
networks . . . . . . . . . . . . . . . . 1000--1013
Jingjing Zhang and
Nirwan Ansari Scheduling hybrid WDM/TDM passive
optical networks with nonzero laser
tuning time . . . . . . . . . . . . . . 1014--1027
June Hwang and
Seong-Lyun Kim Cross-layer optimization and network
coding in CSMA/CA-based wireless
multihop networks . . . . . . . . . . . 1028--1042
Almut Burchard and
Jörg Liebeherr and
Florin Ciucu On superlinear scaling of network delays 1043--1056
Shihuan Liu and
Lei Ying and
R. Srikant Throughput-optimal opportunistic
scheduling in the presence of flow-level
dynamics . . . . . . . . . . . . . . . . 1057--1070
Ahmed E. Kamal and
Aditya Ramamoorthy and
Long Long and
Shizheng Li Overlay protection against link failures
using network coding . . . . . . . . . . 1071--1084
Luca Cittadini and
Giuseppe Di Battista and
Massimo Rimondini and
Stefano Vissicchio Wheel $+$ ring $=$ reel: the impact of
route filtering on the stability of
policy routing . . . . . . . . . . . . . 1085--1096
Saqib Raza and
Yuanbo Zhu and
Chen-Nee Chuah Graceful network state migrations . . . 1097--1110
Chi-Kin Chau and
Prithwish Basu Analysis of latency of stateless
opportunistic forwarding in
intermittently connected networks . . . 1111--1124
Juan José Jaramillo and
R. Srikant Optimal scheduling for fair resource
allocation in ad hoc networks with
elastic and inelastic traffic . . . . . 1125--1136
Rahul Urgaonkar and
Michael J. Neely Network capacity region and minimum
energy function for a delay-tolerant
mobile ad hoc network . . . . . . . . . 1137--1150
Riccardo Giacomelli and
Radha Krishna Ganti and
Martin Haenggi Outage probability of general ad hoc
networks in the high-reliability regime 1151--1163
Shao-Cheng Wang and
Ahmed Helmy BEWARE: background traffic-aware rate
adaptation for IEEE 802.11 . . . . . . . 1164--1177
Adel Aziz and
David Starobinski and
Patrick Thiran Understanding and tackling the root
causes of instability in wireless mesh
networks . . . . . . . . . . . . . . . . 1178--1193
Tian Lan and
Xiaojun Lin and
Mung Chiang and
Ruby B. Lee Stability and benefits of suboptimal
utility maximization . . . . . . . . . . 1194--1207
Konstantinos Pelechrinis and
Ioannis Broustis and
Srikanth V. Krishnamurthy and
Christos Gkantsidis A measurement-driven anti-jamming system
for 802.11 networks . . . . . . . . . . 1208--1222
M. Kodialam and
T. V. Lakshman and
James B. Orlin and
Sudipta Sengupta End-to-end restorable oblivious routing
of hose model traffic . . . . . . . . . 1223--1236
Minsik Lee and
Youngjip Kim and
Chong-Ho Choi Period-controlled MAC for high
performance in wireless networks . . . . 1237--1250
MyungKeun Yoon and
Tao Li and
Shigang Chen and
Jih-Kwon Peir Fit a compact spread estimator in small
high-speed memory . . . . . . . . . . . 1253--1264
Reuven Cohen and
Niloofar Fazlollahi and
David Starobinski Throughput-competitive advance
reservation with bounded path dispersion 1265--1275
Ketan Rajawat and
Nikolaos Gatsis and
Georgios B. Giannakis Cross-layer designs in coded wireless
fading networks with multicast . . . . . 1276--1289
Christina Aperjis and
Ramesh Johari and
Michael J. Freedman Bilateral and multilateral exchanges for
peer-assisted content distribution . . . 1290--1303
Marwan Batayneh and
Dominic A. Schupke and
Marco Hoffmann and
Andreas Kirstaedter and
Biswanath Mukherjee On routing and transmission-range
determination of multi-bit-rate signals
over mixed-line-rate WDM optical
networks for carrier Ethernet . . . . . 1304--1316
Chuan Wu and
Baochun Li and
Shuqiao Zhao On dynamic server provisioning in
multichannel P2P live streaming . . . . 1317--1330
Melih Onus and
Andréa W. Richa Minimum maximum-degree publish-subscribe
overlay network design . . . . . . . . . 1331--1343
Donghyun Kim and
Wei Wang and
Nassim Sohaee and
Changcun Ma and
Weili Wu and
Wonjun Lee and
Ding-Zhu Du Minimum data-latency-bound $k$-sink
placement problem in wireless sensor
networks . . . . . . . . . . . . . . . . 1344--1353
Xinbing Wang and
Wentao Huang and
Shangxing Wang and
Jinbei Zhang and
Chenhui Hu Delay and capacity tradeoff analysis for
motioncast . . . . . . . . . . . . . . . 1354--1367
Dimitrios Koutsonikolas and
Chih-Chun Wang and
Y. Charlie Hu Efficient network-coding-based
opportunistic routing through cumulative
coded acknowledgments . . . . . . . . . 1368--1381
Bo Li and
Cem Boyaci and
Ye Xia A refined performance characterization
of longest-queue-first policy in
wireless networks . . . . . . . . . . . 1382--1395
Joanne Treurniet A network activity classification schema
and its application to scan detection 1396--1404
Zhenyu Wu and
Mengjun Xie and
Haining Wang Design and implementation of a fast
dynamic packet filter . . . . . . . . . 1405--1419
Amogh Dhamdhere and
Constantine Dovrolis Twelve years in the evolution of the
Internet ecosystem . . . . . . . . . . . 1420--1433
Ovidiu Valentin Drugan and
Thomas Plagemann and
Ellen Munthe-Kaas Detecting communities in sparse MANETs 1434--1447
Dan Li and
Jianping Wu and
Jiangchuan Liu and
Yong Cui and
Ke Xu Defending against distance cheating in
link-weighted application-layer
multicast . . . . . . . . . . . . . . . 1448--1457
François Baccelli and
Nicholas Bambos and
Nicolas Gast Distributed delay-power control
algorithms for bandwidth sharing in
wireless networks . . . . . . . . . . . 1458--1471
Ying Jian and
Ming Zhang and
Shigang Chen Achieving MAC-layer fairness in CSMA/CA
networks . . . . . . . . . . . . . . . . 1472--1484
Qinglin Zhao and
Danny H. K. Tsang and
Taka Sakurai A simple critical-load-based CAC scheme
for IEEE 802.11 DCF networks . . . . . . 1485--1498
Marios Lestas and
Andreas Pitsillides and
Petros Ioannou and
George Hadjipollas A new estimation scheme for the
effective number of users in Internet
congestion control . . . . . . . . . . . 1499--1512
Sumit Singh and
Raghuraman Mudumbai and
Upamanyu Madhow Interference analysis for highly
directional 60-GHz mesh networks: the
case for rethinking medium access
control . . . . . . . . . . . . . . . . 1513--1527
Chandramani Singh and
Saswati Sarkar and
Alireza Aram Provider-customer coalitional games . . 1528--1542
Kin-Wah Kwong and
Lixin Gao and
Roch Guérin and
Zhi-Li Zhang On the feasibility and efficacy of
protection routing in IP networks . . . 1543--1556
Steven Gianvecchio and
Mengjun Xie and
Zhenyu Wu and
Haining Wang Humans and bots in Internet chat:
measurement, analysis, and automated
classification . . . . . . . . . . . . . 1557--1571
J. J. Garcia-Luna-Aceves and
Rolando Menchaca-Mendez PRIME: an interest-driven approach to
integrated unicast and multicast routing
in MANETs . . . . . . . . . . . . . . . 1573--1586
Frédérique Oggier and
Hanane Fathi An authentication code against pollution
attacks in network coding . . . . . . . 1587--1596
Loc X. Bui and
R. Srikant and
Alexander Stolyar A novel architecture for reduction of
delay and queueing structure complexity
in the back-pressure algorithm . . . . . 1597--1609
Sebastian Neumayer and
Gil Zussman and
Reuven Cohen and
Eytan Modiano Assessing the vulnerability of the fiber
infrastructure to disasters . . . . . . 1610--1623
Georgios Smaragdakis and
Nikolaos Laoutaris and
Vassilis Lekakis and
Azer Bestavros and
John W. Byers and
Mema Roussopoulos Selfish overlay network creation and
maintenance . . . . . . . . . . . . . . 1624--1637
Gianni Giorgetti and
Sandeep Kumar S. Gupta and
Gianfranco Manes Understanding the limits of RF-based
collaborative localization . . . . . . . 1638--1651
Sanaz Barghi and
Hamid Jafarkhani and
Homayoun Yousefi'zadeh MIMO-assisted MPR-aware MAC design for
asynchronous WLANs . . . . . . . . . . . 1652--1665
Andrew J. Kalafut and
Craig A. Shue and
Minaxi Gupta Touring DNS open houses for trends and
configurations . . . . . . . . . . . . . 1666--1675
Dragana Damjanovic and
Michael Welzl An extension of the TCP steady-state
throughput equation for parallel flows
and its application in MulTFRC . . . . . 1676--1689
Balaji Rengarajan and
Gustavo De Veciana Practical adaptive user association
policies for wireless systems with
dynamic interference . . . . . . . . . . 1690--1703
Chao Liang and
Miao Zhao and
Yong Liu Optimal bandwidth sharing in multiswarm
multiparty P2P video-conferencing
systems . . . . . . . . . . . . . . . . 1704--1716
Dahai Xu and
Mung Chiang and
Jennifer Rexford Link-state routing with hop-by-hop
forwarding can achieve optimal traffic
engineering . . . . . . . . . . . . . . 1717--1730
Amitabha Ghosh and
Özlem Durmaz Incel and
V. S. Anil Kumar and
Bhaskar Krishnamachari Multichannel scheduling and spanning
trees: throughput-delay tradeoff for
fast data collection in sensor networks 1731--1744
Delia Ciullo and
Valentina Martina and
Michele Garetto and
Emilio Leonardi Impact of correlated mobility on
delay-throughput performance in mobile
ad hoc networks . . . . . . . . . . . . 1745--1758
Konstantinos Christodoulopoulos and
Panagiotis Kokkinos and
Emmanouel Manos Varvarigos Indirect and direct multicost algorithms
for online impairment-aware RWA . . . . 1759--1772
Lei Ying and
R. Srikant and
Don Towsley and
Shihuan Liu Cluster-based back-pressure routing
algorithm . . . . . . . . . . . . . . . 1773--1786
Dezun Dong and
Mo Li and
Yunhao Liu and
Xiang-Yang Li and
Xiangke Liao Topological detection on wormholes in
wireless ad hoc and sensor networks . . 1787--1796
Sumit Rangwala and
Apoorva Jindal and
Ki-Young Jang and
Konstantinos Psounis and
Ramesh Govindan Neighborhood-centric congestion control
for multihop wireless mesh networks . . 1797--1810
Lukasz Budzisz and
Rade Stanojevi\'c and
Arieh Schlote and
Fred Baker and
Robert Shorten On the fair coexistence of loss- and
delay-based TCP . . . . . . . . . . . . 1811--1824
Murali Kodialam and
T. V. Lakshman and
Sarit Mukherjee and
Limin Wang Online scheduling of targeted
advertisements for IPTV . . . . . . . . 1825--1834
Kayi Lee and
Hyang-Won Lee and
Eytan Modiano Reliability in layered networks with
random link failures . . . . . . . . . . 1835--1848
Meng Wang and
Chee Wei Tan and
Weiyu Xu and
Ao Tang Cost of not splitting in routing:
characterization and estimation . . . . 1849--1859
Pu Wang and
Ian F. Akyildiz Spatial correlation and mobility-aware
traffic modeling for wireless sensor
networks . . . . . . . . . . . . . . . . 1860--1873
Neal Charbonneau and
Vinod M. Vokkarane Static routing and wavelength assignment
for multicast advance reservation in
all-optical wavelength-routed WDM
networks . . . . . . . . . . . . . . . . 1--14
Hanan Shpungin and
Zongpeng Li Throughput and energy efficiency in
wireless ad hoc networks with Gaussian
channels . . . . . . . . . . . . . . . . 15--28
Binbin Chen and
Ziling Zhou and
Yuda Zhao and
Haifeng Yu Efficient error estimating coding:
feasibility and applications . . . . . . 29--44
Saqib Raza and
Guanyao Huang and
Chen-Nee Chuah and
Srini Seetharaman and
Jatinder Pal Singh MeasuRouting: a framework for routing
assisted traffic monitoring . . . . . . 45--56
Peilong Li and
Honghai Zhang and
Baohua Zhao and
Sampath Rangarajan Scalable video multicast with adaptive
modulation and coding in broadband
wireless data systems . . . . . . . . . 57--68
Chandramani Singh and
Saswati Sarkar and
Alireza Aram and
Anurag Kumar Cooperative profit sharing in
coalition-based resource allocation in
wireless networks . . . . . . . . . . . 69--83
Kai Chen and
Chuanxiong Guo and
Haitao Wu and
Jing Yuan and
Zhenqian Feng and
Yan Chen and
Songwu Lu and
Wenfei Wu DAC: generic and automatic address
configuration for data center networks 84--99
Arun Sridharan and
C. Emre Koksal and
Elif Uysal-Biyikoglu A greedy link scheduler for wireless
networks with Gaussian multiple-access
and broadcast channels . . . . . . . . . 100--113
Ferhat Dikbiyik and
Laxman Sahasrabuddhe and
Massimo Tornatore and
Biswanath Mukherjee Exploiting excess capacity to improve
robustness of WDM mesh networks . . . . 114--124
Minlan Yu and
Marina Thottan and
Li Li Latency equalization as a new network
service primitive . . . . . . . . . . . 125--138
Myungjin Lee and
Nick Duffield and
Ramana Rao Kompella Opportunistic flow-level latency
estimation using consistent netflow . . 139--152
Sangman Cho and
Theodore Elhourani and
Srinivasan Ramasubramanian Independent directed acyclic graphs for
resilient multipath routing . . . . . . 153--162
Berk Birand and
Maria Chudnovsky and
Bernard Ries and
Paul Seymour and
Gil Zussman and
Yori Zwols Analyzing the performance of greedy
maximal scheduling via local pooling and
graph theory . . . . . . . . . . . . . . 163--176
Hongseok Kim and
Gustavo De Veciana and
Xiangying Yang and
Muthaiah Venkatachalam Distributed $ \alpha $-optimal user
association and cell load balancing in
wireless networks . . . . . . . . . . . 177--190
Giuseppe Campobello and
Alessandro Leonardi and
Sergio Palazzo Improving energy saving and reliability
in wireless sensor networks using a
simple CRT-based packet-forwarding
solution . . . . . . . . . . . . . . . . 191--205
Mosharaf Chowdhury and
Muntasir Raihan Rahman and
Raouf Boutaba ViNEYard: virtual network embedding
algorithms with coordinated node and
link mapping . . . . . . . . . . . . . . 206--219
Craig A. Shue and
Andrew J. Kalafut and
Minaxi Gupta Abnormally malicious autonomous systems
and their Internet connectivity . . . . 220--230
Julien Ridoux and
Darryl Veitch and
Timothy Broomhead The case for feed-forward clock
synchronization . . . . . . . . . . . . 231--242
Abhijeet A. Bhorkar and
Mohammad Naghshvar and
Tara Javidi and
Bhaskar D. Rao Adaptive opportunistic routing for
wireless ad hoc networks . . . . . . . . 243--256
Hayang Kim and
Xiaoli Ma and
Benjamin Russell Hamilton Tracking low-precision clocks with
time-varying drifts using Kalman
filtering . . . . . . . . . . . . . . . 257--270
Yihua He and
Michalis Faloutsos and
Srikanth V. Krishnamurthy and
Marek Chrobak Obtaining provably legitimate Internet
topologies . . . . . . . . . . . . . . . 271--284
Matthew Andrews and
Antonio Fernández Anta and
Lisa Zhang and
Wenbo Zhao Routing for power minimization in the
speed scaling model . . . . . . . . . . 285--294
Fang Hao and
Murali Kodialam and
T. V. Lakshman and
Haoyu Song Fast dynamic multiple-set membership
testing using combinatorial Bloom
filters . . . . . . . . . . . . . . . . 295--304
Yunbo Wang and
Mehmet C. Vuran and
Steve Goddard Cross-layer analysis of the end-to-end
delay distribution in wireless sensor
networks . . . . . . . . . . . . . . . . 305--318
Wei Wei and
Sharad Jaiswal and
Jim Kurose and
Don Towsley and
Kyoungwon Suh and
Bing Wang Identifying 802.11 traffic from passive
measurements using iterative Bayesian
inference . . . . . . . . . . . . . . . 325--338
Sungho Yun and
Constantine Caramanis System-level optimization in wireless
networks: managing interference and
uncertainty via robust optimization . . 339--352
Justin Manweiler and
Naveen Santhapuri and
Souvik Sen and
Romit Roy Choudhury and
Srihari Nelakuditi and
Kamesh Munagala Order matters: transmission reordering
in wireless networks . . . . . . . . . . 353--366
Bridge Qiao Zhao and
John C. S. Lui and
Dah-Ming Chiu A mathematical framework for analyzing
adaptive incentive protocols in P2P
networks . . . . . . . . . . . . . . . . 367--380
Fabio Soldo and
Katerina Argyraki and
Athina Markopoulou Optimal source-based filtering of
malicious traffic . . . . . . . . . . . 381--395
Mukundan Venkataraman and
Mainak Chatterjee Quantifying video-QoE degradations of
Internet links . . . . . . . . . . . . . 396--407
Guoqiang Mao and
Brian D. O. Anderson Towards a better understanding of
large-scale network models . . . . . . . 408--421
Michael Menth and
Frank Lehrieder Performance of PCN-based admission
control under challenging conditions . . 422--435
Miklós Reiter and
Richard Steinberg Congestion-dependent pricing and forward
contracts for complementary segments of
a communication network . . . . . . . . 436--449
Rui Tan and
Guoliang Xing and
Benyuan Liu and
Jianping Wang and
Xiaohua Jia Exploiting data fusion to improve the
coverage of wireless sensor networks . . 450--462
Luca Chiaraviglio and
Marco Mellia and
Fabio Neri Minimizing ISP network energy cost:
formulation and solutions . . . . . . . 463--476
Niv Buchbinder and
Liane Lewin-Eytan and
Ishai Menache and
Joseph Naor and
Ariel Orda Dynamic power allocation under arbitrary
varying channels: an online approach . . 477--487
Chad R. Meiners and
Alex X. Liu and
Eric Torng Bit weaving: a non-prefix approach to
compressing packet classifiers in TCAMs 488--500
Eric Jung and
Xin Liu Opportunistic spectrum access in
multiple-primary-user environments under
the packet collision constraint . . . . 501--514
Kyunghan Lee and
Seongik Hong and
Seong Joon Kim and
Injong Rhee and
Song Chong SLAW: self-similar least-action human
walk . . . . . . . . . . . . . . . . . . 515--529
Tao Shu and
Marwan Krunz Finding cheap routes in profit-driven
opportunistic spectrum access networks:
a truthful mechanism design approach . . 530--543
Souvik Sen and
Romit Roy Choudhury and
Srihari Nelakuditi CSMA/CN: carrier sense multiple access
with collision notification . . . . . . 544--556
Beakcheol Jang and
Mihail L. Sichitiu IEEE 802.11 saturation throughput
analysis in the presence of hidden
terminals . . . . . . . . . . . . . . . 557--570
Ahmed Elmokashfi and
Amund Kvalbein and
Constantine Dovrolis BGP churn evolution: a perspective from
the core . . . . . . . . . . . . . . . . 571--584
Ermin Kozica and
W. Bastiaan Kleijn A quantization theoretic perspective on
simulcast and layered multicast
optimization . . . . . . . . . . . . . . 585--593
Costas Courcoubetis and
Richard Weber Economic issues in shared
infrastructures . . . . . . . . . . . . 594--608
Thang N. Dinh and
Ying Xuan and
My T. Thai and
Panos M. Pardalos and
Taieb Znati On new approaches of assessing network
vulnerability: hardness and
approximation . . . . . . . . . . . . . 609--619
Giovanna Carofiglio and
Luca Muscariello On the impact of TCP and per-flow
scheduling on Internet performance . . . 620--633
Khandoker Nadim Parvez and
Carey Williamson and
Anirban Mahanti and
Niklas Carlsson Insights on media streaming progress
using BitTorrent-like protocols for
on-demand streaming . . . . . . . . . . 637--650
Lili Cao and
Haitao Zheng Balancing reliability and utilization in
dynamic spectrum access . . . . . . . . 651--661
Matthew Roughan and
Yin Zhang and
Walter Willinger and
Lili Qiu Spatio-temporal compressive sensing and
Internet traffic matrices . . . . . . . 662--676
João Luís Sobrinho and
Tiago Quelhas A theory for the connectivity discovered
by routing protocols . . . . . . . . . . 677--689
XiaoHua Xu and
Xiang-Yang Li and
Peng-Jun Wan and
ShaoJie Tang Efficient scheduling for periodic
aggregation queries in multihop sensor
networks . . . . . . . . . . . . . . . . 690--698
Masanori Bando and
N. Sertac Artan and
H. Jonathan Chao Scalable lookahead regular expression
detection system for deep packet
inspection . . . . . . . . . . . . . . . 699--714
Sanjeev Khanna and
Santosh S. Venkatesh and
Omid Fatemieh and
Fariba Khan and
Carl A. Gunter Adaptive selective verification: an
efficient adaptive countermeasure to
thwart DoS attacks . . . . . . . . . . . 715--728
Fong Pong and
Nian-Feng Tzeng Concise lookup tables for IPv4 and IPv6
longest prefix matching in scalable
routers . . . . . . . . . . . . . . . . 729--741
Rafael Laufer and
Henri Dubois-Ferri\`ere and
Leonard Kleinrock Polynomial-time algorithms for multirate
anypath routing in wireless multihop
networks . . . . . . . . . . . . . . . . 742--755
Douglas J. Leith and
Qizhi Cao and
Vijay G. Subramanian Max-min fairness in 802.11 mesh networks 756--769
Changbin Liu and
Ricardo Correa and
Xiaozhou Li and
Prithwish Basu and
Boon Thau Loo and
Yun Mao Declarative policy-based adaptive mobile
ad hoc networking . . . . . . . . . . . 770--783
Edoardo Amaldi and
Antonio Capone and
Matteo Cesana and
Ilario Filippini Design of wireless sensor networks for
mobile target detection . . . . . . . . 784--797
Samir Sebbah and
Brigitte Jaumard Differentiated quality-of-recovery in
survivable optical mesh networks using
$p$-structures . . . . . . . . . . . . . 798--810
Ramana Rao Kompella and
Kirill Levchenko and
Alex C. Snoeren and
George Varghese Router support for fine-grained latency
measurements . . . . . . . . . . . . . . 811--824
Jian Ni and
Bo Tan and
R. Srikant Q-CSMA: queue-length-based CSMA/CA
algorithms for achieving maximum
throughput and low delay in wireless
networks . . . . . . . . . . . . . . . . 825--836
Wei Wang and
Kang G. Shin and
Wenbo Wang Distributed resource allocation based on
queue balancing in multihop cognitive
radio networks . . . . . . . . . . . . . 837--850
Yi Zhu and
Jason P. Jue Reliable collective communications with
weighted SRLGs in optical networks . . . 851--863
Guang Tan and
Anne-Marie Kermarrec Greedy geographic routing in large-scale
sensor networks: a minimum network
decomposition approach . . . . . . . . . 864--877
Siamak Sorooshyari and
Chee Wei Tan and
Mung Chiang Power control for cognitive radio
networks: axioms, algorithms, and
analysis . . . . . . . . . . . . . . . . 878--891
Parv Venkitasubramaniam and
Lang Tong A game-theoretic approach to anonymous
networking . . . . . . . . . . . . . . . 892--905
Abishek Gopalan and
Srinivasan Ramasubramanian On identifying additive link metrics
using linearly independent cycles and
paths . . . . . . . . . . . . . . . . . 906--916
Xinbing Wang and
Luoyi Fu and
Chenhui Hu Multicast performance with hierarchical
cooperation . . . . . . . . . . . . . . 917--930
Brian Eriksson and
Gautam Dasarathy and
Paul Barford and
Robert Nowak Efficient network tomography for
Internet topology discovery . . . . . . 931--943
Dan Li and
Yuanjie Li and
Jianping Wu and
Sen Su and
Jiangwei Yu ESM: efficient and scalable data center
multicast routing . . . . . . . . . . . 944--955
Zizhan Zheng and
Prasun Sinha and
Santosh Kumar Sparse WiFi deployment for vehicular
Internet access with bounded
interconnection gap . . . . . . . . . . 956--969
Anat Bremler-Barr and
Yaron Koral Accelerating multipattern matching on
compressed HTTP traffic . . . . . . . . 970--983
Cataldo Basile and
Alberto Cappadonia and
Antonio Lioy Network-level access control policy
analysis and transformation . . . . . . 985--998
Diego Passos and
Celio V. N. Albuquerque A joint approach to routing metrics and
rate adaptation in wireless mesh
networks . . . . . . . . . . . . . . . . 999--1009
Ionut Trestian and
Supranamaya Ranjan and
Aleksandar Kuzmanovic and
Antonio Nucci Taming the mobile data deluge with drop
zones . . . . . . . . . . . . . . . . . 1010--1023
Vicky Sharma and
Koushik Kar and
K. K. Ramakrishnan and
Shivkumar Kalyanaraman A transport protocol to exploit
multipath diversity in wireless networks 1024--1039
Hao Wang and
Haiquan Zhao and
Bill Lin and
Jun Xu DRAM-based statistics counter array
architecture with performance guarantee 1040--1053
Yi Shi and
Y. Thomas Hou Some fundamental results on base station
movement problem for wireless sensor
networks . . . . . . . . . . . . . . . . 1054--1067
Ashwini Kumar and
Kang G. Shin DSASync: managing end-to-end connections
in dynamic spectrum access wireless LANs 1068--1081
Sharanya Eswaran and
Archan Misra and
Thomas F. La Porta Control-theoretic utility maximization
in multihop wireless networks under
mission dynamics . . . . . . . . . . . . 1082--1095
Krishna Jagannathan and
Mihalis Markakis and
Eytan Modiano and
John N. Tsitsiklis Queue-length asymptotics for generalized
max-weight scheduling in the presence of
heavy-tailed traffic . . . . . . . . . . 1096--1111
Bin Li and
Atilla Eryilmaz Exploring the throughput boundaries of
randomized schedulers in wireless
networks . . . . . . . . . . . . . . . . 1112--1124
Evangelos Bampas and
Aris Pagourtzis and
George Pierrakos and
Katerina Potika On a noncooperative model for wavelength
assignment in multifiber optical
networks . . . . . . . . . . . . . . . . 1125--1137
Jung Ryu and
Lei Ying and
Sanjay Shakkottai Timescale decoupled routing and rate
control in intermittently connected
networks . . . . . . . . . . . . . . . . 1138--1151
Gabriel Y. Keung and
Bo Li and
Qian Zhang The intrusion detection in mobile sensor
network . . . . . . . . . . . . . . . . 1152--1161
Josep M. Pujol and
Vijay Erramilli and
Georgos Siganos and
Xiaoyuan Yang and
Nikolaos Laoutaris and
Parminder Chhabra and
Pablo Rodriguez The little engine(s) that could: scaling
online social networks . . . . . . . . . 1162--1175
Frank Lehrieder and
György Dán and
Tobias Hoßfeld and
Simon Oechsner and
Vlad Singeorzan Caching for BitTorrent-like P2P systems:
a simple fluid model and its
implications . . . . . . . . . . . . . . 1176--1189
Hongbo Jiang and
Arun Iyengar and
Erich Nahum and
Wolfgang Segmuller and
Asser N. Tantawi and
Charles P. Wright Design, implementation, and performance
of a load balancer for SIP server
clusters . . . . . . . . . . . . . . . . 1190--1202
Apoorva Jindal and
Mingyan Liu Networked computing in wireless sensor
networks for structural health
monitoring . . . . . . . . . . . . . . . 1203--1216
Charles Shen and
Erich Nahum and
Henning Schulzrinne and
Charles P. Wright The impact of TLS on SIP server
performance: measurement and modeling 1217--1230
Daniel Medina and
Felix Hoffmann and
Francesco Rossetto and
Carl-Herbert Rokitansky A geographic routing strategy for North
Atlantic in-flight Internet access via
airborne mesh networking . . . . . . . . 1231--1244
Zhen Ling and
Junzhou Luo and
Wei Yu and
Xinwen Fu and
Dong Xuan and
Weijia Jia A new cell-counting-based attack against
Tor . . . . . . . . . . . . . . . . . . 1245--1261
Masanori Bando and
Yi-Li Lin and
H. Jonathan Chao FlashTrie: beyond 100-Gb/s IP route
lookup using hash-based
prefix-compressed trie . . . . . . . . . 1262--1275
Cai Hong Kai and
Soung Chang Liew Applications of belief propagation in
CSMA wireless networks . . . . . . . . . 1276--1289
Guowang Miao and
Ye Li and
Ananthram Swami Channel-aware distributed medium access
control . . . . . . . . . . . . . . . . 1290--1303
Pan Li and
Miao Pan and
Yuguang Fang Capacity bounds of three-dimensional
wireless ad hoc networks . . . . . . . . 1304--1315
Long Bao Le and
Eytan Modiano and
Ness B. Shroff Optimal control of wireless networks
with finite buffers . . . . . . . . . . 1316--1329
Ravi Kokku and
Rajesh Mahindra and
Honghai Zhang and
Sampath Rangarajan NVS: a substrate for virtualizing
wireless resources in cellular networks 1333--1346
M. H. R. Khouzani and
Saswati Sarkar and
Eitan Altman Maximum damage malware attack in mobile
wireless networks . . . . . . . . . . . 1347--1360
Alex Sherman and
Jason Nieh and
Clifford Stein FairTorrent: a deficit-based distributed
algorithm to ensure fairness in
peer-to-peer systems . . . . . . . . . . 1361--1374
Dimitrios Koutsonikolas and
Y. Charlie Hu and
Chih-Chun Wang Pacifier: high-throughput, reliable
multicast without ``Crying babies'' in
wireless mesh networks . . . . . . . . . 1375--1388
Wei Chen and
Khaled B. Letaief and
Zhigang Cao Buffer-aware network coding for wireless
networks . . . . . . . . . . . . . . . . 1389--1401
Yang Qin and
Lie-Liang Yang Steady-state throughput analysis of
network coding nodes employing
stop-and-wait automatic repeat request 1402--1411
Yongkun Li and
Bridge Qiao Zhao and
John C. S. Lui On modeling product advertisement in
large-scale online social networks . . . 1412--1425
Danhua Guo and
Laxmi Narayan Bhuyan and
Bin Liu An efficient parallelized L7-filter
design for multicore servers . . . . . . 1426--1439
Murtaza Zafer and
Dakshi Agrawal and
Mudhakar Srivatsa Limitations of generating a secret key
using wireless fading under active
adversary . . . . . . . . . . . . . . . 1440--1451
Joseph Camp and
Ehsan Aryafar and
Edward Knightly Coupled 802.11 flows in urban channels:
model and experimental evaluation . . . 1452--1465
Yi Gai and
Bhaskar Krishnamachari and
Rahul Jain Combinatorial network optimization with
unknown variables: multi-armed bandits
with linear rewards and individual
observations . . . . . . . . . . . . . . 1466--1478
Danail Traskov and
Michael Heindlmaier and
Muriel Médard and
Ralf Koetter Scheduling for network-coded multicast 1479--1488
Haoyu Song and
Murali Kodialam and
Fang Hao and
T. V. Lakshman Efficient trie braiding in scalable
virtual routers . . . . . . . . . . . . 1489--1500
Wentao Huang and
Xinbing Wang Capacity scaling of general cognitive
networks . . . . . . . . . . . . . . . . 1501--1513
Mhameed Aezladen and
Reuven Cohen and
Danny Raz Efficient location-based
decision-supporting content distribution
to mobile groups . . . . . . . . . . . . 1514--1526
Mohammad A. Saleh and
Ahmed E. Kamal Approximation algorithms for
many-to-many traffic grooming in optical
WDM networks . . . . . . . . . . . . . . 1527--1540
Cem Tekin and
Mingyan Liu and
Richard Southwell and
Jianwei Huang and
Sahand Haji Ali Ahmad Atomic congestion games on graphs and
their applications in networking . . . . 1541--1552
Wei Gao and
Qinghua Li and
Bo Zhao and
Guohong Cao Social-aware multicast in
disruption-tolerant networks . . . . . . 1553--1566
Ramon Aparicio-Pardo and
Nina Skorin-Kapov and
Pablo Pavon-Marino and
Belen Garcia-Manrubia (Non-)reconfigurable virtual topology
design under multihour traffic in
optical networks . . . . . . . . . . . . 1567--1580
Khoa Tran Phan and
Jaeok Park and
Mihaela Van Der Schaar Near-optimal deviation-proof medium
access control designs in wireless
networks . . . . . . . . . . . . . . . . 1581--1594
Honghai Zhang and
Yuanxi Jiang and
Karthik Sundaresan and
Sampath Rangarajan and
Baohua Zhao Wireless multicast scheduling with
switched beamforming antennas . . . . . 1595--1607
Shreeshankar Bodas and
Sanjay Shakkottai and
Lei Ying and
R. Srikant Low-complexity scheduling algorithms for
multichannel downlink wireless networks 1608--1621
Tao Li and
Shigang Chen and
Yibei Ling Per-flow traffic measurement through
randomized counter sharing . . . . . . . 1622--1634
Eugenio Magistretti and
Omer Gurewitz and
Edward W. Knightly Measurement-driven modeling of
transmission coordination for 802.11
online . . . . . . . . . . . . . . . . . 1635--1648
Ruogu Li and
Atilla Eryilmaz Scheduling for end-to-end
deadline-constrained traffic with
reliability requirements in multihop
networks . . . . . . . . . . . . . . . . 1649--1662
Sandeep Yadav and
Ashwath Kumar Krishna Reddy and
A. L. Narasimha Reddy and
Supranamaya Ranjan Detecting algorithmically generated
domain-flux attacks with DNS traffic
analysis . . . . . . . . . . . . . . . . 1663--1677
Minghua Chen and
Miroslav Ponec and
Sudipta Sengupta and
Jin Li and
Philip A. Chou Utility maximization in peer-to-peer
systems with applications to video
conferencing . . . . . . . . . . . . . . 1681--1694
Bo Han and
Lusheng Ji and
Seungjoon Lee and
Bobby Bhattacharjee and
Robert R. Miller Are all bits equal?: experimental study
of IEEE 802.11 communication bit errors 1695--1706
Lu Zhang and
Xueyan Tang Optimizing client assignment for
enhancing interactivity in distributed
interactive applications . . . . . . . . 1707--1720
Ihsan Ayyub Qazi and
Lachlan L. H. Andrew and
Taieb Znati Congestion control with multipacket
feedback . . . . . . . . . . . . . . . . 1721--1733
He Yan and
Lee Breslau and
Zihui Ge and
Dan Massey and
Dan Pei and
Jennifer Yates G-RCA: a generic root cause analysis
platform for service quality management
in large IP networks . . . . . . . . . . 1734--1747
Liguang Xie and
Yi Shi and
Y. Thomas Hou and
Hanif D. Sherali Making sensor networks immortal: an
energy-renewal approach with wireless
power transfer . . . . . . . . . . . . . 1748--1761
János Tapolcai and
Pin-Han Ho and
Lajos Rónyai and
Bin Wu Network-wide local unambiguous failure
localization (NWL-UFL) via monitoring
trails . . . . . . . . . . . . . . . . . 1762--1773
Fei Chen and
Alex X. Liu Privacy- and integrity-preserving range
queries in sensor networks . . . . . . . 1774--1787
Daniela Brauckhoff and
Xenofontas Dimitropoulos and
Arno Wagner and
Kavé Salamatian Anomaly extraction in backbone networks
using association rules . . . . . . . . 1788--1799
Yong Ding and
Yang Yang and
Li Xiao Multisource video on-demand streaming in
wireless mesh networks . . . . . . . . . 1800--1813
Anduo Wang and
Limin Jia and
Wenchao Zhou and
Yiqing Ren and
Boon Thau Loo and
Jennifer Rexford and
Vivek Nigam and
Andre Scedrov and
Carolyn Talcott FSR: formal analysis and implementation
toolkit for safe interdomain routing . . 1814--1827
Jérôme François and
Issam Aib and
Raouf Boutaba FireCol: a collaborative protection
network for the detection of flooding
DDoS attacks . . . . . . . . . . . . . . 1828--1841
Laurent Vanbever and
Stefano Vissicchio and
Cristel Pelsser and
Pierre Francois and
Olivier Bonaventure Lossless migrations of link-state IGPs 1842--1855
Eitan Altman and
Anurag Kumar and
Chandramani Singh and
Rajesh Sundaresan Spatial SINR games of base station
placement and mobile association . . . . 1856--1869
George B. Mertzios and
Ignasi Sau and
Mordechai Shalom and
Shmuel Zaks Placing regenerators in optical networks
to satisfy multiple sets of requests . . 1870--1879
Thuy T. T. Nguyen and
Grenville Armitage and
Philip Branch and
Sebastian Zander Timely and continuous
machine-learning-based classification
for interactive IP traffic . . . . . . . 1880--1894
Isaac Keslassy and
Kirill Kogan and
Gabriel Scalosub and
Michael Segal Providing performance guarantees in
multipass network processors . . . . . . 1895--1909
Jeff Seibert and
Ruben Torres and
Marco Mellia and
Maurizio M. Munafo and
Cristina Nita-Rotaru and
Sanjay Rao The Internet-wide impact of P2P traffic
localization on ISP profitability . . . 1910--1923
Weiyao Xiao and
Sachin Agarwal and
David Starobinski and
Ari Trachtenberg Reliable rateless wireless broadcasting
with near-zero feedback . . . . . . . . 1924--1937
Dominic DiPalantino and
Ramesh Johari Traffic engineering with semiautonomous
users: a game-theoretic perspective . . 1938--1949
Jiajia Liu and
Xiaohong Jiang and
Hiroki Nishiyama and
Nei Kato Generalized two-hop relay for flexible
delay control in MANETs . . . . . . . . 1950--1963
Ziqiu Yun and
Xiaole Bai and
Dong Xuan and
Weijia Jia and
Wei Zhao Pattern mutation in wireless sensor
deployment . . . . . . . . . . . . . . . 1964--1977
Tao Li and
Samuel S. Wu and
Shigang Chen and
Mark C. K. Yang Generalized energy-efficient algorithms
for the RFID estimation problem . . . . 1978--1990
Gaurav S. Kasbekar and
Yigal Bejerano and
Saswati Sarkar Generic coverage verification without
location information using dimension
reduction . . . . . . . . . . . . . . . 1991--2004
Vinod Kone and
Lei Yang and
Xue Yang and
Ben Y. Zhao and
Haitao Zheng The effectiveness of opportunistic
spectrum access: a measurement study . . 2005--2016
Mukarram Bin Tariq and
Kaushik Bhandankar and
Vytautas Valancius and
Amgad Zeitoun and
Nick Feamster and
Mostafa Ammar Answering: techniques and deployment
experience . . . . . . . . . . . . . . . 1--13
Yunyue Lin and
Qishi Wu Complexity analysis and algorithm design
for advance bandwidth scheduling in
dedicated networks . . . . . . . . . . . 14--27
Youngmi Jin and
George Kesidis and
Ju Wook Jang Diffusion dynamics of network
technologies with bounded rational
users: aspiration-based learning . . . . 28--40
Michael J. Neely Delay-based network utility maximization 41--54
Sabato Manfredi and
Francesco Oliviero and
Simon Pietro Romano A distributed control law for load
balancing in content delivery networks 55--68
Sudarshan Vasudevan and
Micah Adler and
Dennis Goeckel and
Don Towsley Efficient algorithms for neighbor
discovery in wireless networks . . . . . 69--83
Fangwen Fu and
Ulas C. Kozat Stochastic game for wireless network
virtualization . . . . . . . . . . . . . 84--97
Haoyu Song and
Jonathan S. Turner ABC: adaptive binary cuttings for
multidimensional packet classification 98--109
Juan Liu and
Wei Chen and
Ying Jun Zhang and
Zhigang Cao A utility maximization framework for
fair and efficient multicasting in
multicarrier wireless cellular networks 110--120
Ting Zhu and
Ziguo Zhong and
Tian He and
Zhi-Li Zhang Achieving efficient flooding by
utilizing link correlation in wireless
sensor networks . . . . . . . . . . . . 121--134
Yanhua Li and
Zhi-Li Zhang Random walks and Green's function on
digraphs: a framework for estimating
wireless transmission costs . . . . . . 135--148
Xi Deng and
Yuanyuan Yang and
Sangjin Hong A flexible platform for hardware-aware
network experiments and a case study on
wireless network coding . . . . . . . . 149--161
Miao Wang and
Lisong Xu and
Byrav Ramamurthy Exploring the design space of
multichannel peer-to-peer live video
streaming systems . . . . . . . . . . . 162--175
Sung Hyun Chun and
Richard J. La Secondary spectrum trading:
auction-based framework for spectrum
allocation and profit sharing . . . . . 176--189
Maxwell Young and
Aniket Kate and
Ian Goldberg and
Martin Karsten Towards practical communication in
Byzantine-resistant DHTs . . . . . . . . 190--203
Yong He and
Jie Sun and
Xiaojun Ma and
Athanasios V. Vasilakos and
Ruixi Yuan and
Weibo Gong Semi-random backoff: towards resource
reservation for channel access in
wireless LANs . . . . . . . . . . . . . 204--217
Shaolei Ren and
Jaeok Park and
Mihaela Van Der Schaar Entry and spectrum sharing scheme
selection in femtocell communications
markets . . . . . . . . . . . . . . . . 218--232
Yipeng Zhou and
Tom Z. J. Fu and
Dah Ming Chiu On replication algorithm in P2P VoD . . 233--243
Eleftheria Athanasopoulou and
Loc X. Bui and
Tianxiong Ji and
R. Srikant and
Alexander Stolyar Back-pressure-based packet-by-packet
adaptive routing in communication
networks . . . . . . . . . . . . . . . . 244--257
Urtzi Ayesta and
Martin Erausquin and
Matthieu Jonckheere and
Ina Maria Verloop Scheduling in a random environment:
stability and asymptotic optimality . . 258--271
Shinuk Woo and
Hwangnam Kim An empirical interference modeling for
link reliability assessment in wireless
networks . . . . . . . . . . . . . . . . 272--285
Bozidar Radunovic and
Alexandre Proutiere On downlink capacity of cellular data
networks with WLAN/WPAN relays . . . . . 286--296
György Dán and
Niklas Carlsson Centralized and distributed protocols
for tracker-based dynamic swarm
management . . . . . . . . . . . . . . . 297--310
Jizhong Zhao and
Wei Xi and
Yuan He and
Yunhao Liu and
Xiang-Yang Li and
Lufeng Mo and
Zheng Yang Localization of wireless sensor networks
in the wild: pursuit of ranging quality 311--323
C. Emre Koksal and
Ozgur Ercetin and
Yunus Sarikaya Control of wireless networks with
secrecy . . . . . . . . . . . . . . . . 324--337
Haitao Wu and
Zhenqian Feng and
Chuanxiong Guo and
Yongguang Zhang ICTCP: incast congestion control for TCP
in data-center networks . . . . . . . . 345--358
Beatriz Lorenzo and
Savo Glisic Context-aware nanoscale modeling of
multicast multihop cellular networks . . 359--372
Victor M. Preciado and
Ali Jadbabaie Moment-based spectral analysis of
large-scale networks using local
structural information . . . . . . . . . 373--382
Ken Keys and
Young Hyun and
Matthew Luckie and
Kim Claffy Internet-scale IPv4 alias resolution
with MIDAR . . . . . . . . . . . . . . . 383--399
Wei Cheng and
Nan Zhang and
Xiuzhen Cheng and
Min Song and
Dechang Chen Time-bounded essential localization for
wireless sensor networks . . . . . . . . 400--412
Ammar Metnani and
Brigitte Jaumard Stability of FIPP $p$-cycles under
dynamic traffic in WDM networks: dynamic
traffic,failure-independent
path-protecting (FIPP) $p$-cycles,path
protection,shared bandwidth
protection,stability of protection
structures . . . . . . . . . . . . . . . 413--425
Xinyu Zhang and
Kang G. Shin Cooperative carrier signaling:
harmonizing coexisting WPAN and WLAN
devices . . . . . . . . . . . . . . . . 426--439
Xinbing Wang and
Xiaojun Lin and
Qingsi Wang and
Wentao Luan Mobility increases the connectivity of
wireless networks . . . . . . . . . . . 440--454
Ece Gelal and
Jianxia Ning and
Konstantinos Pelechrinis and
Tae-Suk Kim and
Ioannis Broustis and
Srikanth V. Krishnamurthy and
Bhaskar D. Rao Topology control for effective
interference cancellation in multiuser
MIMO networks . . . . . . . . . . . . . 455--468
Nikolaos M. Freris and
Cheng-Hsin Hsu and
Jatinder Pal Singh and
Xiaoqing Zhu Distortion-aware scalable video
streaming to multinetwork clients . . . 469--481
Eitan Altman and
Amar Prakash Azad and
Tamer Basar and
Francesco De Pellegrini Combined optimal control of activation
and transmission in delay-tolerant
networks . . . . . . . . . . . . . . . . 482--494
Po-Kai Huang and
Xiaojun Lin and
Chih-Chun Wang A low-complexity congestion control and
scheduling algorithm for multihop
wireless networks with order-optimal
per-flow delay . . . . . . . . . . . . . 495--508
Brad W. Zarikoff and
Douglas J. Leith Measuring pulsed interference in 802.11
links . . . . . . . . . . . . . . . . . 509--521
Lei Yang and
Hongseok Kim and
Junshan Zhang and
Mung Chiang and
Chee Wei Tan Pricing-based decentralized spectrum
access control in cognitive radio
networks . . . . . . . . . . . . . . . . 522--535
Kyunghan Lee and
Joohyun Lee and
Yung Yi and
Injong Rhee and
Song Chong Mobile data offloading: how much can
WiFi deliver? . . . . . . . . . . . . . 536--550
Alex X. Liu and
Amir R. Khakpour Quantifying and verifying reachability
for access controlled networks . . . . . 551--565
Bo Tan and
Laurent Massoulié Optimal content placement for
peer-to-peer video-on-demand systems . . 566--579
Daniel S. Menasche and
Antonio A. De A.Rocha and
Bin Li and
Don Towsley and
Arun Venkataramani Content availability and bundling in
swarming systems . . . . . . . . . . . . 580--593
Eric Rozner and
Mi Kyung Han and
Lili Qiu and
Yin Zhang Model-driven optimization of
opportunistic routing . . . . . . . . . 594--609
Andrea Clementi and
Francesco Pasquale and
Riccardo Silvestri Opportunistic MANETs: mobility can make
up for low transmission power . . . . . 610--620
Qianhong Wu and
Bo Qin and
Lei Zhang and
Josep Domingo-Ferrer and
Jesús A. Manjón Fast transmission to remote cooperative
groups: a new key management paradigm 621--633
Bo Ji and
Changhee Joo and
Ness B. Shroff Throughput-optimal scheduling in
multihop wireless networks without
per-flow information . . . . . . . . . . 634--647
Malati Hegde and
Pavan Kumar and
K. R. Vasudev and
N. N. Sowmya and
S. V. R. Anand and
Anurag Kumar and
Joy Kuri Experiences with a centralized
scheduling approach for performance
management of IEEE 802.11 wireless LANs 648--662
Simon S. Lam and
Chen Qian Geographic routing in $d$-dimensional
spaces with guaranteed delivery and low
stretch . . . . . . . . . . . . . . . . 663--677
De Wen Soh and
Wee Peng Tay and
Tony Q. S. Quek Randomized information dissemination in
dynamic environments . . . . . . . . . . 681--691
Ioannis Pefkianakis and
Suk-Bok Lee and
Songwu Lu Towards MIMO-aware 802.11n rate
adaptation . . . . . . . . . . . . . . . 692--705
Chee Wei Tan and
Mung Chiang and
R. Srikant Fast algorithms and performance bounds
for sum rate maximization in wireless
networks . . . . . . . . . . . . . . . . 706--719
Chris Y. T. Ma and
David K. Y. Yau and
Nung Kwan Yip and
Nageswara S. V. Rao Privacy vulnerability of published
anonymous mobility traces . . . . . . . 720--733
Hung X. Nguyen and
Matthew Roughan Rigorous statistical analysis of
Internet loss measurements . . . . . . . 734--745
Dajun Qian and
Dong Zheng and
Junshan Zhang and
Ness B. Shroff and
Changhee Joo Distributed CSMA algorithms for link
scheduling in multihop MIMO networks
under SINR model . . . . . . . . . . . . 746--759
Andréa Richa and
Christian Scheideler and
Stefan Schmid and
Jin Zhang An efficient and fair MAC protocol
robust to reactive interference . . . . 760--771
Ji Fang and
Kun Tan and
Yuanyang Zhang and
Shouyuan Chen and
Lixin Shi and
Jiansong Zhang and
Yongguang Zhang and
Zhenhui Tan Fine-grained channel access in wireless
LAN . . . . . . . . . . . . . . . . . . 772--787
Felipe Lalanne and
Stephane Maag A formal data-centric approach for
passive testing of communication
protocols . . . . . . . . . . . . . . . 788--801
Fabio Checconi and
Luigi Rizzo and
Paolo Valente QFQ: efficient packet scheduling with
tight guarantees . . . . . . . . . . . . 802--816
Tao Li and
Shigang Chen and
Wen Luo and
Ming Zhang and
Yan Qiao Spreader classification based on optimal
dynamic bit sharing . . . . . . . . . . 817--830
Longbo Huang and
Scott Moeller and
Michael J. Neely and
Bhaskar Krishnamachari LIFO-backpressure achieves near-optimal
utility-delay tradeoff . . . . . . . . . 831--844
Natalia Castro Fernandes and
Marcelo Duffles Donato Moreira and
Otto Carlos Muniz Bandeira Duarte An efficient and robust addressing
protocol for node autoconfiguration in
ad hoc networks . . . . . . . . . . . . 845--856
Fei Chen and
Bezawada Bruhadeshwar and
Alex X. Liu Cross-domain privacy-preserving
cooperative firewall optimization . . . 857--868
Sriram N. Premnath and
Daryl Wasden and
Sneha K. Kasera and
Neal Patwari and
Behrouz Farhang-Boroujeny Beyond OFDM: best-effort dynamic
spectrum access using filterbank
multicarrier . . . . . . . . . . . . . . 869--882
Manuel Fogue and
Piedad Garrido and
Francisco J. Martinez and
Juan-Carlos Cano and
Carlos T. Calafate and
Pietro Manzoni An adaptive system based on roadmap
profiling to enhance warning message
dissemination in VANETs . . . . . . . . 883--895
Mustafa Y. Arslan and
Konstantinos Pelechrinis and
Ioannis Broustis and
Shailendra Singh and
Srikanth V. Krishnamurthy and
Sateesh Addepalli and
Konstantina Papagiannaki ACORN: an auto-configuration framework
for 802.11n WLANs . . . . . . . . . . . 896--909
Kai Han and
Yang Liu and
Jun Luo Duty-cycle-aware minimum-energy
multicasting in wireless sensor networks 910--923
Yuanqing Zheng and
Mo Li Fast tag searching protocol for
large-scale RFID systems . . . . . . . . 924--934
Eitan Altman and
Philippe Nain and
Adam Shwartz and
Yuedong Xu Predicting the impact of measures
against P2P networks: transient behavior
and phase transition . . . . . . . . . . 935--949
Tae-Suk Kim and
Ioannis Broustis and
Serdar Vural and
Dimitris Syrivelis and
Shailendra Singh and
Srikanth V. Krishnamurthy and
Thomas F. La Porta Realizing the benefits of wireless
network coding in multirate settings . . 950--962
Yilin Shen and
Nam P. Nguyen and
Ying Xuan and
My T. Thai On the discovery of critical links and
nodes for assessing network
vulnerability . . . . . . . . . . . . . 963--973
Reza Moazzez-Estanjini and
Jing Wang and
Ioannis Ch. Paschalidis Scheduling mobile nodes for cooperative
data transport in sensor networks . . . 974--989
Stefano Vissicchio and
Laurent Vanbever and
Cristel Pelsser and
Luca Cittadini and
Pierre Francois and
Olivier Bonaventure Improving network agility with seamless
BGP reconfigurations . . . . . . . . . . 990--1002
Stefano Paris and
Cristina Nita-Rotaru and
Fabio Martignon and
Antonio Capone Cross-layer metrics for reliable routing
in wireless mesh networks . . . . . . . 1003--1016
Kaidi D. Huang and
Ken R. Duffy and
David Malone H-RCA: 802.11 collision-aware rate
control . . . . . . . . . . . . . . . . 1021--1034
Sayandeep Sen and
Tan Zhang and
Syed Gilani and
Shreesha Srinath and
Suman Banerjee and
Sateesh Addepalli Design and implementation of an
``approximate'' communication system for
wireless media applications . . . . . . 1035--1048
Rahul Srivastava and
Can Emre Koksal Basic performance limits and tradeoffs
in energy-harvesting sensor nodes with
finite data and energy storage . . . . . 1049--1062
Javad Ghaderi and
R. Srikant The impact of access probabilities on
the delay performance of Q--CSMA
algorithms in wireless networks . . . . 1063--1075
Amir R. Khakpour and
Alex X. Liu An information-theoretical approach to
high-speed flow nature identification 1076--1089
Xiaoming Wang and
Xiaoyong Li and
Dmitri Loguinov Modeling residual-geometric flow
sampling . . . . . . . . . . . . . . . . 1090--1103
Tsern-Huei Lee and
Nai-Lun Huang A pattern-matching scheme with high
throughput performance and low memory
requirement . . . . . . . . . . . . . . 1104--1116
Longbo Huang and
Michael J. Neely Utility optimal scheduling in
energy-harvesting networks . . . . . . . 1117--1130
Amin Karbasi and
Sewoong Oh Robust localization from incomplete
local information . . . . . . . . . . . 1131--1144
David López-Pérez and
Xiaoli Chu and
Athanasios V. Vasilakos and
Holger Claussen On distributed and coordinated resource
allocation for interference mitigation
in self-organizing LTE networks . . . . 1145--1158
Rik Sarkar and
Jie Gao Differential forms for target tracking
and aggregate queries in distributed
networks . . . . . . . . . . . . . . . . 1159--1172
Zhangyu Guan and
Tommaso Melodia and
Dongfeng Yuan Jointly optimal rate control and relay
selection for cooperative wireless video
streaming . . . . . . . . . . . . . . . 1173--1186
Liang Zhang and
Shigang Chen and
Ying Jian and
Yuguang Fang and
Zhen Mo Maximizing lifetime vector in wireless
sensor networks . . . . . . . . . . . . 1187--1200
Yeim-Kuan Chang and
Cheng-Chien Su and
Yung-Chieh Lin and
Sun-Yuan Hsieh Efficient gray-code-based range encoding
schemes for packet classification in
TCAM . . . . . . . . . . . . . . . . . . 1201--1214
Xinzhou Wu and
Saurabha Tavildar and
Sanjay Shakkottai and
Tom Richardson and
Junyi Li and
Rajiv Laroia and
Aleksandar Jovicic FlashLinQ: a synchronous distributed
scheduler for peer-to-peer ad hoc
networks . . . . . . . . . . . . . . . . 1215--1228
Chih-Cheng Hsu and
Ming-Shing Kuo and
Cheng-Fu Chou and
Kate Ching-Ju Lin The elimination of spatial-temporal
uncertainty in underwater sensor
networks . . . . . . . . . . . . . . . . 1229--1242
Zhenghao Zhang and
Steven Bronson and
Jin Xie and
Wei Hu Employing the
one-sender-multiple-receiver technique
in wireless LANs . . . . . . . . . . . . 1243--1255
Subhash Lakshminarayana and
Atilla Eryilmaz Multirate multicasting with intralayer
network coding . . . . . . . . . . . . . 1256--1269
Shouling Ji and
Zhipeng Cai Distributed data collection in
large-scale asynchronous wireless sensor
networks under the generalized physical
interference model . . . . . . . . . . . 1270--1283
Yosuke Himura and
Kensuke Fukuda and
Kenjiro Cho and
Pierre Borgnat and
Patrice Abry and
Hiroshi Esaki Synoptic graphlet: bridging the gap
between supervised and unsupervised
profiling of host-level network traffic 1284--1297
Ken R. Duffy and
Charles Bordenave and
Douglas J. Leith Decentralized constraint satisfaction 1298--1308
Jacques Lévy Véhel and
Michal Rams Large deviation multifractal analysis of
a class of additive processes with
correlated nonstationary increments . . 1309--1321
Ioannis Caragiannis and
Michele Flammini and
Luca Moscardelli An exponential improvement on the MST
heuristic for minimum energy
broadcasting in ad hoc wireless networks 1322--1331
Laura Galluccio and
Giacomo Morabito and
Sergio Palazzo GEographic Multicast (GEM) for dense
wireless networks: protocol design and
performance analysis . . . . . . . . . . 1332--1346
Ehsan Aryafar and
Theodoros Salonidis and
Jingpu Shi and
Edward Knightly Synchronized CSMA contention: model,
implementation, and evaluation . . . . . 1349--1362
Marco Cello and
Giorgio Gnecco and
Mario Marchese and
Marcello Sanguineti Optimality conditions for
coordinate-convex policies in CAC with
nonlinear feasibility boundaries . . . . 1363--1377
Minghong Lin and
Adam Wierman and
Lachlan L. H. Andrew and
Eno Thereska Dynamic right-sizing for
power-proportional data centers . . . . 1378--1391
Apoorva Jindal and
Konstantinos Psounis On the efficiency of CSMA-CA scheduling
in wireless multihop networks . . . . . 1392--1406
Xiaolan Zhang and
Giovanni Neglia and
Jim Kurose and
Don Towsley and
Haixiang Wang Benefits of network coding for unicast
application in disruption-tolerant
networks . . . . . . . . . . . . . . . . 1407--1420
Rubén Cuevas and
Michal Kryczka and
Angel Cuevas and
Sebastian Kaune and
Carmen Guerrero and
Reza Rejaie Unveiling the incentives for content
publishing in popular BitTorrent portals 1421--1435
Sara Gatmir-Motahari and
Hui Zang and
Phyllis Reuther Time-clustering-based place prediction
for wireless subscribers . . . . . . . . 1436--1446
Mustafa Y. Arslan and
Jongwon Yoon and
Karthikeyan Sundaresan and
Srikanth V. Krishnamurthy and
Suman Banerjee A resource management system for
interference mitigation in enterprise
OFDMA femtocells . . . . . . . . . . . . 1447--1460
Reuven Cohen and
Ilia Nudelman and
Gleb Polevoy On the admission of dependent flows in
powerful sensor networks . . . . . . . . 1461--1471
Hazem Gomaa and
Geoffrey G. Messier and
Carey Williamson and
Robert Davies Estimating instantaneous cache hit ratio
using Markov chain analysis . . . . . . 1472--1483
Ilario Filippini and
Eylem Ekici and
Matteo Cesana A new outlook on routing in cognitive
radio networks: minimum-maintenance-cost
routing . . . . . . . . . . . . . . . . 1484--1498
Wei Wang and
Donghyun Kim and
Min Kyung An and
Wei Gao and
Xianyue Li and
Zhao Zhang and
Weili Wu On construction of quality
fault-tolerant virtual backbone in
wireless networks . . . . . . . . . . . 1499--1510
Yongjun Liao and
Wei Du and
Pierre Geurts and
Guy Leduc DMFSGD: a decentralized matrix
factorization algorithm for network
distance prediction . . . . . . . . . . 1511--1524
Pankaj K. Agarwal and
Alon Efrat and
Shashidhara K. Ganjugunte and
David Hay and
Swaminathan Sankararaman and
Gil Zussman The resilience of WDM networks to
probabilistic geographical failures . . 1525--1538
Bo Ji and
Changhee Joo and
Ness B. Shroff Delay-based back-pressure scheduling in
multihop wireless networks . . . . . . . 1539--1552
Albert Banchs and
Andres Garcia-Saavedra and
Pablo Serrano and
Joerg Widmer A game-theoretic approach to distributed
opportunistic scheduling . . . . . . . . 1553--1566
Myungjin Lee and
Nick Duffield and
Ramana Rao Kompella High-fidelity per-flow delay
measurements with reference latency
interpolation . . . . . . . . . . . . . 1567--1580
Rajasekhar Sappidi and
André Girard and
Catherine Rosenberg Maximum achievable throughput in a
wireless sensor network using in-network
computation for statistical functions 1581--1594
Ehsan Aryafar and
Mohammad Ali Khojastepour and
Karthik Sundaresan and
Sampath Rangarajan and
Edward Knightly ADAM: an adaptive beamforming system for
multicasting in wireless LANs . . . . . 1595--1608
Faryad Darabi Sahneh and
Caterina Scoglio and
Piet Van Mieghem Generalized epidemic mean-field model
for spreading processes over multilayer
complex networks . . . . . . . . . . . . 1609--1620
Kyunghan Lee and
Yoora Kim and
Song Chong and
Injong Rhee and
Yung Yi and
Ness B. Shroff On the critical delays of mobile
networks under Lévy walks and Lévy flights 1621--1635
Tae Hyun Kim and
Jian Ni and
R. Srikant and
Nitin H. Vaidya Throughput-optimal CSMA with imperfect
carrier sensing . . . . . . . . . . . . 1636--1650
Ramin Khalili and
Nicolas Gast and
Miroslav Popovic and
Jean-Yves Le Boudec MPTCP is not Pareto-optimal: performance
issues and a possible solution . . . . . 1651--1665
Ji-Yong Shin and
Emin Gn Sirer and
Hakim Weatherspoon and
Darko Kirovski On the feasibility of completely
wireless datacenters . . . . . . . . . . 1666--1679
Horia Vlad Balan and
Ryan Rogalin and
Antonios Michaloliakos and
Konstantinos Psounis and
Giuseppe Caire AirSync: enabling distributed multiuser
MIMO with full spatial multiplexing . . 1681--1695
Dongyue Xue and
Eylem Ekici Delay-guaranteed cross-layer scheduling
in multihop wireless networks . . . . . 1696--1707
Mehmet Karaca and
Karim Khalil and
Eylem Ekici and
Ozgur Ercetin Optimal scheduling and power allocation
in cooperate-to-join cognitive radio
networks . . . . . . . . . . . . . . . . 1708--1721
Liu Xiang and
Jun Luo and
Catherine Rosenberg Compressed data aggregation:
energy-efficient and high-fidelity data
collection . . . . . . . . . . . . . . . 1722--1735
Piotr H. Srebrny and
Thomas Plagemann and
Vera Goebel and
Andreas Mauthe No more Déj\`a Vu: eliminating redundancy
with cachecast: feasibility and
performance gains . . . . . . . . . . . 1736--1749
Enzo Baccarelli and
Nicola Cordeschi and
Valentina Polli Optimal self-adaptive QoS resource
management in interference-affected
multicast wireless networks . . . . . . 1750--1759
Derek Leonard and
Dmitri Loguinov Demystifying Internet-wide service
discovery . . . . . . . . . . . . . . . 1760--1773
Osameh M. Al-Kofahi and
Ahmed E. Kamal Scalable redundancy for sensors-to-sink
communication . . . . . . . . . . . . . 1774--1784
Carlee Joe-Wong and
Soumya Sen and
Tian Lan and
Mung Chiang Multiresource allocation:
fairness-efficiency tradeoffs in a
unifying framework . . . . . . . . . . . 1785--1798
Zhijun Li and
Guang Gong On the node clone detection in wireless
sensor networks . . . . . . . . . . . . 1799--1811
Chandramani Singh and
Eitan Altman and
Anurag Kumar and
Rajesh Sundaresan Optimal forwarding in delay-tolerant
networks with multiple destinations . . 1812--1826
Ming Ouyang and
Lei Ying Approaching throughput optimality with
limited feedback in multichannel
wireless downlink networks . . . . . . . 1827--1838
Masaki Fukushima and
Kohei Sugiyama and
Teruyuki Hasegawa and
Toru Hasegawa and
Akihiro Nakao Minimum disclosure routing for network
virtualization and its experimental
evaluation . . . . . . . . . . . . . . . 1839--1851
Nikolaos Laoutaris and
Georgios Smaragdakis and
Rade Stanojevic and
Pablo Rodriguez and
Ravi Sundaram Delay-tolerant bulk data transfers on
the Internet . . . . . . . . . . . . . . 1852--1865
Richard T. B. Ma and
Vishal Misra The public option: a nonregulatory
alternative to network neutrality . . . 1866--1879
Yin Wang and
Yuan He and
Xufei Mao and
Yunhao Liu and
Xiang-Yang Li Exploiting constructive interference for
scalable flooding in wireless networks 1880--1889
Joan Triay and
Cristina Cervelló-Pastor and
Vinod M. Vokkarane Analytical blocking probability model
for hybrid immediate and advance
reservations in optical WDM networks . . 1890--1903
Huasen Wu and
Chenxi Zhu and
Richard J. La and
Xin Liu and
Youguang Zhang FASA: accelerated S-ALOHA using access
history for event-driven M2M
communications . . . . . . . . . . . . . 1904--1917
William Wei-Liang Li and
Yuan Shen and
Ying Jun Zhang and
Moe Z. Win Robust power allocation for
energy-efficient location-aware networks 1918--1930
Tilman Wolf and
Sriram Natarajan and
Kamlesh T. Vasudevan High-performance capabilities for
$1$-hop containment of network attacks 1931--1946
Dejun Yang and
Guoliang Xue and
Xi Fang and
Satyajayant Misra and
Jin Zhang A game-theoretic approach to stable
routing in max-min fair networks . . . . 1947--1959
M. Zubair Shafiq and
Lusheng Ji and
Alex X. Liu and
Jeffrey Pang and
Jia Wang Large-scale measurement and
characterization of cellular
machine-to-machine traffic . . . . . . . 1960--1973
Tao Li and
Shigang Chen and
Yibei Ling Efficient protocols for identifying the
missing tags in a large RFID system . . 1974--1987
Guanhong Pei and
Srinivasan Parthasarathy and
Aravind Srinivasan and
Anil Kumar S. Vullikanti Approximation algorithms for throughput
maximization in wireless networks with
delay constraints . . . . . . . . . . . 1988--2000
S. Shunmuga Krishnan and
Ramesh K. Sitaraman Video stream quality impacts viewer
behavior: inferring causality using
quasi-experimental designs . . . . . . . 2001--2014
Shan-Hung Wu and
Ming-Syan Chen and
Chung-Min Chen Optimally Adaptive Power-Saving
Protocols for Ad Hoc Networks Using the
Hyper Quorum System . . . . . . . . . . 1--15
Junbeom Hur and
Kyungtae Kang Secure Data Retrieval for Decentralized
Disruption-Tolerant Military Networks 16--26
Jian Tan and
Swapna and
Shroff Retransmission Delays With Bounded
Packets: Power-Law Body and Exponential
Tail . . . . . . . . . . . . . . . . . . 27--38
Eyal Zohar and
Israel Cidon and
Osnat Mokryn PACK: Prediction-Based Cloud Bandwidth
and Cost Reduction System . . . . . . . 39--51
Yan Cai and
Xiaolin Wang and
Weibo Gong and
Don Towsley A Study on the Performance of a
Three-Stage Load-Balancing Switch . . . 52--65
Jinbei Zhang and
Luoyi Fu and
Xinbing Wang Asymptotic Analysis on Secrecy Capacity
in Large-Scale Wireless Networks . . . . 66--79
Md. Forkan Uddin and
Catherine Rosenberg and
Weihua Zhuang and
Patrick Mitran and
Andre Girard Joint Routing and Medium Access Control
in Fixed Random Access Wireless Multihop
Networks . . . . . . . . . . . . . . . . 80--93
Chad R. Meiners and
Jignesh Patel and
Eric Norige and
Alex X. Liu and
Eric Torng Fast Regular Expression Matching Using
Small TCAM . . . . . . . . . . . . . . . 94--109
Raffaele Bolla and
Roberto Bruschi and
Alessandro Carrega and
Franco Davoli Green Networking With Packet Processing
Engines: Modeling and Optimization . . . 110--123
Wei Ren and
Qing Zhao and
Ananthram Swami Temporal Traffic Dynamics Improve the
Connectivity of Ad Hoc Cognitive Radio
Networks . . . . . . . . . . . . . . . . 124--136
Supratim Deb and
Pantelis Monogioudis and
Jerzy Miernik and
James P. Seymour Algorithms for Enhanced Inter-Cell
Interference Coordination (eICIC) in LTE
HetNets . . . . . . . . . . . . . . . . 137--150
Srikanth Hariharan and
Ness B. Shroff On Sample-Path Optimal Dynamic
Scheduling for Sum-Queue Minimization in
Forests . . . . . . . . . . . . . . . . 151--164
Marcin Bienkowski and
Anja Feldmann and
Johannes Grassler and
Gregor Schaffrath and
Stefan Schmid The Wide-Area Virtual Service Migration
Problem: a Competitive Analysis Approach 165--178
Onur Turkcu and
Suresh Subramaniam Optimal Wavebanding in WDM Ring Networks 179--190
Wei Li and
Shengling Wang and
Yong Cui and
Xiuzhen Cheng and
Ran Xin and
Mznah A. Al-Rodhaan and
Abdullah Al-Dhelaan AP Association for Proportional Fairness
in Multirate WLANs . . . . . . . . . . . 191--202
Leonardo Goratti and
Ece Yaprak and
Stefano Savazzi and
Carlos Pomalaza-Raez An Urn Occupancy Approach for Modeling
the Energy Consumption of Distributed
Beaconing . . . . . . . . . . . . . . . 203--216
Vinod Ramaswamy and
Vinith Reddy and
Srinivas Shakkottai and
Alex Sprintson and
Natarajan Gautam Multipath Wireless Network Coding: an
Augmented Potential Game Perspective . . 217--229
Christian Esposito and
Marco Platania and
Roberto Beraldi Reliable and Timely Event Notification
for Publish/Subscribe Services Over the
Internet . . . . . . . . . . . . . . . . 230--243
Nazanin Magharei and
Reza Rejaie and
Ivica Rimac and
Volker Hilt and
Markus Hofmann ISP-Friendly Live P2P Streaming . . . . 244--256
Mihalis G. Markakis and
Eytan Modiano and
John N. Tsitsiklis Max-Weight Scheduling in Queueing
Networks With Heavy-Tailed Traffic . . . 257--270
Eric Anderson and
Caleb Phillips and
Douglas Sicker and
Dirk Grunwald Optimization Decomposition for
Scheduling and System Configuration in
Wireless Networks . . . . . . . . . . . 271--284
Shurui Huang and
Aditya Ramamoorthy On the Multiple-Unicast Capacity of
$3$-Source, $3$-Terminal Directed
Acyclic Networks . . . . . . . . . . . . 285--299
Francois Clad and
Pascal Merindol and
Jean-Jacques Pansiot and
Pierre Francois and
Olivier Bonaventure Graceful Convergence in Link-State IP
Networks: a Lightweight Algorithm
Ensuring Minimal Operational Impact . . 300--312
Bernardetta Addis and
Antonio Capone and
Giuliana Carello and
Luca G. Gianoli and
Brunilde Sanso Energy Management Through Optimized
Routing and Device Powering for Greener
Communication Networks . . . . . . . . . 313--325
Junchen Jiang and
Vyas Sekar and
Hui Zhang Improving Fairness, Efficiency, and
Stability in HTTP-Based Adaptive Video
Streaming With Festive . . . . . . . . . 326--340
Andrés Ferragut and
Fernando Paganini Network resource allocation for users
with multiple connections: fairness and
stability . . . . . . . . . . . . . . . 349--362
Rafael Laufer and
Theodoros Salonidis and
Henrik Lundgren and
Pascal Le Guyadec A cross-layer backpressure architecture
for wireless multihop networks . . . . . 363--376
Faisal Khan and
Nicholas Hosein and
Soheil Ghiasi and
Chen-Nee Chuah and
Puneet Sharma Streaming solutions for fine-grained
network traffic measurements and
analysis . . . . . . . . . . . . . . . . 377--390
Nejc Skoberne and
Olaf Maennel and
Iain Phillips and
Randy Bush and
Jan Zorz and
Mojca Ciglaric IPv4 address sharing mechanism
classification and tradeoff analysis . . 391--404
Amir Nahir and
Ariel Orda and
Ari Freund Topology design of communication
networks: a game-theoretic perspective 405--414
Anat Bremler-Barr and
David Hay and
Yaron Koral CompactDFA: Scalable pattern matching
using longest prefix match solutions . . 415--428
Mohit Chamania and
Admela Jukan A comparative analysis of the effects of
dynamic optical circuit provisioning on
IP routing . . . . . . . . . . . . . . . 429--442
Hyesook Lim and
Nara Lee and
Geumdan Jin and
Jungwon Lee and
Youngju Choi and
Changhoon Yim Boundary cutting for packet
classification . . . . . . . . . . . . . 443--456
Vinod Ramaswamy and
Diganto Choudhury and
Srinivas Shakkottai Which protocol? Mutual interaction of
heterogeneous congestion controllers . . 457--469
Guoliang Xue and
Ravi Gottapu and
Xi Fang and
Dejun Yang and
Krishnaiyan Thulasiraman A polynomial-time algorithm for
computing disjoint lightpath pairs in
minimum isolated-failure-immune WDM
optical networks . . . . . . . . . . . . 470--483
Ralf Lübben and
Markus Fidler and
Jörg Liebeherr Stochastic bandwidth estimation in
networks with random service . . . . . . 484--497
Kai Chen and
Ankit Singla and
Atul Singh and
Kishore Ramachandran and
Lei Xu and
Yueping Zhang and
Xitao Wen and
Yan Chen OSA: an optical switching architecture
for data center networks with
unprecedented flexibility . . . . . . . 498--511
Vojislav Gaji\'c and
Jianwei Huang and
Bixio Rimoldi Competition of wireless providers for
atomic users . . . . . . . . . . . . . . 512--525
Luca De Cicco and
Saverio Mascolo An adaptive video streaming control
system: modeling, validation, and
performance evaluation . . . . . . . . . 526--539
Franck Le and
João Luís Sobrinho Interconnecting routing instances . . . 540--553
Hongyi Zeng and
Peyman Kazemian and
George Varghese and
Nick McKeown Automatic test packet generation . . . . 554--566
Feng Li and
Chi Zhang and
Jun Luo and
Shi-Qing Xin and
Ying He LBDP: localized boundary detection and
parametrization for $3$-D sensor
networks . . . . . . . . . . . . . . . . 567--579
Veeraruna Kavitha and
Eitan Altman and
R. El-Azouzi and
Rajesh Sundaresan Fair scheduling in cellular systems in
the presence of noncooperative mobiles 580--594
Elliot Anshelevich and
Bugra Caskurlu and
Koushik Kar and
Hang Zhang Capacity allocation games for
network-coded multicast streaming . . . 595--607
Qingjun Xiao and
Bin Xiao and
Kai Bu and
Jiannong Cao Iterative localization of wireless
sensor networks: an accurate and robust
approach . . . . . . . . . . . . . . . . 608--621
Yixuan Li and
Qiuyu Peng and
Xinbing Wang Multicast capacity with max-min fairness
for heterogeneous networks . . . . . . . 622--635
Rami Cohen and
Danny Raz Cost-effective resource allocation of
overlay routing relay nodes . . . . . . 636--646
Patrick Loiseau and
Galina Schwartz and
John Musacchio and
Saurabh Amin and
S. Shankar Sastry Incentive mechanisms for Internet
congestion management: fixed-budget
rebate versus time-of-day pricing . . . 647--661
Changhee Joo and
Ness B. Shroff On the delay performance of in-network
aggregation in lossy wireless sensor
networks . . . . . . . . . . . . . . . . 662--673
Sem C. Borst and
Mihalis G. Markakis and
Iraj Saniee Nonconcave utility maximization in
locally coupled systems, with
applications to wireless and wireline
networks . . . . . . . . . . . . . . . . 674--687
Mukundan Venkataraman and
Mainak Chatterjee Effects of Internet path selection on
video-QoE: analysis and improvements . . 689--702
Shuqin Li and
Jianwei Huang Price differentiation for communication
networks . . . . . . . . . . . . . . . . 703--716
Shaoquan Zhang and
Ziyu Shao and
Minghua Chen and
Libin Jiang Optimal distributed P2P streaming under
node degree bounds . . . . . . . . . . . 717--730
Jeong-Woo Cho and
Yung Yi On the payoff mechanisms in
peer-assisted services with multiple
content providers: rationality and
fairness . . . . . . . . . . . . . . . . 731--744
Olga Goussevskaia and
Magnús M. Halldórsson and
Roger Wattenhofer Algorithms for wireless capacity . . . . 745--755
Karthikeyan Sundaresan and
Sampath Rangarajan Cooperation versus multiplexing:
multicast scheduling algorithms for
OFDMA relay networks . . . . . . . . . . 756--769
Hisham M. Almasaeid and
Ahmed E. Kamal Exploiting multichannel diversity for
cooperative multicast in cognitive radio
mesh networks . . . . . . . . . . . . . 770--783
Dulanjalie C. Dhanapala and
Anura P. Jayasumana Topology preserving maps: extracting
layout maps of wireless sensor networks
from virtual coordinates . . . . . . . . 784--797
Jeff Seibert and
Sheila Becker and
Cristina Nita-Rotaru and
Radu State Newton: securing virtual coordinates by
enforcing physical laws . . . . . . . . 798--811
Ning Lu and
Tom H. Luan and
Miao Wang and
Xuemin Shen and
Fan Bai Bounds of asymptotic performance limits
of social-proximity vehicular networks 812--825
Yang Xu and
Chenguang Yu and
Jingjiang Li and
Yong Liu Video telephony for end-consumers:
measurement study of Google+, iChat and
Skype . . . . . . . . . . . . . . . . . 826--839
Chaitanya S. K. Vadrevu and
Rui Wang and
Massimo Tornatore and
Charles U. Martel and
Biswanath Mukherjee Degraded service provisioning in
mixed-line-rate WDM backbone networks
using multipath routing . . . . . . . . 840--849
Ahmad R. Dhaini and
Pin-Han Ho and
Gangxiang Shen and
Basem Shihada Energy efficiency in TDMA-based
next-generation passive optical access
networks . . . . . . . . . . . . . . . . 850--863
Navid Abedini and
Srinivas Shakkottai Content caching and scheduling in
wireless networks with elastic and
inelastic traffic . . . . . . . . . . . 864--874
Addisu Tadesse Eshete and
Yuming Jiang On the transient behavior of CHOKe . . . 875--888
Yifan Zhang and
Gexin Yu and
Qun Li and
Haodong Wang and
Xiaojun Zhu and
Baosheng Wang Channel-hopping-based communication
rendezvous in cognitive radio networks 889--902
Hui Lin and
Halit Üster Exact and heuristic algorithms for
data-gathering cluster-based wireless
sensor network design problem . . . . . 903--916
Georgios Smaragdakis and
Nikolaos Laoutaris and
Konstantinos Oikonomou and
Ioannis Stavrakakis and
Azer Bestavros Distributed server migration for
scalable Internet service deployment . . 917--930
Kuai Xu and
Feng Wang and
Lin Gu Behavior analysis of Internet traffic
via bipartite graphs and one-mode
projections . . . . . . . . . . . . . . 931--942
Michael Butkiewicz and
Harsha V. Madhyastha and
Vyas Sekar Characterizing Web page complexity and
its impact . . . . . . . . . . . . . . . 943--956
Layong Luo and
Gaogang Xie and
Yingke Xie and
Laurent Mathy and
Kavé Salamatian A hybrid hardware architecture for
high-speed IP lookups and fast route
updates . . . . . . . . . . . . . . . . 957--969
Chengchen Hu and
Bin Liu and
Hongbo Zhao and
Kai Chen and
Yan Chen and
Yu Cheng and
Hao Wu Discount counting for fast flow
statistics on flow size and flow volume 970--981
Yang Xu and
Zhaobo Liu and
Zhuoyuan Zhang and
H. Jonathan Chao High-throughput and memory-efficient
multimatch packet classification based
on distributed and pipelined hash tables 982--995
Wouter Minnebo and
Benny Van Houdt A fair comparison of pull and push
strategies in large distributed networks 996--1006
Paul T. Congdon and
Prasant Mohapatra and
Matthew Farrens and
Venkatesh Akella Simultaneously reducing latency and
power consumption in OpenFlow switches 1007--1020
Ítalo Cunha and
Renata Teixeira and
Darryl Veitch and
Christophe Diot DTRACK: a system to predict and track
Internet path changes . . . . . . . . . 1025--1038
Andrés Altieri and
Leonardo Rey Vega and
Pablo Piantanida and
Cecilia G. Galarza Analysis of a cooperative strategy for a
large decentralized wireless network . . 1039--1051
Hyang-Won Lee and
Kayi Lee and
Eytan Modiano Maximizing reliability in WDM networks
through lightpath routing . . . . . . . 1052--1066
János Tapolcai and
Pin-Han Ho and
Péter Babarczi and
Lajos Rónyai On signaling-free failure dependent
restoration in all-optical mesh networks 1067--1078
Wen Luo and
Shigang Chen and
Yan Qiao and
Tao Li Missing-tag detection and energy-time
tradeoff in large-scale RFID systems
with unreliable channels . . . . . . . . 1079--1091
Ori Rottenstreich and
Yossi Kanizo and
Isaac Keslassy The variable-increment counting Bloom
filter . . . . . . . . . . . . . . . . . 1092--1105
Yishuai Chen and
Baoxian Zhang and
Changjia Chen and
Dah Ming Chiu Performance modeling and evaluation of
peer-to-peer live streaming systems
under flash crowds . . . . . . . . . . . 1106--1120
Hamed Mohsenian-Rad and
Jianwei Huang and
Vincent W. S. Wong and
Robert Schober Repeated intersession network coding
games: efficiency and min-max bargaining
solution . . . . . . . . . . . . . . . . 1121--1135
Myungjin Lee and
Sharon Goldberg and
Ramana Rao Kompella and
George Varghese FineComb: measuring microscopic latency
and loss in the presence of reordering 1136--1149
Shizhen Zhao and
Xinbing Wang Node density and delay in large-scale
wireless networks with unreliable links 1150--1163
Hao Yue and
Chi Zhang and
Miao Pan and
Yuguang Fang and
Shigang Chen Unknown-target information collection in
sensor-enabled RFID systems . . . . . . 1164--1175
Frank Aurzada and
Martin Lévesque and
Martin Maier and
Martin Reisslein FiWi access networks based on
next-generation PON and gigabit-class
WLAN technologies: a capacity and delay
analysis . . . . . . . . . . . . . . . . 1176--1189
Shang-Pin Sheng and
Mingyan Liu Profit incentive in trading nonexclusive
access on a secondary spectrum market
through contract design . . . . . . . . 1190--1203
Jin-Ghoo Choi and
Changhee Joo and
Junshan Zhang and
Ness B. Shroff Distributed link scheduling under SINR
model in multihop wireless networks . . 1204--1217
Xin Zhang and
Fanfu Zhou and
Xinyu Zhu and
Haiyang Sun and
Adrian Perrig and
Athanasios V. Vasilakos and
Haibing Guan DFL: secure and practical fault
localization for datacenter networks . . 1218--1231
Amir Houmansadr and
Negar Kiyavash and
Nikita Borisov Non-blind watermarking of network flows 1232--1244
Shuang Li and
Zizhan Zheng and
Eylem Ekici and
Ness Shroff Maximizing system throughput by
cooperative sensing in cognitive radio
networks . . . . . . . . . . . . . . . . 1245--1256
Zvi Rosberg and
Yu Peng and
Jing Fu and
Jun Guo and
Eric W. M. Wong and
Moshe Zukerman Insensitive job assignment with
throughput and energy criteria for
processor-sharing server farms . . . . . 1257--1270
Wei Dong and
Swati Rallapalli and
Rittwik Jana and
Lili Qiu and
K. K. Ramakrishnan and
Leo Razoumov and
Yin Zhang and
Tae Won Cho iDEAL: incentivized dynamic cellular
offloading via auctions . . . . . . . . 1271--1284
Jin Teng and
Boying Zhang and
Junda Zhu and
Xinfeng Li and
Dong Xuan and
Yuan F. Zheng EV-Loc: integrating electronic and
visual signals for accurate localization 1285--1296
Hulya Seferoglu and
Athina Markopoulou Network coding-aware queue management
for TCP flows over coded wireless
networks . . . . . . . . . . . . . . . . 1297--1310
Peng Yang and
Juan Shao and
Wen Luo and
Lisong Xu and
Jitender Deogun and
Ying Lu TCP congestion avoidance algorithm
identification . . . . . . . . . . . . . 1311--1324
Shengbo Chen and
Prasun Sinha and
Ness B. Shroff and
Changhee Joo A simple asymptotically optimal joint
energy allocation and routing scheme in
rechargeable sensor networks . . . . . . 1325--1336
Yuan Shen and
Wenhan Dai and
Moe Z. Win Power optimization for network
localization . . . . . . . . . . . . . . 1337--1350
Liang Ma and
Ting He and
Kin K. Leung and
Ananthram Swami and
Don Towsley Inferring link metrics from end-to-end
path measurements: identifiability and
monitor placement . . . . . . . . . . . 1351--1368
Abishek Gopalan and
Srinivasan Ramasubramanian On the maximum number of linearly
independent cycles and paths in a
network . . . . . . . . . . . . . . . . 1373--1388
Bo Han and
Jian Li and
Aravind Srinivasan Your friends have more friends than you
do: identifying influential mobile users
through random-walk sampling . . . . . . 1389--1400
Chao-Chih Chen and
Lihua Yuan and
Albert Greenberg and
Chen-Nee Chuah and
Prasant Mohapatra Routing-as-a-service (RaaS): a framework
for tenant-directed route control in
data center . . . . . . . . . . . . . . 1401--1414
Ignacio Castro and
Rade Stanojevic and
Sergey Gorinsky Using tuangou to reduce IP transit costs 1415--1428
P. M. Van De Ven and
Augustus J. E. M. Janssen and
J. S. H. Van Leeuwaarden Balancing exposed and hidden nodes in
linear wireless networks . . . . . . . . 1429--1443
Hasti Ahlehagh and
Sujit Dey Video-aware scheduling and caching in
the radio access network . . . . . . . . 1444--1462
Markku Antikainen and
Tuomas Aura and
Mikko Särelä Denial-of-service attacks in
Bloom-filter-based forwarding . . . . . 1463--1476
Shihuan Liu and
Eylem Ekici and
Lei Ying Scheduling in multihop wireless networks
without back-pressure . . . . . . . . . 1477--1488
Jin Xiao and
Raouf Boutaba Reconciling the overlay and underlay
tussle . . . . . . . . . . . . . . . . . 1489--1502
Dan Li and
Hongze Zhao and
Mingwei Xu and
Xiaoming Fu Revisiting the design of mega data
centers: considering heterogeneity among
containers . . . . . . . . . . . . . . . 1503--1515
Vinod Muthusamy and
Hans-Arno Jacobsen Infrastructure-free content-based
publish/subscribe . . . . . . . . . . . 1516--1530
Jongwon Yoon and
Honghai Zhang and
Suman Banerjee and
Sampath Rangarajan Video multicast with joint resource
allocation and adaptive modulation and
coding in 4G networks . . . . . . . . . 1531--1544
Kang Chen and
Haiying Shen SMART: utilizing distributed social map
for lightweight routing in
delay-tolerant networks . . . . . . . . 1545--1558
Van Minh Nguyen and
Chung Shue Chen and
Laurent Thomas A unified stochastic model of handover
measurement in mobile networks . . . . . 1559--1576
Stepan Kucera Enabling co-channel small-cell
deployments in SINR-constraint networks
by distributed monitoring of normalized
network capacity . . . . . . . . . . . . 1577--1590
Chris Develder and
Jens Buysse and
Bart Dhoedt and
Brigitte Jaumard Joint dimensioning of server and network
infrastructure for resilient optical
grids/clouds . . . . . . . . . . . . . . 1591--1606
Sen Su and
Zhongbao Zhang and
Alex X. Liu and
Xiang Cheng and
Yiwen Wang and
Xinchao Zhao Energy-aware virtual network embedding 1607--1620
Rahul Vaze and
Rachit Garg and
Neetish Pathak Dynamic power allocation for maximizing
throughput in energy-harvesting
communication system . . . . . . . . . . 1621--1630
I-Hong Hou Scheduling heterogeneous real-time
traffic over fading wireless channels 1631--1644
Claudio Cicconetti and
Luciano Lenzini and
Andrea Lodi and
Silvano Martello and
Enzo Mingozzi and
Michele Monaci Efficient two-dimensional data
allocation in IEEE 802.16 OFDMA . . . . 1645--1658
Lei Zhang and
Dongning Guo Virtual full duplex wireless
broadcasting via compressed sensing . . 1659--1671
Hao Han and
Yunxin Liu and
Guobin Shen and
Yongguang Zhang and
Qun Li and
Chiu C. Tan Design, realization, and evaluation of
DozyAP for power-efficient Wi-Fi
tethering . . . . . . . . . . . . . . . 1672--1685
Soroush Jahromizadeh and
Veselin Rakocevic Joint rate control and scheduling for
providing bounded delay with high
efficiency in multihop wireless networks 1686--1698
Jignesh Patel and
Alex X. Liu and
Eric Torng Bypassing space explosion in high-speed
regular expression matching . . . . . . 1701--1714
Amy Fu and
Parastoo Sadeghi and
Muriel Médard Dynamic rate adaptation for improved
throughput and delay in wireless network
coded broadcast . . . . . . . . . . . . 1715--1728
Cristiano Tapparello and
Osvaldo Simeone and
Michele Rossi Dynamic compression-transmission for
energy-harvesting multihop networks with
correlated sources . . . . . . . . . . . 1729--1741
Masoud Akhoondi and
Curtis Yu and
Harsha V. Madhyastha LASTor: a low-latency AS-aware Tor
client . . . . . . . . . . . . . . . . . 1742--1755
Sastry Kompella and
Gam D. Nguyen and
Clement Kam and
Jeffrey E. Wieselthier and
Anthony Ephremides Cooperation in cognitive underlay
networks: stable throughput tradeoffs 1756--1768
Chiara Orsini and
Enrico Gregori and
Luciano Lenzini and
Dmitri Krioukov Evolution of the Internet $k$-dense
structure . . . . . . . . . . . . . . . 1769--1780
Shannon Chen and
Cing-Yu Chu and
Su-Ling Yeh and
Hao-Hua Chu and
Polly Huang Modeling the QoE of rate changes in
Skype/SILK VoIP calls . . . . . . . . . 1781--1793
Kostas Stamatiou and
Martin Haenggi Delay characterization of multihop
transmission in a Poisson field of
interference . . . . . . . . . . . . . . 1794--1807
Somayeh Sojoudi and
Steven H. Low and
John C. Doyle Buffering dynamics and stability of
Internet congestion controllers . . . . 1808--1818
I-Hong Hou and
Piyush Gupta Proportionally fair distributed resource
allocation in multiband wireless systems 1819--1830
Douglas M. Blough and
Paolo Santi and
Ramya Srinivasan On the feasibility of unilateral
interference cancellation in MIMO
networks . . . . . . . . . . . . . . . . 1831--1844
Eugenio Magistretti and
Omer Gurewitz and
Edward W. Knightly 802.11ec: collision avoidance without
control messages . . . . . . . . . . . . 1845--1858
Sungsu Lim and
Kyomin Jung and
Matthew Andrews Stability of the max-weight protocol in
adversarial wireless networks . . . . . 1859--1872
Mahmoud Al-Ayyoub and
Himanshu Gupta Truthful spectrum auctions with
approximate social-welfare or revenue 1873--1885
Yuanqing Zheng and
Mo Li Towards more efficient cardinality
estimation for large-scale RFID systems 1886--1896
Changbin Liu and
Ricardo Correa and
Harjot Gill and
Tanveer Gill and
Xiaozhou Li and
Shivkumar Muthukumar and
Taher Saeed and
Boon Thau Loo and
Prithwish Basu PUMA: policy-based unified multiradio
architecture for agile mesh networking 1897--1910
Bo Ji and
Gagan R. Gupta and
Xiaojun Lin and
Ness B. Shroff Low-complexity scheduling policies for
achieving throughput and asymptotic
delay optimality in multichannel
wireless networks . . . . . . . . . . . 1911--1924
Qi Li and
Mingwei Xu and
Yuan Yang and
Lixin Gao and
Yong Cui and
Jianping Wu Safe and practical energy-efficient
detour routing in IP networks . . . . . 1925--1937
Siva Theja Maguluri and
R. Srikant Scheduling jobs with unknown duration in
clouds . . . . . . . . . . . . . . . . . 1938--1951
Wei Dong and
Yunhao Liu and
Yuan He and
Tong Zhu and
Chun Chen Measurement and analysis on the packet
delivery performance in a large-scale
sensor network . . . . . . . . . . . . . 1952--1963
Alberto Dainotti and
Claudio Squarcella and
Emile Aben and
Kimberly C. Claffy and
Marco Chiesa and
Michele Russo and
Antonio Pescapé Analysis of country-wide Internet
outages caused by censorship . . . . . . 1964--1977
Hongyi Yao and
Danilo Silva and
Sidharth Jaggi and
Michael Langberg Network codes resilient to jamming and
eavesdropping . . . . . . . . . . . . . 1978--1987
Shaxun Chen and
Kai Zeng and
Prasant Mohapatra Efficient data capturing for network
forensics in cognitive radio networks 1988--2000
Thang N. Dinh and
Huiyuan Zhang and
Dzung T. Nguyen and
My T. Thai Cost-effective viral marketing for
time-critical campaigns in large-scale
social networks . . . . . . . . . . . . 2001--2011
Guanfeng Liang and
Ulas C. Kozat Fast cloud: pushing the envelope on
delay performance of cloud storage with
coding . . . . . . . . . . . . . . . . . 2012--2025
Maximilian Kriegleder A correction to algorithm A2 in
``Asynchronous distributed averaging on
communication networks'' . . . . . . . . 2026--2027
Wanchun Jiang and
Fengyuan Ren and
Chuang Lin Phase plane analysis of quantized
congestion notification for data center
Ethernet . . . . . . . . . . . . . . . . 1--14
Hongbo Jiang and
Tianlong Yu and
Chen Tian and
Guang Tan and
Chonggang Wang Connectivity-based segmentation in
large-scale $2$-D/$3$-D sensor networks:
algorithm and applications . . . . . . . 15--27
Cataldo Basile and
Antonio Lioy Analysis of application-layer filtering
policies with application to HTTP . . . 28--41
Marco Leogrande and
Fulvio Risso and
Luigi Ciminiera Modeling complex packet filters with
finite state automata . . . . . . . . . 42--55
Alberto Rabbachin and
Andrea Conti and
Moe Z. Win Wireless network intrinsic secrecy . . . 56--69
Haiying Shen and
Ze Li A hierarchical account-aided reputation
management system for MANETs . . . . . . 70--84
Richard T. B. Ma and
John C. S. Lui and
Vishal Misra Evolution of the Internet economic
ecosystem . . . . . . . . . . . . . . . 85--98
Güner D. Çelik and
Eytan Modiano Scheduling in networks with time-varying
channels and reconfiguration delay . . . 99--113
Reuven Cohen and
Guy Grebla Joint scheduling and fast cell selection
in OFDMA wireless networks . . . . . . . 114--125
Yang Yang and
Ness B. Shroff Throughput of rateless codes over
broadcast erasure channels . . . . . . . 126--137
Gabi Nakibly and
Reuven Cohen and
Liran Katzir Optimizing data plane resources for
multipath flows . . . . . . . . . . . . 138--147
Alessandro Checco and
Douglas J. Leith Fair virtualization of 802.11 networks 148--160
Fabio Martignon and
Stefano Paris and
Ilario Filippini and
Lin Chen and
Antonio Capone Efficient and truthful bandwidth
allocation in wireless mesh community
networks . . . . . . . . . . . . . . . . 161--174
Bahar Partov and
Douglas J. Leith and
Rouzbeh Razavi Utility fair optimization of antenna
tilt angles in LTE networks . . . . . . 175--185
Jiliang Wang and
Wei Dong and
Zhichao Cao and
Yunhao Liu On the delay performance in a
large-scale wireless sensor network:
measurement, analysis, and implications 186--197
Fragkiskos Papadopoulos and
Constantinos Psomas and
Dmitri Krioukov Network mapping by replaying hyperbolic
growth . . . . . . . . . . . . . . . . . 198--211
Kang Chen and
Haiying Shen DTN-FLOW: inter-landmark data flow for
high-throughput routing in DTNs . . . . 212--226
Stefano Vissicchio and
Luca Cittadini and
Giuseppe Di Battista On iBGP routing policies . . . . . . . . 227--240
Muhammad Shahzad and
Alex X. Liu Fast and accurate estimation of RFID
tags . . . . . . . . . . . . . . . . . . 241--254
Yuan-Cheng Lai and
Ling-Yen Hsiao and
Bor-Shen Lin Optimal slot assignment for binary
tracking tree protocol in RFID tag
identification . . . . . . . . . . . . . 255--268
Karumbu Premkumar and
Xiaomin Chen and
Douglas J. Leith Proportional fair coding for wireless
mesh networks . . . . . . . . . . . . . 269--281
P. Brighten Godfrey and
Matthew Caesar and
Ian Haken and
Yaron Singer and
Scott Shenker and
Ion Stoica Stabilizing route selection in BGP . . . 282--299
Xinghua Sun and
Lin Dai Backoff design for IEEE 802.11 DCF
networks: fundamental tradeoff and
design criterion . . . . . . . . . . . . 300--316
Didem Gözüpek and
Mordechai Shalom and
Fatih Alagöz A graph-theoretic approach to scheduling
in cognitive radio networks . . . . . . 317--328
Alberto Dainotti and
Alistair King and
Kimberly Claffy and
Ferdinando Papale and
Antonio Pescapé Analysis of a ``/0'' stealth scan from a
botnet . . . . . . . . . . . . . . . . . 341--354
Carlee Joe-Wong and
Soumya Sen and
Sangtae Ha Offering supplementary network
technologies: adoption behavior and
offloading benefits . . . . . . . . . . 355--368
Lieven Tytgat and
Opher Yaron and
Sofie Pollin and
Ingrid Moerman and
Piet Demeester Analysis and experimental verification
of frequency-based interference
avoidance mechanisms in IEEE 802.15.4 369--382
Mukundan Madhavan and
Harish Ganapathy and
Malolan Chetlur and
Shivkumar Kalyanaraman Adapting cellular networks to
whitespaces spectrum . . . . . . . . . . 383--397
Supratim Deb and
Pantelis Monogioudis Learning-based uplink interference
management in $4$G LTE cellular systems 398--411
George Papageorgiou and
Shailendra Singh and
Srikanth V. Krishnamurthy and
Ramesh Govindan and
Tom La Porta A distortion-resistant routing framework
for video traffic in wireless multihop
networks . . . . . . . . . . . . . . . . 412--425
Reuven Cohen and
Guy Grebla Efficient allocation of periodic
feedback channels in broadband wireless
networks . . . . . . . . . . . . . . . . 426--436
Liguang Xie and
Yi Shi and
Y. Thomas Hou and
Wenjing Lou and
Hanif D. Sherali and
Scott F. Midkiff Multi-node wireless energy charging in
sensor networks . . . . . . . . . . . . 437--450
Chih-Chuan Cheng and
Pi-Cheng Hsiu Extend your journey: considering signal
strength and fluctuation in
location-based applications . . . . . . 451--464
Yong Cui and
Lian Wang and
Xin Wang and
Hongyi Wang and
Yining Wang FMTCP: a fountain code-based multipath
transmission control protocol . . . . . 465--478
Sanaz Barghi and
Hamid Jafarkhani Exploiting asynchronous
amplify-and-forward relays to enhance
the performance of IEEE 802.11 networks 479--490
Tong Ye and
Tony T. Lee and
Weisheng Hu AWG-based non-blocking Clos networks . . 491--504
Po-Kai Huang and
Xiaojun Lin Achieving optimal throughput utility and
low delay with CSMA-like algorithms: a
virtual multichannel approach . . . . . 505--518
Dongyue Xue and
Robert Murawski and
Eylem Ekici Capacity achieving distributed
scheduling with finite buffers . . . . . 519--532
Tung-Wei Kuo and
Kate Ching-Ju Lin and
Ming-Jer Tsai Maximizing submodular set function with
connectivity constraint: theory and
application to networks . . . . . . . . 533--546
Lorenzo Rossi and
Jacob Chakareski and
Pascal Frossard and
Stefania Colonnese A Poisson hidden Markov model for
multiview video traffic . . . . . . . . 547--558
Armin Banaei and
Daren B. H. Cline and
Costas N. Georghiades and
Shuguang Cui On asymptotic statistics for geometric
routing schemes in wireless ad hoc
networks . . . . . . . . . . . . . . . . 559--573
Sucha Supittayapornpong and
Michael J. Neely Quality of information maximization for
wireless networks via a fully separable
quadratic policy . . . . . . . . . . . . 574--586
Andreea Picu and
Thrasyvoulos Spyropoulos DTN-meteo: forecasting the performance
of DTN protocols under heterogeneous
mobility . . . . . . . . . . . . . . . . 587--602
Zhenyu Wu and
Zhang Xu and
Haining Wang Whispers in the hyper-space:
high-bandwidth and reliable covert
channel attacks inside the cloud . . . . 603--614
Chih-Ping Li and
Eytan Modiano Receiver-based flow control for networks
in overload . . . . . . . . . . . . . . 616--630
Bin Li and
Ruogu Li and
Atilla Eryilmaz On the optimal convergence speed of
wireless scheduling for fair resource
allocation . . . . . . . . . . . . . . . 631--643
Qiang Liu and
Xin Wang and
Nageswara S. V. Rao Fusion of state estimates over long-haul
sensor networks with random loss and
delay . . . . . . . . . . . . . . . . . 644--656
Zhenhua Liu and
Minghong Lin and
Adam Wierman and
Steven Low and
Lachlan L. H. Andrew Greening geographical load balancing . . 657--671
Daniele Riboni and
Antonio Villani and
Domenico Vitali and
Claudio Bettini and
Luigi V. Mancini Obfuscation of sensitive data for
incremental release of network flows . . 672--686
Yu Wu and
Chuan Wu and
Bo Li and
Linquan Zhang and
Zongpeng Li and
Francis C. M. Lau Scaling social media applications into
geo-distributed clouds . . . . . . . . . 689--702
Ori Rottenstreich and
Isaac Keslassy The Bloom paradox: when not to use a
Bloom filter . . . . . . . . . . . . . . 703--716
Christoph Lenzen and
Philipp Sommer and
Roger Wattenhofer PulseSync: an efficient and scalable
clock synchronization protocol . . . . . 717--727
I-Hong Hou Broadcasting delay-constrained traffic
over unreliable wireless links with
network coding . . . . . . . . . . . . . 728--740
Stefano Traverso and
Luca Abeni and
Robert Birke and
Csaba Kiraly and
Emilio Leonardi and
Renato Lo Cigno and
Marco Mellia Neighborhood filtering strategies for
overlay construction in P2P-TV systems:
design and experimental comparison . . . 741--754
Zhongmei Yao and
Daren B. H. Cline and
Dmitri Loguinov Unstructured P2P link lifetimes redux 755--767
Zizhan Zheng and
Zhixue Lu and
Prasun Sinha and
Santosh Kumar Ensuring predictable contact opportunity
for scalable vehicular Internet access
on the go . . . . . . . . . . . . . . . 768--781
Jihwan Kim and
Hyang-Won Lee and
Song Chong CSMA-based robust AP throughput
guarantee under user distribution
uncertainty . . . . . . . . . . . . . . 782--795
Muhammad Shahzad and
Alex X. Liu Probabilistic optimal tree hopping for
RFID identification . . . . . . . . . . 796--809
Yanjun Yao and
Qing Cao and
Athanasios V. Vasilakos EDAL: an energy-efficient, delay-aware,
and lifetime-balancing data collection
protocol for heterogeneous wireless
sensor networks . . . . . . . . . . . . 810--823
Xia Zhou and
Zengbin Zhang and
Gang Wang and
Xiaoxiao Yu and
Ben Y. Zhao and
Haitao Zheng Practical conflict graphs in the wild 824--835
George Athanasiou and
Pradeep Chathuranga Weeraddana and
Carlo Fischione and
Leandros Tassiulas Optimizing client association for load
balancing and fairness in
millimeter-wave wireless networks . . . 836--850
Corentin Briat and
Emre Altug Yavuz and
Håkan Hjalmarsson and
Karl Henrik Johansson and
Ulf T. Jönsson and
Gunnar Karlsson and
Henrik Sandberg The conservation of information, towards
an axiomatized modular modeling approach
to congestion control . . . . . . . . . 851--865
Maricica Nistor and
Daniel E. Lucani and
João Barros Hardware abstraction and protocol
optimization for coded sensor networks 866--879
Bo Ji and
Gagan R. Gupta and
Manu Sharma and
Xiaojun Lin and
Ness B. Shroff Achieving optimal throughput and
near-optimal asymptotic delay
performance in multichannel wireless
networks with low complexity: a
practical greedy scheduling policy . . . 880--893
Hu Jin and
Bang Chul Jung and
Victor C. M. Leung Fundamental limits of CDF-based
scheduling: throughput, fairness, and
feedback overhead . . . . . . . . . . . 894--907
Stojan Trajanovski and
Fernando A. Kuipers and
Aleksandar Ili\'c and
Jon Crowcroft and
Piet Van Mieghem Finding critical regions and
region-disjoint paths in a network . . . 908--921
Zhichao Cao and
Yuan He and
Qiang Ma and
Yunhao Liu $ L^2 $: lazy forwarding in
low-duty-cycle wireless sensor network 922--930
Leonidas Georgiadis and
Georgios S. Paschos and
Lavy Libman and
Leandros Tassiulas Minimal evacuation times and stability 931--945
Fei Chen and
Bruhadeshwar Bezawada and
Alex X. Liu Privacy-preserving quantification of
cross-domain network reachability . . . 946--958
Yunbae Kim and
Ganguk Hwang Design and analysis of medium access
protocol: throughput and short-term
fairness perspective . . . . . . . . . . 959--972
Kianoosh Mokhtarian and
Hans-Arno Jacobsen Minimum-delay multicast algorithms for
mesh overlays . . . . . . . . . . . . . 973--986
Haiying Shen and
Yuhua Lin and
Jin Li A social-network-aided efficient
peer-to-peer live streaming system . . . 987--1000
Thang N. Dinh and
My T. Thai Network under joint node and link
attacks: vulnerability assessment
methods and analysis . . . . . . . . . . 1001--1011
Abdallah Jarray and
Ahmed Karmouch Decomposition approaches for virtual
network embedding with one-shot node and
link mapping . . . . . . . . . . . . . . 1012--1025
Mohammad Ali Maddah-Ali and
Urs Niesen Decentralized coded caching attains
order-optimal memory-rate tradeoff . . . 1029--1040
Kai Han and
Jun Luo and
Liu Xiang and
Mingjun Xiao and
Liusheng Huang Achieving energy efficiency and
reliability for data dissemination in
duty-cycled WSNs . . . . . . . . . . . . 1041--1052
Qingkai Liang and
Xinbing Wang and
Xiaohua Tian and
Fan Wu and
Qian Zhang Two-dimensional route switching in
cognitive radio networks: a
game-theoretical framework . . . . . . . 1053--1066
Ali Khanafer and
Murali Kodialam and
Krishna P. N. Puttaswamy To rent or to buy in the presence of
statistical information: the constrained
ski-rental problem . . . . . . . . . . . 1067--1077
Majid Khabbazian and
Stephane Durocher and
Alireza Haghnegahdar and
Fabian Kuhn Bounding interference in wireless ad hoc
networks with nodes in random position 1078--1091
Marcello Caleffi and
Ian F. Akyildiz and
Luigi Paura On the solution of the Steiner tree
NP-hard problem via \bionamePhysarum
BioNetwork . . . . . . . . . . . . . . . 1092--1106
Joerg Widmer and
Andrea Capalbo and
Antonio Fernández Anta and
Albert Banchs Efficient interlayer network codes for
fair layered multicast streaming . . . . 1107--1120
G. Enrico Santagati and
Tommaso Melodia and
Laura Galluccio and
Sergio Palazzo Medium access control and rate
adaptation for ultrasonic intrabody
sensor networks . . . . . . . . . . . . 1121--1134
Yu-Sian Li and
Trang Minh Cao and
Shu-Ting Wang and
Xin Huang and
Cheng-Hsin Hsu and
Po-Ching Lin A resource-constrained asymmetric
redundancy elimination algorithm . . . . 1135--1148
Yang Yang and
Miao Jin and
Yao Zhao and
Hongyi Wu Distributed information storage and
retrieval in $3$-D sensor networks with
general topologies . . . . . . . . . . . 1149--1162
Yipeng Zhou and
Tom Z. J. Fu and
Dah Ming Chiu A unifying model and analysis of P2P VoD
replication and scheduling . . . . . . . 1163--1175
Jianhang Gao and
Qing Zhao and
Ananthram Swami The thinnest path problem . . . . . . . 1176--1189
Hazem Gomaa and
Geoffrey G. Messier and
Robert Davies Hierarchical cache performance analysis
under TTL-based consistency . . . . . . 1190--1201
Andres Garcia-Saavedra and
Balaji Rengarajan and
Pablo Serrano and
Daniel Camps-Mur and
Xavier Costa-Pérez SOLOR: self-optimizing WLANs with
legacy-compatible opportunistic relays 1202--1215
Matthew Johnston and
Hyang-Won Lee and
Eytan Modiano A robust optimization approach to backup
network design with random failures . . 1216--1228
Spyridon Antonakopoulos and
Yigal Bejerano and
Pramod Koppol Full protection made easy: the DisPath
IP fast reroute scheme . . . . . . . . . 1229--1242
Pablo Serrano and
Andres Garcia-Saavedra and
Giuseppe Bianchi and
Albert Banchs and
Arturo Azcorra Per-frame energy consumption in 802.11
devices and its implication on modeling
and design . . . . . . . . . . . . . . . 1243--1256
Jun Zhang and
Xiao Chen and
Yang Xiang and
Wanlei Zhou and
Jie Wu Robust network traffic classification 1257--1270
Fan Wu and
Qianyi Huang and
Yixin Tao and
Guihai Chen Towards privacy preservation in
strategy-proof spectrum auction
mechanisms for noncooperative wireless
networks . . . . . . . . . . . . . . . . 1271--1285
Hisham M. Almasaeid and
Ahmed E. Kamal Receiver-based channel allocation in
cognitive radio wireless mesh networks 1286--1299
Matteo Dell'Amico and
Maurizio Filippone and
Pietro Michiardi and
Yves Roudier On user availability prediction and
network applications . . . . . . . . . . 1300--1313
Enrico Gregori and
Alessandro Improta and
Luciano Lenzini and
Lorenzo Rossi and
Luca Sani A novel methodology to address the
Internet AS-level data incompleteness 1314--1327
Chao Yang and
Scott Jordan A novel coordinated connection access
control and resource allocation
framework for $4$G wireless networks . . 1328--1341
Yu Cheng and
Hongkun Li and
Devu Manikantan Shila and
Xianghui Cao A systematic study of maximal scheduling
algorithms in multiradio multichannel
wireless networks . . . . . . . . . . . 1342--1355
Yuanqing Zheng and
Mo Li P-MTI: physical-layer missing tag
identification via compressive sensing 1356--1366
Fan Zhang and
Yewen Cao and
Deqiang Wang Comments and corrections: a note on
``Low-complexity distributed scheduling
algorithms for wireless networks'' . . . 1367--1369
Francois Clad and
Stefano Vissicchio and
Pascal Mérindol and
Pierre Francois and
Jean-Jacques Pansiot Computing minimal update sequences for
graceful router-wide reconfigurations 1373--1386
Anne Bouillard and
Giovanni Stea Exact worst-case delay in
FIFO-multiplexing feed-forward networks 1387--1400
Sk Kajal Arefin Imon and
Adnan Khan and
Mario Di Francesco and
Sajal K. Das Energy-efficient randomized switching
for maximizing lifetime in tree-based
wireless sensor networks . . . . . . . . 1401--1415
Yi-Sheng Su Topology-transparent scheduling via the
Chinese remainder theorem . . . . . . . 1416--1429
Lei Yang and
Yalin E. Sagduyu and
Junshan Zhang and
Jason H. Li Deadline-aware scheduling with adaptive
network coding for real-time traffic . . 1430--1443
Barlas O\uguz and
Venkat Anantharam and
Ilkka Norros Stable distributed P2P protocols based
on random peer sampling . . . . . . . . 1444--1456
Yunus Sarikaya and
Ozgur Ercetin and
Can Emre Koksal Confidentiality-preserving control of
uplink cellular wireless networks using
hybrid ARQ . . . . . . . . . . . . . . . 1457--1470
Xu Chen and
Brian Proulx and
Xiaowen Gong and
Junshan Zhang Exploiting social ties for cooperative
D$2$D communications: a mobile social
networking case . . . . . . . . . . . . 1471--1484
Mina Yazdanpanah and
Chadi Assi and
Samir Sebbah and
Yousef Shayan Does network coding combined with
interference cancellation bring any gain
to a wireless network? . . . . . . . . . 1485--1500
Sergi Abadal and
Mario Iannazzo and
Mario Nemirovsky and
Albert Cabellos-Aparicio and
Heekwan Lee and
Eduard Alarcón On the area and energy scalability of
wireless network-on-chip: a model-based
benchmarked design space exploration . . 1501--1513
Chenxi Qiu and
Haiying Shen and
Sohraab Soltani and
Karan Sapra and
Hao Jiang and
Jason O. Hallstrom CEDAR: a low-latency and distributed
strategy for packet recovery in wireless
networks . . . . . . . . . . . . . . . . 1514--1527
Ioannis Ch. Paschalidis and
Fuzhuo Huang and
Wei Lai A message-passing algorithm for wireless
network scheduling . . . . . . . . . . . 1528--1541
Bin Li and
Ruogu Li and
Atilla Eryilmaz Throughput-optimal scheduling design
with regular service guarantees in
wireless networks . . . . . . . . . . . 1542--1552
Sameh Sorour and
Shahrokh Valaee Completion delay minimization for
instantly decodable network codes . . . 1553--1567
Timothy Wood and
K. K. Ramakrishnan and
Prashant Shenoy and
Jacobus Van Der Merwe and
Jinho Hwang and
Guyue Liu and
Lucas Chaufournier CloudNet: dynamic pooling of cloud
resources by live WAN migration of
virtual machines . . . . . . . . . . . . 1568--1583
Sharayu Moharir and
Sanjay Shakkottai Max weight versus back pressure: routing
and scheduling in multichannel relay
networks . . . . . . . . . . . . . . . . 1584--1598
Ferhat Dikbiyik and
Massimo Tornatore and
Biswanath Mukherjee Exploiting excess capacity, part II:
differentiated services under traffic
growth . . . . . . . . . . . . . . . . . 1599--1609
András Gulyás and
Gábor Rétvári and
Zalán Heszberger and
Rachit Agarwal On the scalability of routing with
policies . . . . . . . . . . . . . . . . 1610--1618
Enrique Mallada and
Xiaoqiao Meng and
Michel Hack and
Li Zhang and
Ao Tang Skewless network clock synchronization
without discontinuity: convergence and
performance . . . . . . . . . . . . . . 1619--1633
George Iosifidis and
Lin Gao and
Jianwei Huang and
Leandros Tassiulas A double-auction mechanism for mobile
data-offloading markets . . . . . . . . 1634--1647
Dan Li and
Jing Zhu and
Jianping Wu and
Junjie Guan and
Ying Zhang Guaranteeing heterogeneous bandwidth
demand in multitenant data center
networks . . . . . . . . . . . . . . . . 1648--1660
Wei Du and
Yongjun Liao and
Narisu Tao and
Pierre Geurts and
Xiaoming Fu and
Guy Leduc Rating network paths for locality-aware
overlay construction and routing . . . . 1661--1673
Virag Shah and
Gustavo De Veciana High-performance centralized content
delivery infrastructure: models and
asymptotics . . . . . . . . . . . . . . 1674--1687
Tao Shu and
Yingying Chen and
Jie Yang Protecting multi-lateral localization
privacy in pervasive environments . . . 1688--1701
Dahai Xu and
Mung Chiang and
Jennifer Rexford Corrections to ``Link-state routing with
hop-by-hop forwarding can achieve
optimal traffic engineering'' . . . . . 1702--1703
Reza Abdolee and
Benoit Champagne Diffusion LMS strategies in sensor
networks with noisy input data . . . . . 3--14
Nikolaos Chrysos and
Lydia Chen and
Christoforos Kachris and
Manolis Katevenis Discharging the network from its flow
control headaches: packet drops and HOL
blocking . . . . . . . . . . . . . . . . 15--28
Emir Kavurmacioglu and
Murat Alanyali and
David Starobinski Competition in private commons: price
war or market sharing? . . . . . . . . . 29--42
Hongyu Gao and
Vinod Yegneswaran and
Jian Jiang and
Yan Chen and
Phillip Porras and
Shalini Ghosh and
Haixin Duan Reexamining DNS from a global recursive
resolver perspective . . . . . . . . . . 43--57
Can Zhao and
Xiaojun Lin and
Chuan Wu The streaming capacity of sparsely
connected P2P systems with distributed
control . . . . . . . . . . . . . . . . 58--71
Xiaohan Kang and
Weina Wang and
Juan José Jaramillo and
Lei Ying On the performance of
largest-deficit-first for scheduling
real-time traffic in wireless networks 72--84
Chih-Yu Wang and
Chun-Han Ko and
Hung-Yu Wei and
Athanasios V. Vasilakos A voting-based femtocell downlink
cell-breathing control mechanism . . . . 85--98
Lei Jiao and
Jun Li and
Tianyin Xu and
Wei Du and
Xiaoming Fu Optimizing cost for online social
networks on geo-distributed clouds . . . 99--112
Mohamed Kashef and
Anthony Ephremides Optimal partial relaying for
energy-harvesting wireless networks . . 113--122
Ted H. Szymanski An ultra-low-latency guaranteed-rate
Internet for cloud services . . . . . . 123--136
Eunice Adjarath Lemamou and
Philippe Galinier and
Steven Chamberland A hybrid iterated local search algorithm
for the global planning problem of
survivable 4G wireless networks . . . . 137--148
Gábor Rétvári and
János Tapolcai and
Attila K\Horösi and
András Majdán and
Zalán Heszberger Compressing IP forwarding tables:
towards entropy bounds and beyond . . . 149--162
Parinaz Naghizadeh and
Mingyan Liu Perceptions and truth: a mechanism
design approach to crowd-sourcing
reputation . . . . . . . . . . . . . . . 163--176
Zhoujia Mao and
Can Emre Koksal and
Ness B. Shroff Optimal online scheduling with arbitrary
hard deadlines in multihop communication
networks . . . . . . . . . . . . . . . . 177--189
Weina Wang and
Kai Zhu and
Lei Ying and
Jian Tan and
Li Zhang MapTask scheduling in MapReduce with
data locality: throughput and
heavy-traffic optimality . . . . . . . . 190--203
Hussein Al-Zubaidy and
Jörg Liebeherr and
Almut Burchard Network-layer performance analysis of
multihop fading channels . . . . . . . . 204--217
Marcin Bienkowski and
Leszek G\kasieniec and
Marek Klonowski and
Miroslaw Korzeniowski and
Bernard Mans and
Stefan Schmid and
Roger Wattenhofer Distributed alarming in the on-duty and
off-duty models . . . . . . . . . . . . 218--230
Chen Qian and
Simon S. Lam A scalable and resilient layer-2 network
with Ethernet compatibility . . . . . . 231--244
Eleni Stai and
Symeon Papavassiliou and
John S. Baras Performance-aware cross-layer design in
wireless multihop networks via a
weighted backpressure approach . . . . . 245--258
Xiaowen Gong and
Junshan Zhang and
Douglas Cochran and
Kai Xing Optimal placement for barrier coverage
in bistatic radar sensor networks . . . 259--271
Feng Wang and
Jiangchuan Liu and
Minghua Chen and
Haiyang Wang Migration towards cloud-assisted live
media streaming . . . . . . . . . . . . 272--282
Soheil Eshghi and
M. H. R. Khouzani and
Saswati Sarkar and
Santosh S. Venkatesh Optimal patching in clustered malware
epidemics . . . . . . . . . . . . . . . 283--298
Giusi Alfano and
Michele Garetto and
Emilio Leonardi Content-centric wireless networks with
limited buffers: when mobility hurts . . 299--311
Ziling Zhou and
Binbin Chen and
Haifeng Yu Understanding RFID counting protocols 312--327
Guang Tan and
Zhimeng Yin and
Hongbo Jiang Trap array: a unified model for
scalability evaluation of geometric
routing . . . . . . . . . . . . . . . . 328--341
Jeremy M. Plante and
Arush Gadkar and
Vinod M. Vokkarane Manycast overlay in split-incapable
networks for supporting
bandwidth-intensive applications . . . . 342--354
Robert Margolies and
Ashwin Sridharan and
Vaneet Aggarwal and
Rittwik Jana and
N. K. Shankaranarayanan and
Vinay A. Vaishampayan and
Gil Zussman Exploiting mobility in proportional fair
cellular scheduling: measurements and
algorithms . . . . . . . . . . . . . . . 355--367
Pedro E. Santacruz and
Vaneet Aggarwal and
Ashutosh Sabharwal Leveraging physical-layer capabilities:
distributed scheduling in interference
networks with local views . . . . . . . 368--382
Kundan Kandhway and
Joy Kuri Campaigning in heterogeneous social
networks: optimal control of SI
information epidemics . . . . . . . . . 383--396
Wen Luo and
Yan Qiao and
Shigang Chen and
Min Chen An efficient protocol for RFID
multigroup threshold-based
classification based on sampling and
logical bitmap . . . . . . . . . . . . . 397--407
Kai Zhu and
Lei Ying Information source detection in the SIR
model: a sample-path-based approach . . 408--421
Chen Chen and
Hans-Arno Jacobsen and
Roman Vitenberg Algorithms based on divide and conquer
for topic-based publish/subscribe
overlay design . . . . . . . . . . . . . 422--436
Valentino Pacifici and
Frank Lehrieder and
György Dán Cache bandwidth allocation for P2P
file-sharing systems to minimize
inter-ISP traffic . . . . . . . . . . . 437--448
Qiang Liu and
Xin Wang and
Nageswara S. V. Rao and
Katharine Brigham and
B. V. K. Vijaya Kumar Effect of retransmission and
retrodiction on estimation and fusion in
long-haul sensor networks . . . . . . . 449--461
Fengyu Gao and
Hongyan Qian Efficient, real-world token bucket
configuration for residential gateways 462--475
Sophia Athanasiadou and
Marios Gatzianas and
Leonidas Georgiadis and
Leandros Tassiulas Stable XOR-based policies for the
broadcast erasure channel with feedback 476--491
Albert Banchs and
Jorge Ortin and
Andres Garcia-Saavedra and
Douglas J. Leith and
Pablo Serrano Thwarting selfish behavior in 802.11
WLANs . . . . . . . . . . . . . . . . . 492--505
Florin Coras and
Jordi Domingo-Pascual and
Darrel Lewis and
Albert Cabellos-Aparicio An analytical model for Loc/ID mappings
caches . . . . . . . . . . . . . . . . . 506--516
Yi Gao and
Wei Dong and
Chun Chen and
Jiajun Bu and
Wenbin Wu and
Xue Liu iPath: path inference in wireless sensor
networks . . . . . . . . . . . . . . . . 517--528
Jayakrishnan Nair and
Martin Andreasson and
Lachlan L. H. Andrew and
Steven H. Low and
John C. Doyle On channel failures, file fragmentation
policies, and heavy-tailed completion
times . . . . . . . . . . . . . . . . . 529--541
Mohammad Hadi Afrasiabi and
Roch Guérin Exploring user-provided connectivity . . 542--554
Ori Rottenstreich and
Isaac Keslassy and
Avinatan Hassidim and
Haim Kaplan and
Ely Porat Optimal in/out TCAM encodings of ranges 555--568
Flavio Esposito and
Donato Di Paola and
Ibrahim Matta On distributed virtual network embedding
with guarantees . . . . . . . . . . . . 569--582
Xiaochun Yun and
Yipeng Wang and
Yongzheng Zhang and
Yu Zhou A semantics-aware approach to the
automated network protocol
identification . . . . . . . . . . . . . 583--595
Qiuyu Peng and
Anwar Walid and
Jaehyun Hwang and
Steven H. Low Multipath TCP: analysis, design, and
implementation . . . . . . . . . . . . . 596--609
James Daly and
Alex X. Liu and
Eric Torng A difference resolution approach to
compressing access control lists . . . . 610--623
Ahmed Farhan Hanif and
Hamidou Tembine and
Mohamad Assaad and
Djamal Zeghlache Mean-field games for resource sharing in
cloud-based networks . . . . . . . . . . 624--637
Dong Zhao and
Xiang-Yang Li and
Huadong Ma Budget-feasible online incentive
mechanisms for crowdsourcing tasks
truthfully . . . . . . . . . . . . . . . 647--661
Daibo Liu and
Mengshu Hou and
Zhichao Cao and
Jiliang Wang and
Yuan He and
Yunhao Liu Duplicate detectable opportunistic
forwarding in duty-cycled wireless
sensor networks . . . . . . . . . . . . 662--673
Joaquim Oller and
Ilker Demirkol and
Jordi Casademont and
Josep Paradells and
Gerd Ulrich Gamm and
Leonhard Reindl Has time come to switch from duty-cycled
MAC protocols to wake-up radio for
wireless sensor networks? . . . . . . . 674--687
Abhishek Mishra and
Parv Venkitasubramaniam Anonymity and fairness in packet
scheduling: a quantitative tradeoff . . 688--702
Min Chen and
Wen Luo and
Zhen Mo and
Shigang Chen and
Yuguang Fang An efficient tag search protocol in
large-scale RFID systems with noisy
channel . . . . . . . . . . . . . . . . 703--716
Alireza Shams Shafigh and
Beatriz Lorenzo and
Savo Glisic and
Jordi Pérez-Romero and
Luiz A. DaSilva and
Allen B. MacKenzie and
Juha Röning A framework for dynamic network
architecture and topology optimization 717--730
Zakaria Al-Qudah and
Eamon Johnson and
Michael Rabinovich and
Oliver Spatscheck Internet with transient
destination-controlled addressing . . . 731--744
Zhi Zhang and
Yigal Bejerano and
Spyridon Antonakopoulos Energy-efficient IP core network
configuration under general traffic
demands . . . . . . . . . . . . . . . . 745--758
Michael J. Neely Distributed stochastic optimization via
correlated scheduling . . . . . . . . . 759--772
Sazzadur Rahman and
Ting-Kai Huang and
Harsha V. Madhyastha and
Michalis Faloutsos Detecting malicious Facebook
applications . . . . . . . . . . . . . . 773--787
Xudong Wang and
Wenguang Mao Analog network coding without
restrictions on superimposed frames . . 788--805
Tong Meng and
Fan Wu and
Guihai Chen Code-based neighbor discovery protocols
in mobile wireless networks . . . . . . 806--819
Vinay Joseph and
Sem Borst and
Martin I. Reiman Optimal rate allocation for video
streaming in wireless networks with user
dynamics . . . . . . . . . . . . . . . . 820--835
Ramtin Pedarsani and
Mohammad Ali Maddah-Ali and
Urs Niesen Online coded caching . . . . . . . . . . 836--845
Jinsong Han and
Chen Qian and
Panlong Yang and
Dan Ma and
Zhiping Jiang and
Wei Xi and
Jizhong Zhao GenePrint: generic and accurate
physical-layer identification for UHF
RFID tags . . . . . . . . . . . . . . . 846--858
Kun Xie and
Xin Wang and
Jigang Wen and
Jiannong Cao Cooperative routing with relay
assignment in multiradio multihop
wireless networks . . . . . . . . . . . 859--872
Jian Guo and
Fangming Liu and
John C. S. Lui and
Hai Jin Fair network bandwidth allocation in
IaaS datacenters via a cooperative game
approach . . . . . . . . . . . . . . . . 873--886
Hongkun Yang and
Simon S. Lam Real-time verification of network
properties using atomic predicates . . . 887--900
Mustafa Y. Arslan and
Karthikeyan Sundaresan and
Srikanth V. Krishnamurthy and
Sampath Rangarajan iBUS: an integrated beamformer and
uplink scheduler for OFDMA small cells 901--914
Karthikeyan Sundaresan and
Mustafa Y. Arslan and
Shailendra Singh and
Sampath Rangarajan and
Srikanth V. Krishnamurthy FluidNet: a flexible cloud-based radio
access network for small cells . . . . . 915--928
Huiyuan Zhang and
Dung T. Nguyen and
Huiling Zhang and
My T. Thai Least cost influence maximization across
multiple social networks . . . . . . . . 929--939
Chee Wei Tan Optimal power control in Rayleigh-fading
heterogeneous wireless networks . . . . 940--953
Ying Cui and
Edmund M. Yeh and
Ran Liu Enhancing the delay performance of
dynamic backpressure algorithms . . . . 954--967
Rihua Wei and
Yang Xu and
H. Jonathan Chao Finding nonequivalent classifiers in
Boolean space to reduce TCAM usage . . . 968--981
Jayakrishnan Nair and
Krishna Jagannathan and
Adam Wierman When heavy-tailed and light-tailed flows
compete: the response time tail under
generalized max-weight scheduling . . . 982--995
Hasti A. Pedersen and
Sujit Dey Enhancing mobile video capacity and
quality using rate adaptation, RAN
caching and processing . . . . . . . . . 996--1010
Mingchen Zhao and
Wenchao Zhou and
Alexander J. T. Gurney and
Andreas Haeberlen and
Micah Sherr and
Boon Thau Loo Private and verifiable interdomain
routing decisions . . . . . . . . . . . 1011--1024
Han Cai and
Irem Koprulu and
Ness B. Shroff Exploiting double opportunities for
latency-constrained content propagation
in wireless networks . . . . . . . . . . 1025--1037
Tao Han and
Nirwan Ansari A traffic load balancing framework for
software-defined radio access networks
powered by hybrid energy sources . . . . 1038--1051
Wei Gong and
Ivan Stojmenovic and
Amiya Nayak and
Kebin Liu and
Haoxiang Liu Fast and scalable counterfeits
estimation for large-scale RFID systems 1052--1064
Chandramani Singh and
Anurag Kumar and
Rajesh Sundaresan Combined base station association and
power control in multichannel cellular
networks . . . . . . . . . . . . . . . . 1065--1080
Dong-Hoon Shin and
Shibo He and
Junshan Zhang Robust and cost-effective design of
cyber-physical systems: an optimal
middleware deployment approach . . . . . 1081--1094
Sang-Yoon Chang and
Yih-Chun Hu and
Nicola Laurenti SimpleMAC: a simple wireless MAC-layer
countermeasure to intelligent and
insider jammers . . . . . . . . . . . . 1095--1108
Gaurav Agrawal and
Deep Medhi Embedding IP unique shortest path
topology on a wavelength-routed network:
normal and survivable design . . . . . . 1109--1124
Dao-Yuan Chang and
Pi-Chung Wang TCAM-based multi-match packet
classification using multidimensional
rule layering . . . . . . . . . . . . . 1125--1138
Xuanyu Cao and
Jinbei Zhang and
Luoyi Fu and
Weijie Wu and
Xinbing Wang Optimal secrecy capacity-delay tradeoff
in large-scale mobile ad hoc networks 1139--1152
Zhangyu Guan and
Tommaso Melodia and
Gesualdo Scutari To transmit or not to transmit?:
distributed queueing games in
infrastructureless wireless networks . . 1153--1166
Abhijeet Bhorkar and
Mohammad Naghshvar and
Tara Javidi Opportunistic routing with congestion
diversity in wireless ad hoc networks 1167--1180
Yunus Sarikaya and
C. Emre Koksal and
Ozgur Ercetin Dynamic network control for confidential
multi-hop communications . . . . . . . . 1181--1195
Majed Alresaini and
Kwame-Lante Wright and
Bhaskar Krishnamachari and
Michael J. Neely Backpressure delay enhancement for
encounter-based mobile networks while
sustaining throughput optimality . . . . 1196--1208
Guan-Hua Tu and
Yuanjie Li and
Chunyi Peng and
Chi-Yu Li and
Songwu Lu Detecting problematic control-plane
protocol interactions in mobile networks 1209--1222
Ashok Anand and
Athula Balachandran and
Aditya Akella and
Vyas Sekar and
Srinivasan Seshan Enhancing video accessibility and
availability using information-bound
references . . . . . . . . . . . . . . . 1223--1236
Andra Lutu and
Marcelo Bagnulo and
Cristel Pelsser and
Olaf Maennel and
Jesus Cid-Sueiro The BGP visibility toolkit: detecting
anomalous Internet routing behavior . . 1237--1250
Kirill Kogan and
Sergey I. Nikolenko and
Ori Rottenstreich and
William Culhane and
Patrick Eugster Exploiting order independence for
scalable and expressive packet
classification . . . . . . . . . . . . . 1251--1264
Shizhen Zhao and
Xiaojun Lin Design of scheduling algorithms for
end-to-end backlog minimization in
wireless multi-hop networks under
$k$-hop interference models . . . . . . 1265--1278
Qingsi Wang and
Mingyan Liu Learning in hide-and-seek . . . . . . . 1279--1292
Alex X. Liu and
Chad R. Meiners and
Eric Torng Packet classification using binary
content addressable memory . . . . . . . 1295--1307
M. Zubair Shafiq and
Lusheng Ji and
Alex X. Liu and
Jeffrey Pang and
Shobha Venkataraman and
Jia Wang Characterizing and optimizing cellular
network performance during crowded
events . . . . . . . . . . . . . . . . . 1308--1321
Soongeol Kwon and
Natarajan Gautam Time-stable performance in parallel
queues with non-homogeneous and
multi-class workloads . . . . . . . . . 1322--1335
Abishek Gopalan and
Srinivasan Ramasubramanian IP fast rerouting and disjoint multipath
routing with three edge-independent
spanning trees . . . . . . . . . . . . . 1336--1349
Yi Qin and
Xiaohua Tian and
Weijie Wu and
Xinbing Wang Mobility weakens the distinction between
multicast and unicast . . . . . . . . . 1350--1363
Yu Lu and
Mehul Motani and
Wai-Choong Wong A QoE-aware resource distribution
framework incentivizing context sharing
and moderate competition . . . . . . . . 1364--1377
Richard J. La Interdependent security with strategic
agents and cascades of infection . . . . 1378--1391
Yi Gao and
Wei Dong and
Wenbin Wu and
Chun Chen and
Xiang-Yang Li and
Jiajun Bu Scalpel: scalable preferential link
tomography based on graph trimming . . . 1392--1403
Jia Liu and
Ness B. Shroff and
Cathy H. Xia and
Hanif D. Sherali Joint congestion control and routing
optimization: an efficient second-order
distributed approach . . . . . . . . . . 1404--1420
Stefan Schmid and
Chen Avin and
Christian Scheideler and
Michael Borokhovich and
Bernhard Haeupler and
Zvi Lotker SplayNet: towards locally self-adjusting
networks . . . . . . . . . . . . . . . . 1421--1433
Wei Dai and
Scott Jordan ISP service tier design . . . . . . . . 1434--1447
Tian Pan and
Ting Zhang and
Junxiao Shi and
Yang Li and
Linxiao Jin and
Fuliang Li and
Jiahai Yang and
Beichuan Zhang and
Xueren Yang and
Mingui Zhang and
Huichen Dai and
Bin Liu Towards zero-time wakeup of line cards
in power-aware routers . . . . . . . . . 1448--1461
Kai Han and
Chi Zhang and
Jun Luo Taming the uncertainty: budget limited
robust crowdsensing through online
learning . . . . . . . . . . . . . . . . 1462--1475
Changhee Joo and
Xiaojun Lin and
Jiho Ryu and
Ness B. Shroff Distributed greedy approximation to
maximum weighted independent set for
scheduling with fading channels . . . . 1476--1488
Matti Siekkinen and
Mohammad Ashraful Hoque and
Jukka K. Nurminen Using viewing statistics to control
energy and traffic overhead in mobile
video streaming . . . . . . . . . . . . 1489--1503
Huasen Wu and
Xiaojun Lin and
Xin Liu and
Youguang Zhang Application-level scheduling with
probabilistic deadline constraints . . . 1504--1517
Rafael Laufer and
Leonard Kleinrock The capacity of wireless CSMA/CA
networks . . . . . . . . . . . . . . . . 1518--1532
Morteza Mardani and
Georgios B. Giannakis Estimating traffic and anomaly maps via
network tomography . . . . . . . . . . . 1533--1547
Yan Qiao and
Shigang Chen and
Tao Li and
Shiping Chen Tag-ordering polling protocols in RFID
systems . . . . . . . . . . . . . . . . 1548--1561
Sachin Kadloor and
Negar Kiyavash and
Parv Venkitasubramaniam Mitigating timing side channel in shared
schedulers . . . . . . . . . . . . . . . 1562--1573
Pouya Ostovari and
Jie Wu and
Abdallah Khreishah and
Ness B. Shroff Scalable video streaming with helper
nodes using random linear network coding 1574--1587
Ahmad Beirami and
Mohsen Sardari and
Faramarz Fekri Packet-level network compression:
realization and scaling of the
network-wide benefits . . . . . . . . . 1588--1604
Jinsong Han and
Chen Qian and
Xing Wang and
Dan Ma and
Jizhong Zhao and
Wei Xi and
Zhiping Jiang and
Zhi Wang Twins: device-free object tracking using
passive tags . . . . . . . . . . . . . . 1605--1617
Hang Li and
Chuan Huang and
Ping Zhang and
Shuguang Cui and
Junshan Zhang Distributed opportunistic scheduling for
energy harvesting based wireless
networks: a two-stage probing approach 1618--1631
Yongmin Zhang and
Shibo He and
Jiming Chen Data gathering optimization by dynamic
sensing and routing in rechargeable
sensor networks . . . . . . . . . . . . 1632--1646
Jeongho Kwak and
Okyoung Choi and
Song Chong and
Prasant Mohapatra Processor-network speed scaling for
energy: delay tradeoff in smartphone
applications . . . . . . . . . . . . . . 1647--1660
Jongho Won and
Chris Y. T. Ma and
David K. Y. Yau and
Nageswara S. V. Rao Privacy-assured aggregation protocol for
smart metering: a proactive
fault-tolerant approach . . . . . . . . 1661--1674
Zhangyu Guan and
Tommaso Melodia and
Dongfeng Yuan and
Dimitris A. Pados Distributed resource management for
cognitive ad hoc networks with
cooperative relays . . . . . . . . . . . 1675--1689
Sharayu Moharir and
Sujay Sanghavi and
Sanjay Shakkottai Online load balancing under graph
constraints . . . . . . . . . . . . . . 1690--1703
Matteo Avalle and
Fulvio Risso and
Riccardo Sisto Scalable algorithms for NFA
multi-striding and NFA-based deep packet
inspection on GPUs . . . . . . . . . . . 1704--1717
Kobi Cohen and
Amir Leshem Distributed game-theoretic optimization
and management of multichannel ALOHA
networks . . . . . . . . . . . . . . . . 1718--1731
Dejun Yang and
Guoliang Xue and
Xi Fang and
Jian Tang Incentive mechanisms for crowdsensing:
crowdsourcing with smartphones . . . . . 1732--1744
Jinsung Lee and
Hojin Lee and
Yung Yi and
Song Chong and
Edward W. Knightly and
Mung Chiang Making 802.11 DCF near-optimal: design,
implementation, and evaluation . . . . . 1745--1758
Kai Liu and
Joseph K. Y. Ng and
Victor C. S. Lee and
Sang H. Son and
Ivan Stojmenovic Cooperative data scheduling in hybrid
vehicular ad hoc networks: VANET as a
software defined network . . . . . . . . 1759--1773
Seon Yeong Han and
Nael B. Abu-Ghazaleh and
Dongman Lee Efficient and consistent path loss model
for mobile network simulation . . . . . 1774--1786
Hulya Seferoglu and
Eytan Modiano Separation of routing and scheduling in
backpressure: based wireless networks 1787--1800
Wenzhuo Ouyang and
Atilla Eryilmaz and
Ness B. Shroff Downlink scheduling over Markovian
fading channels . . . . . . . . . . . . 1801--1812
Roberto Gonzalez and
Ruben Cuevas and
Reza Motamedi and
Reza Rejaie and
Angel Cuevas Assessing the evolution of Google+ in
its first two years . . . . . . . . . . 1813--1826
Hongxing Li and
Chuan Wu and
Zongpeng Li and
Francis C. M. Lau Virtual machine trading in a federation
of clouds: individual profit and social
welfare maximization . . . . . . . . . . 1827--1840
Xun Gong and
Negar Kiyavash Quantifying the information leakage in
timing side channels in deterministic
work-conserving schedulers . . . . . . . 1841--1852
Jose Yallouz and
Ori Rottenstreich and
Ariel Orda Tunable survivable spanning trees . . . 1853--1866
Bin Li and
Ruogu Li and
Atilla Eryilmaz Wireless scheduling design for
optimizing both service regularity and
mean delay in heavy-traffic regimes . . 1867--1880
Qianyi Huang and
Yang Gui and
Fan Wu and
Guihai Chen and
Qian Zhang A general privacy-preserving auction
mechanism for secondary spectrum markets 1881--1893
Arnob Ghosh and
Saswati Sarkar Quality-sensitive price competition in
secondary market spectrum oligopoly:
single location game . . . . . . . . . . 1894--1907
Zizhong Cao and
Murali Kodialam and
T. V. Lakshman Joint static and dynamic traffic
scheduling in data center networks . . . 1908--1918
Zhenzhe Zheng and
Fan Wu and
Shaojie Tang and
Guihai Chen AEGIS: an unknown combinatorial auction
mechanism framework for heterogeneous
spectrum redistribution in
noncooperative wireless networks . . . . 1919--1932
Hamlet Medina Ruiz and
Michel Kieffer and
Beatrice Pesquet-Popescu TCP and Network Coding: Equilibrium and
Dynamic Properties . . . . . . . . . . . 1935--1947
Zhidan Liu and
Zhenjiang Li and
Mo Li and
Wei Xing and
Dongming Lu Path Reconstruction in Dynamic Wireless
Sensor Networks Using Compressive
Sensing . . . . . . . . . . . . . . . . 1948--1960
Gaurav Raina and
Sreelakshmi Manjunath and
Sai Prasad and
Krishnamurthy Giridhar Stability and Performance Analysis of
Compound TCP With REM and Drop-Tail
Queue Management . . . . . . . . . . . . 1961--1974
Jianxia Ning and
Shailendra Singh and
Konstantinos Pelechrinis and
Bin Liu and
Srikanth V. Krishnamurthy and
Ramesh Govindan Forensic Analysis of Packet Losses in
Wireless Networks . . . . . . . . . . . 1975--1988
Yi Qin and
Riheng Jia and
Jinbei Zhang and
Weijie Wu and
Xinbing Wang Impact of Social Relation and Group Size
in Multicast Ad Hoc Networks . . . . . . 1989--2004
Ahmed Osama Fathy Atya and
Ioannis Broustis and
Shailendra Singh and
Dimitris Syrivelis and
Srikanth V. Krishnamurthy and
Thomas F. La Porta A Policy-Aware Enforcement Logic for
Appropriately Invoking Network Coding 2005--2018
Pooja Vyavahare and
Nutan Limaye and
D. Manjunath Optimal Embedding of Functions for
In-Network Computation: Complexity
Analysis and Algorithms . . . . . . . . 2019--2032
Prasanna Chaporkar and
Stefan Magureanu and
Alexandre Proutiere Optimal Distributed Scheduling in
Wireless Networks Under the SINR
Interference Model . . . . . . . . . . . 2033--2045
Mihalis G. Markakis and
Eytan Modiano and
John N. Tsitsiklis Delay Stability of Back-Pressure
Policies in the Presence of Heavy-Tailed
Traffic . . . . . . . . . . . . . . . . 2046--2059
Weijie Shi and
Linquan Zhang and
Chuan Wu and
Zongpeng Li and
Francis C. M. Lau An Online Auction Framework for Dynamic
Resource Provisioning in Cloud Computing 2060--2073
Reuven Cohen and
Gabi Nakibly Restorable Logical Topology in the Face
of No or Partial Traffic Demand
Knowledge . . . . . . . . . . . . . . . 2074--2085
Jeffrey Wildman and
Steven Weber On Characterizing the Local Pooling
Factor of Greedy Maximal Scheduling in
Random Graphs . . . . . . . . . . . . . 2086--2099
Chen Qian and
Simon S. Lam Greedy Routing by Network Distance
Embedding . . . . . . . . . . . . . . . 2100--2113
David Applegate and
Aaron Archer and
Vijay Gopalakrishnan and
Seungjoon Lee and
K. K. Ramakrishnan Optimal Content Placement for a
Large-Scale VoD System . . . . . . . . . 2114--2127
Xiaofei Liao and
Li Lin and
Guang Tan and
Hai Jin and
Xiaobin Yang and
Wei Zhang and
Bo Li LiveRender: a Cloud Gaming System Based
on Compressed Graphics Streaming . . . . 2128--2139
Bassel Saleh and
Dongyu Qiu Performance Analysis of
Network-Coding-Based P2P Live Streaming
Systems . . . . . . . . . . . . . . . . 2140--2153
Luwei Cheng and
Francis C. M. Lau Revisiting TCP Congestion Control in a
Virtual Cluster Environment . . . . . . 2154--2167
Guanfeng Liang and
Ulas C. Kozat On Throughput-Delay Optimal Access to
Storage Clouds via Load Adaptive Coding
and Chunking . . . . . . . . . . . . . . 2168--2181
Anh Le and
Athina Markopoulou and
Alexandros G. Dimakis Auditing for Distributed Storage Systems 2182--2195
Zain Shamsi and
Ankur Nandwani and
Derek Leonard and
Dmitri Loguinov Hershel: Single-Packet OS Fingerprinting 2196--2209
Yang Peng and
Kai Chen and
Guohui Wang and
Wei Bai and
Yangming Zhao and
Hao Wang and
Yanhui Geng and
Zhiqiang Ma and
Lin Gu Towards Comprehensive Traffic
Forecasting in Cloud Computing: Design
and Application . . . . . . . . . . . . 2210--2222
Michael J. Neely Energy-Aware Wireless Scheduling With
Near-Optimal Backlog and Convergence
Time Tradeoffs . . . . . . . . . . . . . 2223--2236
Longbo Huang and
Shaoquan Zhang and
Minghua Chen and
Xin Liu When Backpressure Meets Predictive
Scheduling . . . . . . . . . . . . . . . 2237--2250
Joachim Fabini and
Tanja Zseby The Right Time: Reducing Effective
End-to-End Delay in Time-Slotted
Packet-Switched Networks . . . . . . . . 2251--2263
Xiaohan Wei and
Michael J. Neely Power-Aware Wireless File Downloading: a
Lyapunov Indexing Approach to a
Constrained Restless Bandit Problem . . 2264--2277
Jaewook Kwak and
Chul-Ho Lee and
Do Young Eun A High-Order Markov-Chain-Based
Scheduling Algorithm for Low Delay in
CSMA Networks . . . . . . . . . . . . . 2278--2290
Mehdi Nikkhah and
Roch Guerin Migrating the Internet to IPv6: an
Exploration of the When and Why . . . . 2291--2304
Rui Li and
Alex X. Liu and
Ann L. Wang and
Bezawada Bruhadeshwar Fast and Scalable Range Query Processing
With Strong Privacy Protection for Cloud
Computing . . . . . . . . . . . . . . . 2305--2318
Joongheon Kim and
Giuseppe Caire and
Andreas F. Molisch Quality-Aware Streaming and Scheduling
for Device-to-Device Video Delivery . . 2319--2331
Mohammad Javad Hajikhani and
Thomas Kunz and
Howard Schwartz A Recursive Method for Clock
Synchronization in Asymmetric
Packet-Based Networks . . . . . . . . . 2332--2342
Cheng-Shang Chang and
Wanjiun Liao and
Tsung-Ying Wu Tight Lower Bounds for Channel Hopping
Schemes in Cognitive Radio Networks . . 2343--2356
John Tadrous and
Atilla Eryilmaz and
Hesham El Gamal Joint Smart Pricing and Proactive
Content Caching for Mobile Services . . 2357--2371
Wei Dong and
Jie Yu and
Jiliang Wang and
Xuefeng Zhang and
Yi Gao and
Chun Chen and
Jiajun Bu Accurate and Robust Time Reconstruction
for Deployed Sensor Networks . . . . . . 2372--2385
Guibin Tian and
Yong Liu Towards Agile and Smooth Video
Adaptation in HTTP Adaptive Streaming 2386--2399
Alex X. Liu and
Eric Torng Overlay Automata and Algorithms for Fast
and Scalable Regular Expression Matching 2400--2415
Jaeseong Jeong and
Yung Yi and
Jeong-Woo Cho and
Do Young Eun and
Song Chong Energy-Efficient Wi-Fi Sensing Policy
Under Generalized Mobility Patterns With
Aging . . . . . . . . . . . . . . . . . 2416--2428
Gianfranco Nencioni and
Nishanth Sastry and
Gareth Tyson and
Vijay Badrinarayanan and
Dmytro Karamshuk and
Jigna Chandaria and
Jon Crowcroft SCORE: Exploiting Global Broadcasts to
Create Offline Personal Channels for
On-Demand Access . . . . . . . . . . . . 2429--2442
Yu Xiang and
Tian Lan and
Vaneet Aggarwal and
Yih-Farn R. Chen Joint Latency and Cost Optimization for
Erasure-Coded Data Center Storage . . . 2443--2457
Srikanth Hariharan and
Ness B. Shroff On Sample-Path Optimal Dynamic
Scheduling for Sum-Queue Minimization in
Trees Under the $K$-Hop Interference
Model . . . . . . . . . . . . . . . . . 2458--2471
Chen Wang and
Hongbo Jiang and
Tianlong Yu and
John C. S. Lui SLICE: Enabling Greedy Routing in High
Genus $3$-D WSNs With General Topologies 2472--2484
Wei Dong and
Swati Rallapalli and
Lili Qiu and
K. K. Ramakrishnan and
Yin Zhang Double Auctions for Dynamic Spectrum
Allocation . . . . . . . . . . . . . . . 2485--2497
Wan Du and
Zhenjiang Li and
Jansen Christian Liando and
Mo Li From Rateless to Distanceless: Enabling
Sparse Sensor Network Deployment in
Large Areas . . . . . . . . . . . . . . 2498--2511
Felix Ming Fai Wong and
Zhenming Liu and
Mung Chiang On the Efficiency of Social Recommender
Networks . . . . . . . . . . . . . . . . 2512--2524
Lidia Donvito and
Laura Galluccio and
Alfio Lombardo and
Giacomo Morabito $ \mu $-NET: a Network for Molecular
Biology Applications in Microfluidic
Chips . . . . . . . . . . . . . . . . . 2525--2538
Mehdi Malboubi and
Cuong Vu and
Chen-Nee Chuah and
Puneet Sharma Decentralizing Network Inference
Problems With Multiple-Description
Fusion Estimation MDFE . . . . . . . . . 2539--2552
Tobias Harks and
Martin Hoefer and
Kevin Schewior and
Alexander Skopalik Routing Games With Progressive Filling 2553--2562
Richard T. B. Ma Subsidization Competition: Vitalizing
the Neutral Internet . . . . . . . . . . 2563--2576
Huasen Wu and
Xiaojun Lin and
Xin Liu and
Kun Tan and
Yongguang Zhang CoSchd: Coordinated Scheduling With
Channel and Load Awareness for
Alleviating Cellular Congestion . . . . 2579--2592
Di Niu and
Baochun Li and
Di Niu and
Baochun Li An Asynchronous Fixed-Point Algorithm
for Resource Sharing With Coupled
Objectives . . . . . . . . . . . . . . . 2593--2606
Can Zhao and
Jian Zhao and
Xiaojun Lin and
Chuan Wu Capacity of P2P On-Demand Streaming With
Simple, Robust, and Decentralized
Control . . . . . . . . . . . . . . . . 2607--2620
Luis Amaral Lopes and
Rute Sofia and
Huseyin Haci and
Huiling Zhu A Proposal for Dynamic Frequency Sharing
in Wireless Networks . . . . . . . . . . 2621--2633
Karla Kvaternik and
Jaime Llorca and
Daniel Kilper and
Lacra Pavel A Methodology for the Design of
Self-Optimizing, Decentralized
Content-Caching Strategies . . . . . . . 2634--2647
Shravan Garlapati and
Teja Kuruganti and
Michael R. Buehrer and
Jeffrey H. Reed and
Shravan Garlapati and
Teja Kuruganti and
Michael R. Buehrer and
Jeffrey H. Reed SMAC: a Soft MAC to Reduce Control
Overhead and Latency in CDMA-Based AMI
Networks . . . . . . . . . . . . . . . . 2648--2662
Angelos Chatzipapas and
Vincenzo Mancuso An M/G/1 Model for Gigabit Energy
Efficient Ethernet Links With Coalescing
and Real-Trace-Based Evaluation . . . . 2663--2675
Victor Valls and
Douglas J. Leith Max-Weight Revisited: Sequences of
Nonconvex Optimizations Solving Convex
Optimizations . . . . . . . . . . . . . 2676--2689
Bei Liu and
Wei Wang and
Donghyun Kim and
Deying Li and
Jingyi Wang and
Alade O. Tokuta and
Yaolin Jiang On Approximating Minimum $3$-Connected
$m$-Dominating Set Problem in Unit Disk
Graph . . . . . . . . . . . . . . . . . 2690--2701
Yuxiao Hou and
Jiajue Ou and
Yuanqing Zheng and
Mo Li PLACE: Physical Layer Cardinality
Estimation for Large-Scale RFID Systems 2702--2714
John Tadrous and
Atilla Eryilmaz On Optimal Proactive Caching for Mobile
Networks With Demand Uncertainties . . . 2715--2727
Matteo Varvello and
Rafael Laufer and
Feixiong Zhang and
T. V. Lakshman Multilayer Packet Classification With
Graphics Processing Units . . . . . . . 2728--2741
Sen Wang and
Jun Bi and
Jianping Wu and
Athanasios V. Vasilakos CPHR: In-Network Caching for
Information-Centric Networking With
Partitioning and Hash-Routing . . . . . 2742--2755
Wei Gong and
Haoxiang Liu and
Lei Chen and
Kebin Liu and
Yunhao Liu Fast Composite Counting in RFID Systems 2756--2767
Shuihai Hu and
Kai Chen and
Haitao Wu and
Wei Bai and
Chang Lan and
Hao Wang and
Hongze Zhao and
Chuanxiong Guo Explicit Path Control in Commodity Data
Centers: Design and Applications . . . . 2768--2781
Guodong Shi and
Bo Li and
Mikael Johansson and
Karl Henrik Johansson Finite-Time Convergent Gossiping . . . . 2782--2794
Xu Chen and
Lei Jiao and
Wenzhong Li and
Xiaoming Fu Efficient Multi-User Computation
Offloading for Mobile-Edge Cloud
Computing . . . . . . . . . . . . . . . 2795--2808
Johannes Dams and
Martin Hoefer and
Thomas Kesselheim Jamming-Resistant Learning in Wireless
Networks . . . . . . . . . . . . . . . . 2809--2818
Mingyang Zhang and
Changsheng You and
Zuqing Zhu On the Parallelization of Spectrum
Defragmentation Reconfigurations in
Elastic Optical Networks . . . . . . . . 2819--2833
Jinxue Zhang and
Rui Zhang and
Jingchao Sun and
Yanchao Zhang and
Chi Zhang and
Jinxue Zhang and
Rui Zhang and
Jingchao Sun and
Yanchao Zhang and
Chi Zhang TrueTop: a Sybil-Resilient System for
User Influence Measurement on Twitter 2834--2846
Donggyu Yun and
Dongmyung Lee and
Se-Young Yun and
Jinwoo Shin and
Yung Yi Delay Optimal CSMA With Linear Virtual
Channels Under a General Topology . . . 2847--2857
Xiaoyong Li and
Daren B. H. Cline and
Dmitri Loguinov On Sample-Path Staleness in Lazy Data
Replication . . . . . . . . . . . . . . 2858--2871
Stepan Kucera and
David Lopez-Perez Inter-Cell Interference Coordination for
Control Channels in LTE Heterogeneous
Networks . . . . . . . . . . . . . . . . 2872--2884
Jinsong Han and
Han Ding and
Chen Qian and
Wei Xi and
Zhi Wang and
Zhiping Jiang and
Longfei Shangguan and
Jizhong Zhao and
Jinsong Han and
Han Ding and
Chen Qian and
Wei Xi and
Zhi Wang and
Zhiping Jiang and
Longfei Shangguan and
Jizhong Zhao CBID: a Customer Behavior Identification
System Using Passive Tags . . . . . . . 2885--2898
Ulas C. Kozat and
Guanfeng Liang and
Koray Kokten and
Janos Tapolcai On Optimal Topology Verification and
Failure Localization for Software
Defined Networks . . . . . . . . . . . . 2899--2912
Dan Li and
Yirong Yu and
Junxiao Shi and
Beichuan Zhang PALS: Saving Network Power With Low
Overhead to ISPs and Applications . . . 2913--2925
Xiang Wang and
Weiqi Shi and
Yang Xiang and
Jun Li Efficient Network Security Policy
Enforcement With Policy Space Analysis 2926--2938
Sonia A. Bhaskar and
Sonia A. Bhaskar Localization From Connectivity: a
$1$-bit Maximum Likelihood Approach . . 2939--2953
Arpan Chattopadhyay and
Marceau Coupechoux and
Anurag Kumar Sequential Decision Algorithms for
Measurement-Based Impromptu Deployment
of a Wireless Relay Network Along a Line 2954--2968
Yang Song and
Arun Venkataramani and
Lixin Gao Identifying and Addressing Reachability
and Policy Attacks in ``Secure'' BGP . . 2969--2982
Anh Le and
Lorenzo Keller and
Hulya Seferoglu and
Blerim Cici and
Christina Fragouli and
Athina Markopoulou MicroCast: Cooperative Video Streaming
Using Cellular and Local Connections . . 2983--2999
Se-Young Yun and
Jinwoo Shin and
Yung Yi Distributed Medium Access Over
Time-Varying Channels . . . . . . . . . 3000--3013
Theodore Elhourani and
Abishek Gopalan and
Srinivasan Ramasubramanian and
Theodore Elhourani and
Abishek Gopalan and
Srinivasan Ramasubramanian IP Fast Rerouting for Multi-Link
Failures . . . . . . . . . . . . . . . . 3014--3025
Nirmalya Roy and
Archan Misra and
Sajal K. Das and
Christine Julien Determining Quality- and Energy-Aware
Multiple Contexts in Pervasive Computing
Environments . . . . . . . . . . . . . . 3026--3042
Georgios S. Paschos and
Chih-Ping Li and
Eytan Modiano and
Kostas Choumas and
Thanasis Korakis In-Network Congestion Control for
Multirate Multicast . . . . . . . . . . 3043--3055
Salim El Rouayheb and
Sreechakra Goparaju and
Han Mao Kiah and
Olgica Milenkovic Synchronization and Deduplication in
Coded Distributed Storage Networks . . . 3056--3069
Reaz Ahmed and
Faizul Bari and
Shihabur Rahman Chowdhury and
Golam Rabbani and
Raouf Boutaba and
Bertrand Mathieu and
Reaz Ahmed and
Faizul Bari and
Shihabur Rahman Chowdhury and
Golam Rabbani and
Raouf Boutaba and
Bertrand Mathieu $ \alpha $Route: Routing on Names . . . 3070--3083
Richard T. B. Ma Usage-Based Pricing and Competition in
Congestible Network Service Markets . . 3084--3097
Yuanqing Zheng and
Mo Li and
Yuanqing Zheng and
Mo Li Read Bulk Data From Computational RFIDs 3098--3108
Zhangyu Guan and
G. Enrico Santagati and
Tommaso Melodia Distributed Algorithms for Joint Channel
Access and Rate Control in Ultrasonic
Intra-Body Networks . . . . . . . . . . 3109--3122
Lin Chen and
Wei Wang and
Hua Huang and
Shan Lin and
Lin Chen and
Wei Wang and
Hua Huang and
Shan Lin On Time-Constrained Data Harvesting in
Wireless Sensor Networks: Approximation
Algorithm Design . . . . . . . . . . . . 3123--3135
Virag Shah and
Gustavo de Veciana and
George Kesidis A Stable Approach for Routing Queries in
Unstructured P2P Networks . . . . . . . 3136--3147
Lin Chen and
Kaigui Bian and
Meng Zheng Never Live Without Neighbors: From
Single- to Multi-Channel Neighbor
Discovery for Mobile Sensing
Applications . . . . . . . . . . . . . . 3148--3161
Yi Xie and
Yu Wang and
Haitao He and
Yang Xiang and
Shunzheng Yu and
Xincheng Liu A General Collaborative Framework for
Modeling and Perceiving Distributed
Network Behavior . . . . . . . . . . . . 3162--3176
Jia Liu and
Min Chen and
Bin Xiao and
Feng Zhu and
Shigang Chen and
Lijun Chen Efficient RFID Grouping Protocols . . . 3177--3190
DaeHun Nyang and
DongOh Shin Recyclable Counter With Confinement for
Real-Time Per-Flow Measurement . . . . . 3191--3203
Kundan Kandhway and
Joy Kuri Optimal Resource Allocation Over Time
and Degree Classes for Maximizing
Information Dissemination in Social
Networks . . . . . . . . . . . . . . . . 3204--3217
Sara Ayoubi and
Yiheng Chen and
Chadi Assi Towards Promoting Backup-Sharing in
Survivable Virtual Network Design . . . 3218--3231
Huiyuan Zhang and
Dung T. Nguyen and
Soham Das and
Huiling Zhang and
My T. Thai Corrections to ``Least Cost Influence
Maximization Across Multiple Social
Networks'' [Apr 16 929--939] . . . . . . 3232--3232
Wei Wang and
Qian Zhang Privacy Preservation for Context Sensing
on Smartphone . . . . . . . . . . . . . 3235--3247
Benjamin Baron and
Promethee Spathis and
Herve Rivano and
Marcelo Dias de Amorim Offloading Massive Data Onto Passenger
Vehicles: Topology Simplification and
Traffic Assignment . . . . . . . . . . . 3248--3261
Yehuda Afek and
Anat Bremler-Barr and
Yotam Harchol and
David Hay and
Yaron Koral Making DPI Engines Resilient to
Algorithmic Complexity Attacks . . . . . 3262--3275
Xinlei Wang and
Amit Pande and
Jindan Zhu and
Prasant Mohapatra STAMP: Enabling Privacy-Preserving
Location Proofs for Mobile Users . . . . 3276--3289
Le Zhang and
Shahrokh Valaee Congestion Control for Vehicular
Networks With Safety-Awareness . . . . . 3290--3299
Wenping Liu and
Tianping Deng and
Yang and
Hongbo Jiang and
Xiaofei Liao and
Jiangchuan Liu and
Bo Li and
Guoyin Jiang Towards Robust Surface Skeleton
Extraction and Its Applications in $3$D
Wireless Sensor Networks . . . . . . . . 3300--3313
Wei Gong and
Haoxiang Liu and
Xin Miao and
Kebin Liu and
Wenbo He and
Lan Zhang and
Yunhao Liu Fast and Adaptive Continuous Scanning in
Large-Scale RFID Systems . . . . . . . . 3314--3325
Yan Qiao and
Shigang Chen and
Zhen Mo and
Myungkeun Yoon When Bloom Filters Are No Longer
Compact: Multi-Set Membership Lookup for
Network Applications . . . . . . . . . . 3326--3339
Huazi Zhang and
Kairan Sun and
Qiuyuan Huang and
Yonggang Wen and
Dapeng Wu FUN Coding: Design and Analysis . . . . 3340--3353
Pavlos Sermpezis and
Thrasyvoulos Spyropoulos Effects of Content Popularity on the
Performance of Content-Centric
Opportunistic Networking: an Analytical
Approach and Applications . . . . . . . 3354--3368
Endadul Hoque and
Hyojeong Lee and
Rahul Potharaju and
Charles Killian and
Cristina Nita-Rotaru Automated Adversarial Testing of
Unmodified Wireless Routing
Implementations . . . . . . . . . . . . 3369--3382
Osman Yagan and
Armand M. Makowski Wireless Sensor Networks Under the
Random Pairwise Key Predistribution
Scheme: Can Resiliency Be Achieved With
Small Key Rings? . . . . . . . . . . . . 3383--3396
Dongmyoung Kim and
Taejun Park and
Seongwon Kim and
Hyoil Kim and
Sunghyun Choi Load Balancing in Two-Tier Cellular
Networks With Open and Hybrid Access
Femtocells . . . . . . . . . . . . . . . 3397--3411
Tal Mizrahi and
Efi Saat and
Yoram Moses Timed Consistent Network Updates in
Software-Defined Networks . . . . . . . 3412--3425
Jiliang Wang and
Shuo Lian and
Wei Dong and
Xiang-Yang Li and
Yunhao Liu Every Packet Counts: Loss and Reordering
Identification and Its Application in
Delay Measurement . . . . . . . . . . . 3426--3438
Wenping Liu and
Hongbo Jiang and
Jiangchuan Liu and
Xiaofei Liao and
Hongzhi Lin and
Tianping Deng On the Distance-Sensitive and
Load-Balanced Information Storage and
Retrieval for $3$D Sensor Networks . . . 3439--3449
Bong-Hwan Oh and
Jaiyong Lee Feedback-Based Path Failure Detection
and Buffer Blocking Protection for MPTCP 3450--3461
Joao Luis Sobrinho and
Laurent Vanbever and
Franck Le and
Andre Sousa and
Jennifer Rexford Scaling the Internet Routing System
Through Distributed Route Aggregation 3462--3476
Muhammad Shahzad and
Alex X. Liu Accurate and Efficient Per-Flow Latency
Measurement Without Probing and Time
Stamping . . . . . . . . . . . . . . . . 3477--3492
Gideon Blocq and
Ariel Orda How Good is Bargained Routing? . . . . . 3493--3507
Xin Sun and
Geoffrey G. Xie An Integrated Systematic Approach to
Designing Enterprise Access Control . . 3508--3522
Shouling Ji and
Weiqing Li and
Mudhakar Srivatsa and
Raheem Beyah Structural Data De-Anonymization: Theory
and Practice . . . . . . . . . . . . . . 3523--3536
Ming Zhu and
Dan Li and
Fangxin Wang and
Anke Li and
K. K. Ramakrishnan and
Ying Liu and
Jianping Wu and
Nan Zhu and
Xue Liu CCDN: Content-Centric Data Center
Networks . . . . . . . . . . . . . . . . 3537--3550
Saiyu Qi and
Yuanqing Zheng and
Mo Li and
Yunhao Liu and
Jinli Qiu Scalable Industry Data Access Control in
RFID-Enabled Supply Chain . . . . . . . 3551--3564
Bing Hu and
Kwan L. Yeung and
Qian Zhou and
Chunzhi He On Iterative Scheduling for Input-Queued
Switches With a Speedup of $ 2 - 1 / N $ 3565--3577
Emile Archambault and
Nabih Alloune and
Marija Furdek and
Zhenyu Xu and
Christine Tremblay and
Ajmal Muhammad and
Jiajia Chen and
Lena Wosinska and
Paul Littlewood and
Michel P. Belanger Routing and Spectrum Assignment in
Elastic Filterless Optical Networks . . 3578--3592
Xu Chen and
Xiaowen Gong and
Lei Yang and
Junshan Zhang Exploiting Social Tie Structure for
Cooperative Wireless Networking: a
Social Group Utility Maximization
Framework . . . . . . . . . . . . . . . 3593--3606
Qing Wang and
Domenico Giustiniano Intra-Frame Bidirectional Transmission
in Networks of Visible LEDs . . . . . . 3607--3619
Zhao Zhang and
James Willson and
Zaixin Lu and
Weili Wu and
Xuding Zhu and
Ding-Zhu Du Approximating Maximum Lifetime
$k$-Coverage Through Minimizing Weighted
$k$-Cover in Homogeneous Wireless Sensor
Networks . . . . . . . . . . . . . . . . 3620--3633
Di Wu and
Qiang Liu and
Yong Li and
Julie A. McCann and
Amelia C. Regan and
Nalini Venkatasubramanian Adaptive Lookup of Open WiFi Using
Crowdsensing . . . . . . . . . . . . . . 3634--3647
Long Gong and
Huihui Jiang and
Yixiang Wang and
Zuqing Zhu Novel Location-Constrained Virtual
Network Embedding LC-VNE Algorithms
Towards Integrated Node and Link Mapping 3648--3661
Simon Oya and
Fernando Perez-Gonzalez and
Carmela Troncoso Design of Pool Mixes Against Profiling
Attacks in Real Conditions . . . . . . . 3662--3675
Long Cheng and
Jianwei Niu and
Yu Gu and
Chengwen Luo and
Tian He Achieving Efficient Reliable Flooding in
Low-Duty-Cycle Wireless Sensor Networks 3676--3689
Valentino Pacifici and
Gyorgy Dan Coordinated Selfish Distributed Caching
for Peering Content-Centric Networks . . 3690--3701
Agostinho Agra and
Amaro de Sousa and
Mahdi Doostmohammadi The Minimum Cost Design of Transparent
Optical Networks Combining Grooming,
Routing, and Wavelength Assignment . . . 3702--3713
Chi-Kin Chau and
Majid Khonji and
Muhammad Aftab Online Algorithms for Information
Aggregation From Distributed and
Correlated Sources . . . . . . . . . . . 3714--3725
Victor Berrocal-Plaza and
Miguel A. Vega-Rodriguez and
Juan M. Sanchez-Perez An Efficient Way of Assigning Paging
Areas by Using Mobility Models . . . . . 3726--3739
Zhenhua Li and
Zhiyang Guo and
Yuanyuan Yang BCCC: an Expandable Network for Data
Centers . . . . . . . . . . . . . . . . 3740--3755
Carla-Fabiana Chiasserini and
Michele Garetto and
Emilio Leonardi Social Network De-Anonymization Under
Scale-Free User Relations . . . . . . . 3756--3769
Muhammad Shahzad and
Alex X. Liu Fast and Reliable Detection and
Identification of Missing RFID Tags in
the Wild . . . . . . . . . . . . . . . . 3770--3784
Wan-Seon Lim and
Kang G. Shin POEM: Minimizing Energy Consumption for
WiFi Tethering Service . . . . . . . . . 3785--3797
Jungseul Ok and
Youngmi Jin and
Jinwoo Shin and
Yung Yi On Maximizing Diffusion Speed Over
Social Networks With Strategic Users . . 3798--3811
Maialen Larrnaaga and
Urtzi Ayesta and
Ina Maria Verloop Dynamic Control of Birth-and-Death
Restless Bandits: Application to
Resource-Allocation Problems . . . . . . 3812--3825
Varun Gupta and
Yigal Bejerano and
Craig Gutterman and
Jaime Ferragut and
Katherine Guo and
Thyaga Nandagopal and
Gil Zussman Light-Weight Feedback Mechanism for WiFi
Multicast to Very Large Groups ---
Experimental Evaluation . . . . . . . . 3826--3840
Li Yan and
Haiying Shen and
Kang Chen TSearch: Target-Oriented Low-Delay Node
Searching in DTNs With Social Network
Properties . . . . . . . . . . . . . . . 3841--3855
Tiantian Zhu and
Hongyu Gao and
Yi Yang and
Kai Bu and
Yan Chen and
Doug Downey and
Kathy Lee and
Alok N. Choudhary Beating the Artificial Chaos: Fighting
OSN Spam Using Its Own Templates . . . . 3856--3869
Jian Li and
Rajarshi Bhattacharyya and
Suman Paul and
Srinivas Shakkottai and
Vijay Subramanian Incentivizing Sharing in Realtime D2D
Streaming Networks: a Mean Field Game
Perspective . . . . . . . . . . . . . . 3--17
Wei Wang and
Bei Liu and
Donghyun Kim and
Deying Li and
Jingyi Wang and
Wei Gao A New Constant Factor Approximation to
Construct Highly Fault-Tolerant
Connected Dominating Set in Unit Disk
Graph . . . . . . . . . . . . . . . . . 18--28
Longbo Huang The Value-of-Information in Matching
With Queues . . . . . . . . . . . . . . 29--42
Zhuo Lu and
Cliff Wang Enabling Network Anti-Inference via
Proactive Strategies: a Fundamental
Perspective . . . . . . . . . . . . . . 43--55
Joe Kornycky and
Omar Abdul-Hameed and
Ahmet Kondoz and
Brian C. Barber Radio Frequency Traffic Classification
Over WLAN . . . . . . . . . . . . . . . 56--68
Zhenjiang Li and
Wan Du and
Yuanqing Zheng and
Mo Li and
Dapeng Wu From Rateless to Hopless . . . . . . . . 69--82
Mays F. Al-Naday and
Nikolaos Thomos and
Martin J. Reed Information-Centric Multilayer
Networking: Improving Performance
Through an ICN/WDM Architecture . . . . 83--97
Ashwin Pananjady and
Vivek Kumar Bagaria and
Rahul Vaze Optimally Approximating the Coverage
Lifetime of Wireless Sensor Networks . . 98--111
Guangmo Tong and
Weili Wu and
Shaojie Tang and
Ding-Zhu Du Adaptive Influence Maximization in
Dynamic Social Networks . . . . . . . . 112--125
Neshat Etemadi Rad and
Yariv Ephraim and
Brian L. Mark Delay Network Tomography Using a
Partially Observable Bivariate Markov
Chain . . . . . . . . . . . . . . . . . 126--138
Jose Yallouz and
Ariel Orda Tunable QoS-Aware Network Survivability 139--149
Joao Luis Sobrinho Correctness of Routing Vector Protocols
as a Property of Network Cycles . . . . 150--163
Sharayu Moharir and
Subhashini Krishnasamy and
Sanjay Shakkottai Scheduling in Densified Networks:
Algorithms and Performance . . . . . . . 164--178
An Liu and
Vincent K. N. Lau How Much Cache is Needed to Achieve
Linear Capacity Scaling in
Backhaul-Limited Dense Wireless
Networks? . . . . . . . . . . . . . . . 179--188
Adiseshu Hari and
Urs Niesen and
Gordon Wilfong On the Problem of Optimal Path Encoding
for Software-Defined Networks . . . . . 189--198
Zizhong Cao and
Paul Claisse and
Rene-Jean Essiambre and
Murali Kodialam and
T. V. Lakshman Optimizing Throughput in Optical
Networks: The Joint Routing and Power
Control Problem . . . . . . . . . . . . 199--209
Wei Dong and
Yi Gao and
Wenbin Wu and
Jiajun Bu and
Chun Chen and
Xiang-Yang Li Optimal Monitor Assignment for
Preferential Link Tomography in
Communication Networks . . . . . . . . . 210--223
Xiulong Liu and
Bin Xiao and
Keqiu Li and
Alex X. Liu and
Jie Wu and
Xin Xie and
Heng Qi RFID Estimation With Blocker Tags . . . 224--237
Fang Hao and
Murali Kodialam and
T. V. Lakshman and
Sarit Mukherjee Online Allocation of Virtual Machines in
a Distributed Cloud . . . . . . . . . . 238--249
Christina Vlachou and
Albert Banchs and
Julien Herzen and
Patrick Thiran How CSMA/CA With Deferral Affects
Performance and Dynamics in Power-Line
Communications . . . . . . . . . . . . . 250--263
Xiulong Liu and
Keqiu Li and
Alex X. Liu and
Song Guo and
Muhammad Shahzad and
Ann L. Wang and
Jie Wu Multi-Category RFID Estimation . . . . . 264--277
Xiulong Liu and
Xin Xie and
Keqiu Li and
Bin Xiao and
Jie Wu and
Heng Qi and
Dawei Lu Fast Tracking the Population of Key Tags
in Large-Scale Anonymous RFID Systems 278--291
Jelena Marasevic and
Jin Zhou and
Harish Krishnaswamy and
Yuan Zhong and
Gil Zussman Resource Allocation and Rate Gains in
Practical Full-Duplex Systems . . . . . 292--305
Rebecca Lovewell and
Qianwen Yin and
Tianrong Zhang and
Jasleen Kaur and
Frank Donelson Smith Packet-Scale Congestion Control Paradigm 306--319
Ali Munir and
Ghufran Baig and
Syed Mohammad Irteza and
Ihsan Ayyub Qazi and
Alex X. Liu and
Fahad Rafique Dogar PASE: Synthesizing Existing Transport
Strategies for Near-Optimal Data Center
Transport . . . . . . . . . . . . . . . 320--334
Changhyun Lee and
Chunjong Park and
Keon Jang and
Sue Moon and
Dongsu Han DX: Latency-Based Congestion Control for
Datacenters . . . . . . . . . . . . . . 335--348
Stefano D'Aronco and
Laura Toni and
Sergio Mena and
Xiaoqing Zhu and
Pascal Frossard Improved Utility-Based Congestion
Control for Delay-Constrained
Communication . . . . . . . . . . . . . 349--362
Xiaoyong Li and
Daren B. H. Cline and
Dmitri Loguinov Temporal Update Dynamics Under Blind
Sampling . . . . . . . . . . . . . . . . 363--376
Abhishek Sinha and
Georgios Paschos and
Chih-Ping Li and
Eytan Modiano Throughput-Optimal Multihop Broadcast on
Directed Acyclic Wireless Networks . . . 377--391
Qingjun Xiao and
Bin Xiao and
Shigang Chen and
Jiming Chen Collision-Aware Churn Estimation in
Large-Scale Dynamic RFID Systems . . . . 392--405
Alireza Keshavarz-Haddad and
Ehsan Aryafar and
Michael Wang and
Mung Chiang HetNets Selection by Clients:
Convergence, Efficiency, and
Practicality . . . . . . . . . . . . . . 406--419
V. Sriram Siddhardh Nadendla and
Swastik K. Brahma and
Pramod K. Varshney Optimal Spectrum Auction Design With
$2$-D Truthful Revelations Under
Uncertain Spectrum Availability . . . . 420--433
Liang Ma and
Ting He and
Ananthram Swami and
Don Towsley and
Kin K. Leung Network Capability in Localizing Node
Failures via End-to-End Path
Measurements . . . . . . . . . . . . . . 434--450
Yongquan Fu and
Xu Xiaoping Self-Stabilized Distributed Network
Distance Prediction . . . . . . . . . . 451--464
Wei-Cheng Kuo and
Chih-Chun Wang Robust and Optimal Opportunistic
Scheduling for Downlink Two-Flow Network
Coding With Varying Channel Quality and
Rate Adaptation . . . . . . . . . . . . 465--479
Yi Gao and
Wei Dong and
Chun Chen and
Xiaoyu Zhang and
Jiajun Bu and
Xue Liu Accurate Per-Packet Delay Tomography in
Wireless Ad Hoc Networks . . . . . . . . 480--491
Luis Sanabria-Russo and
Jaume Barcelo and
Boris Bellalta and
Francesco Gringoli A High Efficiency MAC Protocol for
WLANs: Providing Fairness in Dense
Scenarios . . . . . . . . . . . . . . . 492--505
Fangming Liu and
Jian Guo and
Xiaomeng Huang and
John C. S. Lui eBA: Efficient Bandwidth Guarantee Under
Traffic Variability in Datacenters . . . 506--519
Hao Zhou and
Yusheng Ji and
Xiaoyan Wang and
Shigeki Yamada eICIC Configuration Algorithm with
Service Scalability in Heterogeneous
Cellular Networks . . . . . . . . . . . 520--535
Xu Chen and
Xiaowen Gong and
Lei Yang and
Junshan Zhang Amazon in the White Space: Social
Recommendation Aided Distributed
Spectrum Access . . . . . . . . . . . . 536--549
Fidan Mehmeti and
Thrasyvoulos Spyropoulos Performance Modeling, Analysis, and
Optimization of Delayed Mobile Data
Offloading for Mobile Users . . . . . . 550--564
Wei Koong Chai and
George Pavlou Path-Based Epidemic Spreading in
Networks . . . . . . . . . . . . . . . . 565--578
Hong Zhang and
Kai Chen and
Wei Bai and
Dongsu Han and
Chen Tian and
Hao Wang and
Haibing Guan and
Ming Zhang Guaranteeing Deadlines for Inter-Data
Center Transfers . . . . . . . . . . . . 579--595
Longfei Shangguan and
Zheng Yang and
Alex X. Liu and
Zimu Zhou and
Yunhao Liu STPP: Spatial-Temporal Phase
Profiling-Based Method for Relative RFID
Tag Localization . . . . . . . . . . . . 596--609
Giorgos Vasiliadis and
Lazaros Koromilas and
Michalis Polychronakis and
Sotiris Ioannidis Design and Implementation of a Stateful
Network Packet Processing Framework for
GPUs . . . . . . . . . . . . . . . . . . 610--623
Xiaohang Li and
Chih-Chun Wang and
Xiaojun Lin Inter-Session Network Coding Schemes for
$1$-to-$2$ Downlink Access-Point
Networks With Sequential Hard Deadline
Constraints . . . . . . . . . . . . . . 624--638
YoungGyoun Moon and
Donghwi Kim and
Younghwan Go and
Yeongjin Kim and
Yung Yi and
Song Chong and
KyoungSoo Park Cedos: a Network Architecture and
Programming Abstraction for
Delay-Tolerant Mobile Apps . . . . . . . 646--661
Qiaomin Xie and
Mayank Pundir and
Yi Lu and
Cristina L. Abad and
Roy H. Campbell Pandas: Robust Locality-Aware Scheduling
With Stochastic Delay Optimality . . . . 662--675
Anh Le and
Arash Saber Tehrani and
Alexandros Dimakis and
Athina Markopoulou Recovery of Packet Losses in Wireless
Broadcast for Real-Time Applications . . 676--689
Hamzeh Beyranvand and
Martin Levesque and
Martin Maier and
Jawad A. Salehi and
Christos Verikoukis and
David Tipper Toward 5G: FiWi Enhanced LTE-A HetNets
With Reliable Low-Latency Fiber Backhaul
Sharing and WiFi Offloading . . . . . . 690--707
Shaoquan Zhang and
Longbo Huang and
Minghua Chen and
Xin Liu Proactive Serving Decreases User Delay
Exponentially: The Light-Tailed Service
Time Case . . . . . . . . . . . . . . . 708--723
Rui Zhu and
Bang Liu and
Di Niu and
Zongpeng Li and
Hong Vicky Zhao Network Latency Estimation for Personal
Devices: a Matrix Completion Approach 724--737
Roland van Rijswijk-Deij and
Kaspar Hageman and
Anna Sperotto and
Aiko Pras The Performance Impact of Elliptic Curve
Cryptography on DNSSEC Validation . . . 738--750
Luoyi Fu and
Xinbing Wang and
P. R. Kumar Are We Connected? Optimal Determination
of Source--Destination Connectivity in
Random Networks . . . . . . . . . . . . 751--764
Benny Van Houdt Explicit Back-Off Rates for Achieving
Target Throughputs in CSMA/CA Networks 765--778
Marco Chiesa and
Guy Kindler and
Michael Schapira Traffic Engineering With
Equal-Cost-MultiPath: an Algorithmic
Perspective . . . . . . . . . . . . . . 779--792
Ruiting Zhou and
Zongpeng Li and
Chuan Wu and
Zhiyi Huang An Efficient Cloud Market Mechanism for
Computing Jobs With Soft Deadlines . . . 793--805
Fangfang Yan and
Tony T. Lee and
Weisheng Hu Congestion-Aware Embedding of
Heterogeneous Bandwidth Virtual Data
Centers With Hose Model Abstraction . . 806--819
Wan Du and
Jansen Christian Liando and
Huanle Zhang and
Mo Li Pando: Fountain-Enabled Fast Data
Dissemination With Constructive
Interference . . . . . . . . . . . . . . 820--833
Ronghui Hou and
Yu Cheng and
Jiandong Li and
Min Sheng and
King-Shan Lui Capacity of Hybrid Wireless Networks
With Long-Range Social Contacts Behavior 834--848
Tal Mizrahi and
Ori Rottenstreich and
Yoram Moses TimeFlip: Using Timestamp-Based TCAM
Ranges to Accurately Schedule Network
Updates . . . . . . . . . . . . . . . . 849--863
Ori Rottenstreich and
Janos Tapolcai Optimal Rule Caching and Lossy
Compression for Longest Prefix Matching 864--878
Tong Ye and
Jinghui Zhang and
Tony T. Lee and
Weisheng Hu Deflection-Compensated
Birkhoff--von-Neumann Switches . . . . . 879--895
Liansheng Tan and
Shengda Tang Energy Harvesting Wireless Sensor Node
With Temporal Death: Novel Models and
Analyses . . . . . . . . . . . . . . . . 896--909
Shailendra Singh and
Karthikeyan Sundaresan and
Srikanth V. Krishnamurthy and
Xinyu Zhang and
Mohammad Ali Amir Khojastepour and
Sampath Rangarajan TRINITY: Tailoring Wireless Transmission
Strategies to User Profiles in
Enterprise Wireless Networks . . . . . . 910--924
Yishuo Shi and
Zhao Zhang and
Yuchang Mo and
Ding-Zhu Du Approximation Algorithm for Minimum
Weight Fault-Tolerant Virtual Backbone
in Unit Disk Graphs . . . . . . . . . . 925--933
Jie Cheng and
Yaning Liu and
Qiang Ye and
Hongwei Du and
Athanasios V. Vasilakos DISCS: a Distributed Coordinate System
Based on Robust Nonnegative Matrix
Completion . . . . . . . . . . . . . . . 934--947
Zhiwei Zhao and
Wei Dong and
Jiajun Bu and
Tao Gu and
Geyong Min Accurate and Generic Sender Selection
for Bulk Data Dissemination in Low-Power
Wireless Networks . . . . . . . . . . . 948--959
G. Enrico Santagati and
Tommaso Melodia A Software-Defined Ultrasonic Networking
Framework for Wearable Devices . . . . . 960--973
Amitava Datta Construction of Polynomial-Size Optical
Priority Queues Using Linear Switches
and Fiber Delay Lines . . . . . . . . . 974--987
Tuan Dao and
Amit K. Roy-Chowdhury and
Harsha V. Madhyastha and
Srikanth V. Krishnamurthy and
Tom La Porta Managing Redundant Content in Bandwidth
Constrained Wireless Networks . . . . . 988--1003
Lorenzo Ferrari and
Anna Scaglione and
Reinhard Gentz and
Yao-Win Peter Hong Convergence Results on Pulse Coupled
Oscillator Protocols in Locally
Connected Networks . . . . . . . . . . . 1004--1019
Santosh Chavan and
Nizar Malangadan and
Gaurav Raina TCP With Virtual Queue Management
Policies: Stability and Bifurcation
Analysis . . . . . . . . . . . . . . . . 1020--1033
Xiaoxi Zhang and
Zhiyi Huang and
Chuan Wu and
Zongpeng Li and
Francis C. M. Lau Online Auctions in IaaS Clouds: Welfare
and Profit Maximization With Server
Costs . . . . . . . . . . . . . . . . . 1034--1047
Serdar Vural and
Ning Wang and
Pirabakaran Navaratnam and
Rahim Tafazolli Caching Transient Data in Internet
Content Routers . . . . . . . . . . . . 1048--1061
Kianoosh Mokhtarian and
Hans-Arno Jacobsen Flexible Caching Algorithms for Video
Content Distribution Networks . . . . . 1062--1075
Bahar Partov and
Douglas J. Leith Utility Fair Rate Allocation in
LTE/802.11 Networks . . . . . . . . . . 1076--1088
Daniel Posch and
Benjamin Rainer and
Hermann Hellwagner SAF: Stochastic Adaptive Forwarding in
Named Data Networking . . . . . . . . . 1089--1102
Jingjing Luo and
Jinbei Zhang and
Ying Cui and
Li Yu and
Xinbing Wang Asymptotic Analysis on Content Placement
and Retrieval in MANETs . . . . . . . . 1103--1118
Alvaro Fernandez and
Norvald Stol Economic, Dissatisfaction, and
Reputation Risks of Hardware and
Software Failures in PONs . . . . . . . 1119--1132
Marco Chiesa and
Ilya Nikolaevskiy and
Slobodan Mitrovic and
Andrei Gurtov and
Aleksander Madry and
Michael Schapira and
Scott Shenker On the Resiliency of Static Forwarding
Tables . . . . . . . . . . . . . . . . . 1133--1146
Fengli Xu and
Yong Li and
Huandong Wang and
Pengyu Zhang and
Depeng Jin Understanding Mobile Traffic Patterns of
Large Scale Cellular Towers in Urban
Environment . . . . . . . . . . . . . . 1147--1161
Omid Javidbakht and
Parv Venkitasubramaniam Delay Anonymity Tradeoff in Mix
Networks: Optimal Routing . . . . . . . 1162--1175
Kang Chen and
Haiying Shen FaceChange: Attaining Neighbor Node
Anonymity in Mobile Opportunistic Social
Networks With Fine-Grained Control . . . 1176--1189
Lailong Luo and
Deke Guo and
Jie Wu and
Ori Rottenstreich and
Qian He and
Yudong Qin and
Xueshan Luo Efficient Multiset Synchronization . . . 1190--1205
Moreno Ambrosin and
Mauro Conti and
Fabio De Gaspari and
Radha Poovendran LineSwitch: Tackling Control Plane
Saturation Attacks in Software-Defined
Networking . . . . . . . . . . . . . . . 1206--1219
Zuqing Zhu and
Xiahe Liu and
Yixiang Wang and
Wei Lu and
Long Gong and
Shui Yu and
Nirwan Ansari Impairment- and Splitting-Aware
Cloud-Ready Multicast Provisioning in
Elastic Optical Networks . . . . . . . . 1220--1234
Huichen Dai and
Jianyuan Lu and
Yi Wang and
Tian Pan and
Bin Liu BFAST: High-Speed and Memory-Efficient
Approach for NDN Forwarding Engine . . . 1235--1248
Min Chen and
Shigang Chen and
Zhiping Cai Counter Tree: a Scalable Counter
Architecture for Per-Flow Traffic
Measurement . . . . . . . . . . . . . . 1249--1262
Brigitte Jaumard and
Maryam Daryalal Efficient Spectrum Utilization in Large
Scale RWA Problems . . . . . . . . . . . 1263--1278
Kangwook Lee and
Ramtin Pedarsani and
Kannan Ramchandran On Scheduling Redundant Requests With
Cancellation Overheads . . . . . . . . . 1279--1290
Niv Voskoboynik and
Haim H. Permuter and
Asaf Cohen Network Coding Schemes for Data Exchange
Networks With Arbitrary Transmission
Delays . . . . . . . . . . . . . . . . . 1293--1309
Salvatore D'Oro and
Eylem Ekici and
Sergio Palazzo Optimal Power Allocation and Scheduling
Under Jamming Attacks . . . . . . . . . 1310--1323
Runtian Ren and
Xueyan Tang and
Yusen Li and
Wentong Cai Competitiveness of Dynamic Bin Packing
for Online Cloud Server Allocation . . . 1324--1331
Ori Rottenstreich and
Mario Di Francesco and
Yoram Revah Perfectly Periodic Scheduling of
Collective Data Streams . . . . . . . . 1332--1346
Wei Gong and
Jiangchuan Liu and
Kebin Liu and
Yunhao Liu Toward More Rigorous and Practical
Cardinality Estimation for Large-Scale
RFID Systems . . . . . . . . . . . . . . 1347--1358
George Iosifidis and
Iordanis Koutsopoulos and
Georgios Smaragdakis Distributed Storage Control Algorithms
for Dynamic Networks . . . . . . . . . . 1359--1372
Hassan Habibi Gharakheili and
Vijay Sivaraman and
Tim Moors and
Arun Vishwanath and
John Matthews and
Craig Russell Enabling Fast and Slow Lanes for Content
Providers Using Software Defined
Networking . . . . . . . . . . . . . . . 1373--1385
George Iosifidis and
Lin Gao and
Jianwei Huang and
Leandros Tassiulas Efficient and Fair Collaborative Mobile
Internet Access . . . . . . . . . . . . 1386--1400
Shu Wang and
Vignesh Venkateswaran and
Xinyu Zhang Fundamental Analysis of Full-Duplex
Gains in Wireless Networks . . . . . . . 1401--1416
Paolo Di Francesco and
Jacek Kibilda and
Francesco Malandrino and
Nicholas J. Kaminski and
Luiz A. DaSilva Sensitivity Analysis on Service-Driven
Network Planning . . . . . . . . . . . . 1417--1430
Zizhong Cao and
Shivendra S. Panwar and
Murali Kodialam and
T. V. Lakshman Enhancing Mobile Networks With Software
Defined Networking and Cloud Computing 1431--1444
You-Chiun Wang and
Tzung-Yu Tsai A Pricing-Aware Resource Scheduling
Framework for LTE Networks . . . . . . . 1445--1458
Tuan A. Dao and
Indrajeet Singh and
Harsha V. Madhyastha and
Srikanth V. Krishnamurthy and
Guohong Cao and
Prasant Mohapatra TIDE: a User-Centric Tool for
Identifying Energy Hungry Applications
on Smartphones . . . . . . . . . . . . . 1459--1474
Min Chen and
Shigang Chen and
Yuguang Fang Lightweight Anonymous Authentication
Protocols for RFID Systems . . . . . . . 1475--1488
Faycal Ait Aoudia and
Matthieu Gautier and
Michele Magno and
Olivier Berder and
Luca Benini A Generic Framework for Modeling MAC
Protocols in Wireless Sensor Networks 1489--1500
Sukanya Bhowmik and
Muhammad Adnan Tariq and
Boris Koldehofe and
Frank Durr and
Thomas Kohler and
Kurt Rothermel High Performance Publish\slash Subscribe
Middleware in Software-Defined Networks 1501--1516
Amir Houmansadr and
Wenxuan Zhou and
Matthew Caesar and
Nikita Borisov SWEET: Serving the Web by Exploiting
Email Tunnels . . . . . . . . . . . . . 1517--1527
Wenzhuo Ouyang and
Jingwen Bai and
Ashutosh Sabharwal Leveraging One-Hop Information in
Massive MIMO Full-Duplex Wireless
Systems . . . . . . . . . . . . . . . . 1528--1539
Nikolaos Papanikos and
Evangelos Papapetrou Deterministic Broadcasting and Random
Linear Network Coding in Mobile Ad Hoc
Networks . . . . . . . . . . . . . . . . 1540--1554
Chang-Heng Wang and
Tara Javidi Adaptive Policies for Scheduling With
Reconfiguration Delay: an End-to-End
Solution for All-Optical Data Centers 1555--1568
Jiajue Ou and
Mo Li and
Yuanqing Zheng Come and Be Served: Parallel Decoding
for COTS RFID Tags . . . . . . . . . . . 1569--1581
Paul Tune and
Matthew Roughan Controlled Synthesis of Traffic Matrices 1582--1592
Eva Papadogiannaki and
Lazaros Koromilas and
Giorgos Vasiliadis and
Sotiris Ioannidis Efficient Software Packet Processing on
Heterogeneous and Asymmetric Hardware
Architectures . . . . . . . . . . . . . 1593--1606
Min Chen and
Shigang Chen and
You Zhou and
Youlin Zhang Identifying State-Free Networked Tags 1607--1620
Bhushan Kotnis and
Albert Sunny and
Joy Kuri Incentivized Campaigning in Social
Networks . . . . . . . . . . . . . . . . 1621--1634
Mostafa Dehghan and
Bo Jiang and
Anand Seetharam and
Ting He and
Theodoros Salonidis and
Jim Kurose and
Don Towsley and
Ramesh Sitaraman On the Complexity of Optimal Request
Routing and Content Caching in
Heterogeneous Cache Networks . . . . . . 1635--1648
Stefano Vissicchio and
Laurent Vanbever and
Luca Cittadini and
Geoffrey G. Xie and
Olivier Bonaventure Safe Update of Hybrid SDN Networks . . . 1649--1662
Wei Wang and
Yingjie Chen and
Lu Wang and
Qian Zhang Sampleless Wi-Fi: Bringing Low Power to
Wi-Fi Communications . . . . . . . . . . 1663--1672
Zhili Zhou and
Tachun Lin and
Krishnaiyan Thulasiraman and
Guoliang Xue Novel Survivable Logical Topology
Routing by Logical Protecting Spanning
Trees in IP-Over-WDM Networks . . . . . 1673--1685
Fan Wu and
Dongxin Liu and
Zhihao Wu and
Yuan Zhang and
Guihai Chen Cost-Efficient Indoor White Space
Exploration Through Compressive Sensing 1686--1702
Xiaowen Gong and
Xu Chen and
Kai Xing and
Dong-Hoon Shin and
Mengyuan Zhang and
Junshan Zhang From Social Group Utility Maximization
to Personalized Location Privacy in
Mobile Networks . . . . . . . . . . . . 1703--1716
Seydou Ba and
Bijoy Chand Chatterjee and
Eiji Oki Defragmentation Scheme Based on
Exchanging Primary and Backup Paths in $
1 + 1 $ Path Protected Elastic Optical
Networks . . . . . . . . . . . . . . . . 1717--1731
Ting He and
Athanasios Gkelias and
Liang Ma and
Kin K. Leung and
Ananthram Swami and
Don Towsley Robust and Efficient Monitor Placement
for Network Tomography in Dynamic
Networks . . . . . . . . . . . . . . . . 1732--1745
Yong Cui and
Jian Song and
Kui Ren and
Minming Li and
Zongpeng Li and
Qingmei Ren and
Yangjun Zhang Software Defined Cooperative Offloading
for Mobile Cloudlets . . . . . . . . . . 1746--1760
Chuchu Wu and
Mario Gerla and
Mihaela van der Schaar Social Norm Incentives for Network
Coding in Manets . . . . . . . . . . . . 1761--1774
Matthew Johnston and
Eytan Modiano Controller Placement in Wireless
Networks With Delayed CSI . . . . . . . 1775--1788
Jun Zhao Topological Properties of Secure
Wireless Sensor Networks Under the
$q$-Composite Key Predistribution Scheme
With Unreliable Links . . . . . . . . . 1789--1802
Tuo Shi and
Siyao Cheng and
Zhipeng Cai and
Yingshu Li and
Jianzhong Li Exploring Connected Dominating Sets in
Energy Harvest Networks . . . . . . . . 1803--1817
Alberto Ceselli and
Marco Premoli and
Stefano Secci Mobile Edge Cloud Network Design
Optimization . . . . . . . . . . . . . . 1818--1831
Xueqing Huang and
Tao Han and
Nirwan Ansari Smart Grid Enabled Mobile Networks:
Jointly Optimizing BS Operation and
Power Distribution . . . . . . . . . . . 1832--1845
Nanxi Kang and
Ori Rottenstreich and
Sanjay G. Rao and
Jennifer Rexford Alpaca: Compact Network Policies With
Attribute-Encoded Addresses . . . . . . 1846--1860
Hongli Xu and
Xiang-Yang Li and
Liusheng Huang and
Hou Deng and
He Huang and
Haibo Wang Incremental Deployment and Throughput
Maximization Routing for a Hybrid SDN 1861--1875
Shiva Raj Pokhrel and
Manoj Panda and
Hai L. Vu Analytical Modeling of Multipath TCP
Over Last-Mile Wireless . . . . . . . . 1876--1891
Mao Ge and
Tong Ye and
Tony T. Lee and
Weisheng Hu Multicast Routing and Wavelength
Assignment in AWG-Based Clos Networks 1892--1909
Kate Ching-Ju Lin and
Wei-Liang Shen and
Ming-Syan Chen and
Kun Tan User-Centric Network MIMO With Dynamic
Clustering . . . . . . . . . . . . . . . 1910--1923
Luca Chiaraviglio and
Lavinia Amorosi and
Paolo DellOlmo and
William Liu and
Jairo A. Gutierrez and
Antonio Cianfrani and
Marco Polverini and
Esther Le Rouzic and
Marco Listanti Lifetime-Aware ISP Networks: Optimal
Formulation and Solutions . . . . . . . 1924--1937
Guo Chen and
Youjian Zhao and
Hailiang Xu and
Dan Pei and
Dan Li $ {\rm F}^2 $ Tree: Rapid Failure
Recovery for Routing in Production Data
Center Networks . . . . . . . . . . . . 1940--1953
Wei Bai and
Li Chen and
Kai Chen and
Dongsu Han and
Chen Tian and
Hao Wang PIAS: Practical Information-Agnostic
Flow Scheduling for Commodity Data
Centers . . . . . . . . . . . . . . . . 1954--1967
Peruru Subrahmanya Swamy and
Radha Krishna Ganti and
Krishna Jagannathan Adaptive CSMA Under the SINR Model:
Efficient Approximation Algorithms for
Throughput and Utility Maximization . . 1968--1981
Lin Chen and
Yong Li and
Athanasios V. Vasilakos On Oblivious Neighbor Discovery in
Distributed Wireless Networks With
Directional Antennas: Theoretical
Foundation and Algorithm Design . . . . 1982--1993
Liqiong Chang and
Xiaojiang Chen and
Yu Wang and
Dingyi Fang and
Ju Wang and
Tianzhang Xing and
Zhanyong Tang FitLoc: Fine-Grained and Low-Cost
Device-Free Localization for Multiple
Targets Over Various Areas . . . . . . . 1994--2007
Vincenzo Eramo and
Emanuele Miucci and
Mostafa Ammar and
Francesco Giacinto Lavacca An Approach for Service Function Chain
Routing and Virtual Function Network
Instance Migration in Network Function
Virtualization Architectures . . . . . . 2008--2025
Yuben Qu and
Chao Dong and
Haipeng Dai and
Fan Wu and
Shaojie Tang and
Hai Wang and
Chang Tian Multicast in Multihop CRNs Under
Uncertain Spectrum Availability: a
Network Coding Approach . . . . . . . . 2026--2039
Yiming Zhang and
Dongsheng Li and
Chuanxiong Guo and
Haitao Wu and
Yongqiang Xiong and
Xicheng Lu CubicRing: Exploiting Network Proximity
for Distributed In-Memory Key-Value
Store . . . . . . . . . . . . . . . . . 2040--2053
Massimo Monti and
Manolis Sifalakis and
Christian F. Tschudin and
Marco Luise On Hardware Programmable Network
Dynamics With a Chemistry-Inspired
Abstraction . . . . . . . . . . . . . . 2054--2067
Mohammad Hassan Lotfi and
Karthikeyan Sundaresan and
Saswati Sarkar and
Mohammad Ali Khojastepour Economics of Quality Sponsored Data in
Non-Neutral Networks . . . . . . . . . . 2068--2081
Bo Cheng and
Ming Wang and
Shuai Zhao and
Zhongyi Zhai and
Da Zhu and
Junliang Chen Situation-Aware Dynamic Service
Coordination in an IoT Environment . . . 2082--2095
Daibo Liu and
Zhichao Cao and
Yi Zhang and
Mengshu Hou Achieving Accurate and Real-Time Link
Estimation for Low Power Wireless Sensor
Networks . . . . . . . . . . . . . . . . 2096--2109
Haoran Yu and
Man Hon Cheung and
Lin Gao and
Jianwei Huang Public Wi-Fi Monetization via
Advertising . . . . . . . . . . . . . . 2110--2121
Kyuyong Shin and
Carlee Joe-Wong and
Sangtae Ha and
Yung Yi and
Injong Rhee and
Douglas S. Reeves T-Chain: a General Incentive Scheme for
Cooperative Computing . . . . . . . . . 2122--2137
Dongxiao Yu and
Li Ning and
Yifei Zou and
Jiguo Yu and
Xiuzhen Cheng and
Francis C. M. Lau Distributed Spanner Construction With
Physical Interference: Constant Stretch
and Linear Sparseness . . . . . . . . . 2138--2151
Romain Fontugne and
Patrice Abry and
Kensuke Fukuda and
Darryl Veitch and
Kenjiro Cho and
Pierre Borgnat and
Herwig Wendt Scaling in Internet Traffic: a 14 Year
and 3 Day Longitudinal Study, With
Multiscale Analyses and Random
Projections . . . . . . . . . . . . . . 2152--2165
Yang Liu and
Mingyan Liu An Online Learning Approach to Improving
the Quality of Crowd-Sourcing . . . . . 2166--2179
Xiaohan Wei and
Michael J. Neely Data Center Server Provision:
Distributed Asynchronous Control for
Coupled Renewal Systems . . . . . . . . 2180--2194
Li and
Ke Xu and
Dan Wang and
Chunyi Peng and
Kai Zheng and
Rashid Mijumbi and
Qingyang Xiao A Longitudinal Measurement Study of TCP
Performance and Behavior in 3G/4G
Networks Over High Speed Rails . . . . . 2195--2208
Jianan Zhang and
Eytan Modiano and
David Hay Enhancing Network Robustness via
Shielding . . . . . . . . . . . . . . . 2209--2222
Xiaofeng Gao and
Xudong Zhu and
Jun Li and
Fan Wu and
Guihai Chen and
Ding-Zhu Du and
Shaojie Tang A Novel Approximation for Multi-Hop
Connected Clustering Problem in Wireless
Networks . . . . . . . . . . . . . . . . 2223--2234
Novella Bartolini and
Stefano Ciavarella and
Thomas F. La Porta and
Simone Silvestri On Critical Service Recovery After
Massive Network Failures . . . . . . . . 2235--2249
Guiyuan Jiang and
Siew-Kei Lam and
Yidan Sun and
Lijia Tu and
Jigang Wu Joint Charging Tour Planning and Depot
Positioning for Wireless Sensor Networks
Using Mobile Chargers . . . . . . . . . 2250--2266
Fei Gu and
Jianwei Niu and
Lingjie Duan WAIPO: a Fusion-Based Collaborative
Indoor Localization System on
Smartphones . . . . . . . . . . . . . . 2267--2280
Kai Chen and
Xitao Wen and
Xingyu Ma and
Yan Chen and
Yong Xia and
Chengchen Hu and
Qunfeng Dong and
Yongqiang Liu Toward A Scalable, Fault-Tolerant,
High-Performance Optical Data Center
Architecture . . . . . . . . . . . . . . 2281--2294
Gil Einziger and
Roy Friedman TinySet --- An Access Efficient Self
Adjusting Bloom Filter Construction . . 2295--2307
Peter Babarczi and
Janos Tapolcai and
Alija Pasic and
Lajos Ronyai and
Erika R. Berczi-Kovacs and
Muriel Medard Diversity Coding in Two-Connected
Networks . . . . . . . . . . . . . . . . 2308--2319
Chao Wu and
Xu Chen and
Wenwu Zhu and
Yaoxue Zhang Socially-Driven Learning-Based
Prefetching in Mobile Online Social
Networks . . . . . . . . . . . . . . . . 2320--2333
Rui Li and
Alex X. Liu and
Sheng Xiao and
Hongyue Xu and
Bezawada Bruhadeshwar and
Ann L. Wang Privacy and Integrity Preserving Top-$k$
Query Processing for Two-Tiered Sensor
Networks . . . . . . . . . . . . . . . . 2334--2346
Xitao Wen and
Kai Bu and
Bo Yang and
Yan Chen and
Li Erran Li and
Xiaolin Chen and
Jianfeng Yang and
Xue Leng RuleScope: Inspecting Forwarding Faults
for Software-Defined Networking . . . . 2347--2360
Weng Chon Ao and
Konstantinos Psounis Approximation Algorithms for Online User
Association in Multi-Tier Multi-Cell
Mobile Networks . . . . . . . . . . . . 2361--2374
Jinbei Zhang and
Luoyi Fu and
Qi Wang and
Liang Liu and
Xinyu Wang and
Xinbing Wang Connectivity Analysis in Wireless
Networks With Correlated Mobility and
Cluster Scalability . . . . . . . . . . 2375--2390
Haitao Wu and
Fen Zhou and
Zuqing Zhu and
Yaojun Chen On the Distance Spectrum Assignment in
Elastic Optical Networks . . . . . . . . 2391--2404
Zimu Zhou and
Longfei Shangguan and
Xiaolong Zheng and
Lei Yang and
Yunhao Liu Design and Implementation of an
RFID-Based Customer Shopping Behavior
Mining System . . . . . . . . . . . . . 2405--2418
Hung T. Nguyen and
My T. Thai and
Thang N. Dinh A Billion-Scale Approximation Algorithm
for Maximizing Benefit in Viral
Marketing . . . . . . . . . . . . . . . 2419--2429
Zain Shamsi and
Dmitri Loguinov Unsupervised Clustering Under Temporal
Feature Volatility in Network Stack
Fingerprinting . . . . . . . . . . . . . 2430--2443
Pooja Vyavahare and
Nutan Limaye and
Ajit A. Diwan and
D. Manjunath On the Maximum Rate of Networked
Computation in a Capacitated Network . . 2444--2458
Xiujuan Zhang and
Jiguo Yu and
Wei Li and
Xiuzhen Cheng and
Dongxiao Yu and
Feng Zhao Localized Algorithms for Yao Graph-Based
Spanner Construction in Wireless
Networks Under SINR . . . . . . . . . . 2459--2472
Haifeng Zhou and
Chunming Wu and
Qiumei Cheng and
Qianjun Liu SDN--LIRU: a Lossless and Seamless
Method for SDN Inter-Domain Route
Updates . . . . . . . . . . . . . . . . 2473--2483
Richard J. La Effects of Degree Correlations in
Interdependent Security: Good or Bad? 2484--2497
Guoxin Liu and
Haiying Shen Minimum-Cost Cloud Storage Service
Across Multiple Cloud Providers . . . . 2498--2513
Maurizio Rea and
Aymen Fakhreddine and
Domenico Giustiniano and
Vincent Lenders Filtering Noisy 802.11 Time-of-Flight
Ranging Measurements From Commoditized
WiFi Radios . . . . . . . . . . . . . . 2514--2527
Wei Gong and
Jiangchuan Liu and
Zhe Yang Efficient Unknown Tag Detection in
Large-Scale RFID Systems With Unreliable
Channels . . . . . . . . . . . . . . . . 2528--2539
Shih-Chun Lin and
Pu Wang and
Ian F. Akyildiz and
Min Luo Delay-Based Maximum Power-Weight
Scheduling With Heavy-Tailed Traffic . . 2540--2555
Lei Jiao and
Antonia Maria Tulino and
Jaime Llorca and
Yue Jin and
Alessandra Sala Smoothed Online Resource Allocation in
Multi-Tier Distributed Cloud Networks 2556--2570
Shay Vargaftik and
Isaac Keslassy and
Ariel Orda No Packet Left Behind: Avoiding
Starvation in Dynamic Topologies . . . . 2571--2584
Xiulong Liu and
Keqiu Li and
Song Guo and
Alex X. Liu and
Peng Li and
Kun Wang and
Jie Wu and
Xiulong Liu and
Keqiu Li and
Song Guo and
Alex X. Liu and
Peng Li and
Kun Wang and
Jie Wu Top-$k$ Queries for Categorized RFID
Systems . . . . . . . . . . . . . . . . 2587--2600
Fulvio Valenza and
Cataldo Basile and
Daniele Canavese and
Antonio Lioy and
Fulvio Valenza and
Cataldo Basile and
Daniele Canavese and
Antonio Lioy Classification and Analysis of
Communication Protection Policy
Anomalies . . . . . . . . . . . . . . . 2601--2614
Nathaniel M. Jones and
Georgios S. Paschos and
Brooke Shrader and
Eytan Modiano and
Nathaniel M. Jones and
Georgios S. Paschos and
Brooke Shrader and
Eytan Modiano An Overlay Architecture for Throughput
Optimal Multipath Routing . . . . . . . 2615--2628
Gaetano Carlucci and
Luca De Cicco and
Stefan Holmer and
Saverio Mascolo Congestion Control for Web Real-Time
Communication . . . . . . . . . . . . . 2629--2642
Songze Li and
Qian Yu and
Mohammad Ali Maddah-Ali and
A. Salman Avestimehr and
Songze Li and
Qian Yu and
Mohammad Ali Maddah-Ali and
A. Salman Avestimehr A Scalable Framework for Wireless
Distributed Computing . . . . . . . . . 2643--2654
Yuanqing Zheng and
Guobin Shen and
Liqun Li and
Chunshui Zhao and
Mo Li and
Feng Zhao and
Yuanqing Zheng and
Guobin Shen and
Liqun Li and
Chunshui Zhao and
Mo Li and
Feng Zhao Travi-Navi: Self-Deployable Indoor
Navigation System . . . . . . . . . . . 2655--2669
Qingjun Xiao and
Shigang Chen and
Min Chen and
Yian Zhou and
Zhiping Cai and
Junzhou Luo and
Qingjun Xiao and
Shigang Chen and
Min Chen and
Yian Zhou and
Zhiping Cai and
Junzhou Luo Adaptive Joint Estimation Protocol for
Arbitrary Pair of Tag Sets in a
Distributed RFID System . . . . . . . . 2670--2685
Liang Wang and
Gareth Tyson and
Jussi Kangasharju and
Jon Crowcroft and
Liang Wang and
Gareth Tyson and
Jussi Kangasharju and
Jon Crowcroft Milking the Cache Cow With Fairness in
Mind . . . . . . . . . . . . . . . . . . 2686--2700
Jiyan Wu and
Bo Cheng and
Ming Wang and
Junliang Chen and
Jiyan Wu and
Bo Cheng and
Ming Wang and
Junliang Chen Quality-Aware Energy Optimization in
Wireless Video Communication With
Multipath TCP . . . . . . . . . . . . . 2701--2718
Qi Li and
Patrick P. C. Lee and
Peng Zhang and
Purui Su and
Liang He and
Kui Ren and
Qi Li and
Patrick P. C. Lee and
Peng Zhang and
Purui Su and
Liang He and
Kui Ren Capability-Based Security Enforcement in
Named Data Networking . . . . . . . . . 2719--2730
Renan Fischer e Silva and
Paul M. Carpenter Energy Efficient Ethernet on MapReduce
Clusters: Packet Coalescing To Improve
10GbE Links . . . . . . . . . . . . . . 2731--2742
Costas A. Courcoubetis and
Antonis Dimakis and
Michalis Kanakakis and
Costas A. Courcoubetis and
Antonis Dimakis and
Michalis Kanakakis Congestion Control for Background Data
Transfers With Minimal Delay Impact . . 2743--2758
Yossi Kanizo and
Ori Rottenstreich and
Itai Segall and
Jose Yallouz and
Yossi Kanizo and
Ori Rottenstreich and
Itai Segall and
Jose Yallouz Optimizing Virtual Backup Allocation for
Middleboxes . . . . . . . . . . . . . . 2759--2772
Xiaodan Pan and
Tong Ye and
Tony T. Lee and
Weisheng Hu and
Xiaodan Pan and
Tong Ye and
Tony T. Lee and
Weisheng Hu Power Efficiency and Delay Tradeoff of
10GBase-T Energy Efficient Ethernet
Protocol . . . . . . . . . . . . . . . . 2773--2787
Tao Wang and
Fangming Liu and
Hong Xu and
Tao Wang and
Fangming Liu and
Hong Xu An Efficient Online Algorithm for
Dynamic SDN Controller Assignment in
Data Center Networks . . . . . . . . . . 2788--2801
Rami Cohen and
Yuval Cassuto and
Rami Cohen and
Yuval Cassuto Coding for Improved Throughput
Performance in Network Switches . . . . 2802--2814
Jesus Gomez-Vilardebo and
Jesus Gomez-Vilardebo Routing in Accumulative Multi-Hop
Networks . . . . . . . . . . . . . . . . 2815--2828
Xiaomei Zhang and
Guohong Cao and
Xiaomei Zhang and
Guohong Cao Transient Community Detection and Its
Application to Data Forwarding in Delay
Tolerant Networks . . . . . . . . . . . 2829--2843
Sharan Naribole and
Edward Knightly and
Sharan Naribole and
Edward Knightly Scalable Multicast in Highly-Directional
$ 60$-GHz WLANs . . . . . . . . . . . . 2844--2857
Mehdi Nikkhah and
Aman Mangal and
Constantine Dovrolis and
Roch Guerin and
Mehdi Nikkhah and
Aman Mangal and
Constantine Dovrolis and
Roch Guerin A Statistical Exploration of Protocol
Adoption . . . . . . . . . . . . . . . . 2858--2871
Zhichao Cao and
Daibo Liu and
Jiliang Wang and
Xiaolong Zheng Chase: Taming Concurrent Broadcast for
Flooding in Asynchronous Duty Cycle
Networks . . . . . . . . . . . . . . . . 2872--2885
Huazhe Wang and
Chen Qian and
Ye Yu and
Hongkun Yang and
Simon S. Lam and
Huazhe Wang and
Chen Qian and
Ye Yu and
Hongkun Yang and
Simon S. Lam Practical Network-Wide Packet Behavior
Identification by AP Classifier . . . . 2886--2899
Hongkun Yang and
Simon S. Lam and
Hongkun Yang and
Simon S. Lam Scalable Verification of Networks With
Packet Transformers Using Atomic
Predicates . . . . . . . . . . . . . . . 2900--2915
Zhenghao Zhang and
Zhenghao Zhang Analog Bloom Filter and Contention-Free
Multi-Bit Simultaneous Query for
Centralized Wireless Networks . . . . . 2916--2929
Arash Asadi and
Vincenzo Mancuso and
Rohit Gupta and
Arash Asadi and
Vincenzo Mancuso and
Rohit Gupta DORE: an Experimental Framework to
Enable Outband D$2$D Relay in Cellular
Networks . . . . . . . . . . . . . . . . 2930--2943
Tie Qiu and
Aoyang Zhao and
Feng Xia and
Weisheng Si and
Dapeng Oliver Wu and
Tie Qiu and
Aoyang Zhao and
Feng Xia and
Weisheng Si and
Dapeng Oliver Wu ROSE: Robustness Strategy for Scale-Free
Wireless Sensor Networks . . . . . . . . 2944--2959
Longbo Huang and
Longbo Huang Intelligence of Smart Systems: Model,
Bounds, and Algorithms . . . . . . . . . 2960--2973
Song Min Kim and
Shigemi Ishida and
Shuai Wang and
Tian He and
Song Min Kim and
Shigemi Ishida and
Shuai Wang and
Tian He Free Side-Channel Cross-Technology
Communication in Wireless Networks . . . 2974--2987
Anurag Rai and
Chih-ping Li and
Georgios Paschos and
Eytan Modiano and
Anurag Rai and
Chih-ping Li and
Georgios Paschos and
Eytan Modiano Loop-Free Backpressure Routing Using
Link-Reversal Algorithms . . . . . . . . 2988--3002
Michael Brown and
Colin Marshall and
Dejun Yang and
Ming Li and
Jian Lin and
Guoliang Xue and
Michael Brown and
Colin Marshall and
Dejun Yang and
Ming Li and
Jian Lin and
Guoliang Xue Maximizing Capacity in Cognitive Radio
Networks Under Physical Interference
Model . . . . . . . . . . . . . . . . . 3003--3015
Yongquan Fu and
Ernst Biersack and
Yongquan Fu and
Ernst Biersack MCR: Structure-Aware Overlay-Based
Latency-Optimal Greedy Relay Search . . 3016--3029
Milad Mahdian and
Edmund M. Yeh and
Milad Mahdian and
Edmund M. Yeh Throughput and Delay Scaling of
Content-Centric Ad Hoc and Heterogeneous
Wireless Networks . . . . . . . . . . . 3030--3043
Pablo Caballero and
Albert Banchs and
Gustavo de Veciana and
Xavier Costa-Perez and
Pablo Caballero and
Albert Banchs and
Gustavo de Veciana and
Xavier Costa-Perez Multi-Tenant Radio Access Network
Slicing: Statistical Multiplexing of
Spatial Loads . . . . . . . . . . . . . 3044--3058
Aziz Mohaisen and
Kui Ren and
Aziz Mohaisen and
Kui Ren Leakage of .onion at the DNS Root:
Measurements, Causes, and
Countermeasures . . . . . . . . . . . . 3059--3072
Hongli Xu and
Zhuolong Yu and
Xiang-Yang Li and
Liusheng Huang and
Chen Qian and
Taeho Jung and
Hongli Xu and
Zhuolong Yu and
Xiang-Yang Li and
Liusheng Huang and
Chen Qian and
Taeho Jung Joint Route Selection and Update
Scheduling for Low-Latency Update in
SDNs . . . . . . . . . . . . . . . . . . 3073--3087
Abhishek Sinha and
Georgios Paschos and
Eytan Modiano and
Abhishek Sinha and
Georgios Paschos and
Eytan Modiano Throughput-Optimal Multi-Hop Broadcast
Algorithms . . . . . . . . . . . . . . . 3088--3101
Stefano Vissicchio and
Luca Cittadini and
Stefano Vissicchio and
Luca Cittadini Safe, Efficient, and Robust SDN Updates
by Combining Rule Replacements and
Additions . . . . . . . . . . . . . . . 3102--3115
Tong Yang and
Alex X. Liu and
Muhammad Shahzad and
Dongsheng Yang and
Qiaobin Fu and
Gaogang Xie and
Xiaoming Li and
Tong Yang and
Alex X. Liu and
Muhammad Shahzad and
Dongsheng Yang and
Qiaobin Fu and
Gaogang Xie and
Xiaoming Li A Shifting Framework for Set Queries . . 3116--3131
Song Min Kim and
Shuai Wang and
Tian He and
Song Min Kim and
Shuai Wang and
Tian He Exploiting Spatiotemporal Correlation
for Wireless Networks Under Interference 3132--3145
Antonio Cianfrani and
Marco Listanti and
Marco Polverini and
Antonio Cianfrani and
Marco Listanti and
Marco Polverini Incremental Deployment of Segment
Routing Into an ISP Network: a Traffic
Engineering Perspective . . . . . . . . 3146--3160
Weifa Liang and
Zichuan Xu and
Wenzheng Xu and
Jiugen Shi and
Guoqiang Mao and
Sajal K. Das Approximation Algorithms for Charging
Reward Maximization in Rechargeable
Sensor Networks via a Mobile Charger . . 3161--3174
Peng Wang and
Hong Xu and
Zhixiong Niu and
Dongsu Han and
Yongqiang Xiong and
Peng Wang and
Hong Xu and
Zhixiong Niu and
Dongsu Han and
Yongqiang Xiong Expeditus: Congestion-Aware Load
Balancing in Clos Data Center Networks 3175--3188
Chiara Buratti and
Roberto Verdone and
Chiara Buratti and
Roberto Verdone End-to-End Throughput of Ad Hoc
Multi-Hop Networks in a Poisson Field of
Interferers . . . . . . . . . . . . . . 3189--3202
Kensuke Fukuda and
John Heidemann and
Abdul Qadeer and
Kensuke Fukuda and
John Heidemann and
Abdul Qadeer Detecting Malicious Activity With DNS
Backscatter Over Time . . . . . . . . . 3203--3218
Hoang Dau and
Olgica Milenkovic and
Hoang Dau and
Olgica Milenkovic Latent Network Features and Overlapping
Community Discovery via Boolean
Intersection Representations . . . . . . 3219--3234
Luoyi Fu and
Xinzhe Fu and
Zhiying Xu and
Qianyang Peng and
Xinbing Wang and
Songwu Lu Determining Source--Destination
Connectivity in Uncertain Networks:
Modeling and Solutions . . . . . . . . . 3237--3252
Luca Bedogni and
Angelo Trotta and
Marco Di Felice and
Yue Gao and
Xingjian Zhang and
Qianyun Zhang and
Fabio Malabocchia and
Luciano Bononi Dynamic Adaptive Video Streaming on
Heterogeneous TVWS and Wi-Fi Networks 3253--3266
Cristina Cano and
Douglas J. Leith and
Andres Garcia-Saavedra and
Pablo Serrano Fair Coexistence of Scheduled and Random
Access Wireless Networks: Unlicensed
LTE/WiFi . . . . . . . . . . . . . . . . 3267--3281
Ganesh C. Sankaran and
Krishna M. Sivalingam Design and Analysis of Scheduling
Algorithms for Optically Groomed Data
Center Networks . . . . . . . . . . . . 3282--3293
Chen Sun and
Jun Bi and
Haoxian Chen and
Hongxin Hu and
Zhilong Zheng and
Shuyong Zhu and
Chenghui Wu SDPA: Toward a Stateful Data Plane in
Software-Defined Networking . . . . . . 3294--3308
Kirill Kogan and
Sergey I. Nikolenko and
Patrick Eugster and
Alexander Shalimov and
Ori Rottenstreich Efficient FIB Representations on
Distributed Platforms . . . . . . . . . 3309--3322
Cheng-Shang Chang and
Cheng-Yu Chen and
Duan-Shin Lee and
Wanjiun Liao Efficient Encoding of User IDs for
Nearly Optimal Expected
Time-To-Rendezvous in Heterogeneous
Cognitive Radio Networks . . . . . . . . 3323--3337
Tom Z. J. Fu and
Jianbing Ding and
Richard T. B. Ma and
Marianne Winslett and
Yin Yang and
Zhenjie Zhang DRS: Auto-Scaling for Real-Time Stream
Analytics . . . . . . . . . . . . . . . 3338--3352
Kristen Gardner and
Mor Harchol-Balter and
Alan Scheller-Wolf and
Benny Van Houdt A Better Model for Job Redundancy:
Decoupling Server Slowdown and Job Size 3353--3367
Tien Tran and
Min Kyung An and
Dung T. Huynh Antenna Orientation and Range Assignment
Algorithms in Directional WSNs . . . . . 3368--3381
Zongqing Lu and
Xiao Sun and
Thomas La Porta Cooperative Data Offload in
Opportunistic Networks: From Mobile
Devices to Infrastructure . . . . . . . 3382--3395
Nikolaos Sapountzis and
Thrasyvoulos Spyropoulos and
Navid Nikaein and
Umer Salim User Association in HetNets: Impact of
Traffic Differentiation and Backhaul
Limitations . . . . . . . . . . . . . . 3396--3410
Mingwei Zhang and
Jun Li and
Scott Brooks I-Seismograph: Observing, Measuring, and
Analyzing Internet Earthquakes . . . . . 3411--3426
Yong Cui and
Zhenjie Yang and
Shihan Xiao and
Xin Wang and
Shenghui Yan Traffic-Aware Virtual Machine Migration
in Topology-Adaptive DCN . . . . . . . . 3427--3440
Ying Cui and
Muriel Medard and
Edmund Yeh and
Douglas Leith and
Fan Lai and
Ken R. Duffy A Linear Network Code Construction for
General Integer Connections Based on the
Constraint Satisfaction Problem . . . . 3441--3454
Abhijit Bhattacharya and
Anurag Kumar Analytical Modeling of IEEE 802.11-Type
CSMA/CA Networks With Short Term
Unfairness . . . . . . . . . . . . . . . 3455--3472
Lei Deng and
Chih-Chun Wang and
Minghua Chen and
Shizhen Zhao Timely Wireless Flows With General
Traffic Patterns: Capacity Region and
Scheduling Algorithms . . . . . . . . . 3473--3486
Jiao Zhou and
Zhao Zhang and
Shaojie Tang and
Xiaohui Huang and
Yuchang Mo and
Ding-Zhu Du Fault-Tolerant Virtual Backbone in
Heterogeneous Wireless Sensor Network 3487--3499
Ye Liu and
Chung Shue Chen and
Chi Wan Sung and
Chandramani Singh A Game Theoretic Distributed Algorithm
for FeICIC Optimization in LTE-A HetNets 3500--3513
Changhoon Yoon and
Seungsoo Lee and
Heedo Kang and
Taejune Park and
Seungwon Shin and
Vinod Yegneswaran and
Phillip Porras and
Guofei Gu Flow Wars: Systemizing the Attack
Surface and Defenses in Software-Defined
Networks . . . . . . . . . . . . . . . . 3514--3530
Haipeng Dai and
Yunhuai Liu and
Guihai Chen and
Xiaobing Wu and
Tian He and
Alex X. Liu and
Huizhen Ma Safe Charging for Wireless Power
Transfer . . . . . . . . . . . . . . . . 3531--3544
Ruozhou Yu and
Guoliang Xue and
Xiang Zhang The Critical Network Flow Problem:
Migratability and Survivability . . . . 3545--3558
Ju Wang and
Jie Xiong and
Hongbo Jiang and
Xiaojiang Chen and
Dingyi Fang D-Watch: Embracing ``Bad'' Multipaths
for Device-Free Localization With COTS
RFID Devices . . . . . . . . . . . . . . 3559--3572
Quan Chen and
Hong Gao and
Siyao Cheng and
Xiaolin Fang and
Zhipeng Cai and
Jianzhong Li Centralized and Distributed
Delay-Bounded Scheduling Algorithms for
Multicast in Duty-Cycled Wireless Sensor
Networks . . . . . . . . . . . . . . . . 3573--3586
Hongli Xu and
Zhuolong Yu and
Chen Qian and
Xiang-Yang Li and
Zichun Liu and
Liusheng Huang Minimizing Flow Statistics Collection
Cost Using Wildcard-Based Requests in
SDNs . . . . . . . . . . . . . . . . . . 3587--3601
Xin Wang and
Richard T. B. Ma and
Yinlong Xu The Role of Data Cap in Optimal Two-Part
Network Pricing . . . . . . . . . . . . 3602--3615
Xiaofeng Gao and
Zhiyin Chen and
Fan Wu and
Guihai Chen Energy Efficient Algorithms for $k$-Sink
Minimum Movement Target Coverage Problem
in Mobile Sensor Network . . . . . . . . 3616--3627
Alessandro Checco and
Doug J. Leith Fast, Responsive Decentralized Graph
Coloring . . . . . . . . . . . . . . . . 3628--3640
Avhishek Chatterjee and
Lav R. Varshney and
Sriram Vishwanath Work Capacity of Regulated Freelance
Platforms: Fundamental Limits and
Decentralized Schemes . . . . . . . . . 3641--3654
Andreas Fiessler and
Claas Lorenz and
Sven Hager and
Bjorn Scheuermann and
Andrew W. Moore HyPaFilter+: Enhanced Hybrid Packet
Filtering Using Hardware Assisted
Classification and Header Space Analysis 3655--3669
Mehrnoosh Shafiee and
Javad Ghaderi A Simple Congestion-Aware Algorithm for
Load Balancing in Datacenter Networks 3670--3682
Vaneet Aggarwal and
Yih-Farn Robin Chen and
Tian Lan and
Yu Xiang Sprout: a Functional Caching Approach to
Minimize Service Latency in
Erasure-Coded Storage . . . . . . . . . 3683--3694
Andrea Munari and
Petri Mahonen and
Marina Petrova A Stochastic Geometry Approach to
Asynchronous Aloha Full-Duplex Networks 3695--3708
Faraz Ahmed and
Jeffrey Erman and
Zihui Ge and
Alex X. Liu and
Jia Wang and
He Yan Detecting and Localizing End-to-End
Performance Degradation for Cellular
Data Services Based on TCP Loss Ratio
and Round Trip Time . . . . . . . . . . 3709--3722
Chaoli Zhang and
Fan Wu and
Xiaofeng Gao and
Guihai Chen Free Talk in the Air: a Hierarchical
Topology for 60 GHz Wireless Data Center
Networks . . . . . . . . . . . . . . . . 3723--3737
Qingjun Xiao and
Shigang Chen and
You Zhou and
Min Chen and
Junzhou Luo and
Tengli Li and
Yibei Ling Cardinality Estimation for Elephant
Flows: a Compact Solution Based on
Virtual Register Sharing . . . . . . . . 3738--3752
Jingyuan Fan and
Chaowen Guan and
Kui Ren and
Yong Cui and
Chunming Qiao SPABox: Safeguarding Privacy During Deep
Packet Inspection at a MiddleBox . . . . 3753--3766
Tingwei Zhu and
Dan Feng and
Fang Wang and
Yu Hua and
Qingyu Shi and
Jiahao Liu and
Yongli Cheng and
Yong Wan Efficient Anonymous Communication in
SDN-Based Data Center Networks . . . . . 3767--3780
Xiaolong Zheng and
Jiliang Wang and
Longfei Shangguan and
Zimu Zhou and
Yunhao Liu Design and Implementation of a CSI-Based
Ubiquitous Smoking Detection System . . 3781--3793
Kun Xie and
Xiaocan Li and
Xin Wang and
Gaogang Xie and
Jigang Wen and
Jiannong Cao and
Dafang Zhang Fast Tensor Factorization for Accurate
Internet Anomaly Detection . . . . . . . 3794--3807
Tao Zhang and
Jianxin Wang and
Jiawei Huang and
Jianer Chen and
Yi Pan and
Geyong Min Tuning the Aggressive TCP Behavior for
Highly Concurrent HTTP Connections in
Intra-Datacenter . . . . . . . . . . . . 3808--3822
Lei Yang and
Yao Li and
Qiongzheng Lin and
Huanyu Jia and
Xiang-Yang Li and
Yunhao Liu Tagbeat: Sensing Mechanical Vibration
Period With COTS RFID Systems . . . . . 3823--3835
Haiying Shen and
Liuhua Chen Distributed Autonomous Virtual Resource
Management in Datacenters Using
Finite-Markov Decision Process . . . . . 3836--3849
Arsalan Sharifnassab and
S. Jamaloddin Golestani On the Possibility of Network Scheduling
With Polynomial Complexity and Delay . . 3850--3862
Jesus Gomez-Vilardebo Competitive Design of Energy Harvesting
Communications in Wireless Fading
Channels . . . . . . . . . . . . . . . . 3863--3872
Haiyang Wang and
Tong Li and
Ryan Shea and
Xiaoqiang Ma and
Feng Wang and
Jiangchuan Liu and
Ke Xu Toward Cloud-Based Distributed
Interactive Applications: Measurement,
Modeling, and Analysis . . . . . . . . . 3--16
Falko Dressler and
Florian Klingler and
Christoph Sommer and
Reuven Cohen Not All VANET Broadcasts Are the Same:
Context-Aware Class Based Broadcast . . 17--30
Cheng-Shang Chang and
Duan-Shin Lee and
Li-Heng Liou and
Sheng-Min Lu and
Mu-Huan Wu A Probabilistic Framework for Structural
Analysis and Community Detection in
Directed Networks . . . . . . . . . . . 31--46
Jelena Diakonikolas and
Gil Zussman On the Rate Regions of Single-Channel
and Multi-Channel Full-Duplex Links . . 47--60
Antonios Michaloliakos and
Weng Chon Ao and
Konstantinos Psounis and
Yonglong Zhang Asynchronously Coordinated
Multi-Timescale Beamforming Architecture
for Multi-Cell Networks . . . . . . . . 61--75
Faraz Ahmed and
M. Zubair Shafiq and
Amir R. Khakpour and
Alex X. Liu Optimizing Internet Transit Routing for
Content Delivery Networks . . . . . . . 76--89
Yongquan Fu and
Pere Barlet-Ros and
Dongsheng Li Every Timestamp Counts: Accurate
Tracking of Network Latencies Using
Reconcilable Difference Aggregator . . . 90--103
Emad Alasadi and
Hamed S. Al-Raweshidy SSED: Servers Under Software-Defined
Network Architectures to Eliminate
Discovery Messages . . . . . . . . . . . 104--117
Bo Li and
Junfeng Wu and
Hongsheng Qi and
Alexandre Proutiere and
Guodong Shi Boolean Gossip Networks . . . . . . . . 118--130
Ido Nevat and
Dinil Mon Divakaran and
Sai Ganesh Nagarajan and
Pengfei Zhang and
Le Su and
Li Ling Ko and
Vrizlynn L. L. Thing Anomaly Detection and Attribution in
Networks With Temporally Correlated
Traffic . . . . . . . . . . . . . . . . 131--144
Yong Cui and
Shihan Xiao and
Xin Wang and
Zhenjie Yang and
Shenghui Yan and
Chao Zhu and
Xiang-Yang Li and
Ning Ge Diamond: Nesting the Data Center Network
With Wireless Rings in $3$-D Space . . . 145--160
Fu Xiao and
Zhongqin Wang and
Ning Ye and
Ruchuan Wang and
Xiang-Yang Li One More Tag Enables Fine-Grained RFID
Localization and Tracking . . . . . . . 161--174
David Gonzalez G. and
Harri Hakula and
Antti Rasila and
Jyri Hamalainen Spatial Mappings for Planning and
Optimization of Cellular Networks . . . 175--188
Fei Chen and
Chunming Wu and
Xiaoyan Hong and
Bin Wang Easy Path Programming: Elevate
Abstraction Level for Network Functions 189--202
M. Saifur Rahman and
Md. Yusuf Sarwar Uddin and
Tahmid Hasan and
M. Sohel Rahman and
M. Kaykobad Using Adaptive Heartbeat Rate on
Long-Lived TCP Connections . . . . . . . 203--216
Peng He and
Wenyuan Zhang and
Hongtao Guan and
Kave Salamatian and
Gaogang Xie Partial Order Theory for Fast TCAM
Updates . . . . . . . . . . . . . . . . 217--230
Lei Xie and
Chuyu Wang and
Alex X. Liu and
Jianqiang Sun and
Sanglu Lu Multi-Touch in the Air: Concurrent
Micromovement Recognition Using RF
Signals . . . . . . . . . . . . . . . . 231--244
Truong Khoa Phan and
David Griffin and
Elisa Maini and
Miguel Rio Utility-Centric Networking: Balancing
Transit Costs With Quality of Experience 245--258
Matthew A. Clark and
Konstantinos Psounis Trading Utility for Privacy in Shared
Spectrum Access Systems . . . . . . . . 259--273
Qingxia Chen and
F. Richard Yu and
Tao Huang and
Renchao Xie and
Jiang Liu and
Yunjie Liu Joint Resource Allocation for
Software-Defined Networking, Caching,
and Computing . . . . . . . . . . . . . 274--287
Woong-Hee Lee and
Jeong-Sik Choi and
Yong-Hwa Kim and
Jong-Ho Lee and
Seong-Cheol Kim Adaptive Sector Coloring Game for
Geometric Network Information-Based
Inter-Cell Interference Coordination in
Wireless Cellular Networks . . . . . . . 288--301
Giovanni Neglia and
Damiano Carra and
Pietro Michiardi Cache Policies for Linear Utility
Maximization . . . . . . . . . . . . . . 302--313
Haipeng Dai and
Huizhen Ma and
Alex X. Liu and
Guihai Chen Radiation Constrained Scheduling of
Wireless Charging Tasks . . . . . . . . 314--327
Klaus-Tycho Foerster and
Arne Ludwig and
Jan Marcinkowski and
Stefan Schmid Loop-Free Route Updates for
Software-Defined Networks . . . . . . . 328--341
Pavel Chuprikov and
Sergey I. Nikolenko and
Alex Davydow and
Kirill Kogan Priority Queueing for Packets With Two
Characteristics . . . . . . . . . . . . 342--355
Daniela Aguirre-Guerrero and
Miguel Camelo and
Lluis Fabrega and
Pere Vila WMGR: a Generic and Compact Routing
Scheme for Data Center Networks . . . . 356--369
Yasaman Keshtkarjahromi and
Hulya Seferoglu and
Rashid Ansari and
Ashfaq Khokhar Device-to-Device Networking Meets
Cellular via Network Coding . . . . . . 370--383
Yuan Yang and
Mingwei Xu and
Qi Li Fast Rerouting Against Multi-Link
Failures Without Topology Constraint . . 384--397
Scott T. Rager and
Ertugrul N. Ciftcioglu and
Ram Ramanathan and
Thomas F. La Porta and
Ramesh Govindan Scalability and Satisfiability of
Quality-of-Information in Wireless
Networks . . . . . . . . . . . . . . . . 398--411
Bei Liu and
Wei Wang and
Donghyun Kim and
Yingshu Li and
Sung-Sik Kwon and
Yaolin Jiang On Practical Construction of Quality
Fault-Tolerant Virtual Backbone in
Homogeneous Wireless Networks . . . . . 412--421
Carlo Fuerst and
Stefan Schmid and
Lalith Suresh and
Paolo Costa Kraken: Online and Elastic Resource
Reservations for Cloud Datacenters . . . 422--435
Ruiting Zhou and
Zongpeng Li and
Chuan Wu Scheduling Frameworks for Cloud
Container Services . . . . . . . . . . . 436--450
Luca Barletta and
Flaminio Borgonovo and
Ilario Filippini The Throughput and Access Delay of
Slotted-Aloha With Exponential Backoff 451--464
Chi-Han Lin and
Yi-Ting Chen and
Kate Ching-Ju Lin and
Wen-Tsuen Chen FDoF: Enhancing Channel Utilization for
802.11ac . . . . . . . . . . . . . . . . 465--477
Kechao Cai and
Hong Xie and
John C. S. Lui Information Spreading Forensics via
Sequential Dependent Snapshots . . . . . 478--491
Jie Zhao and
Qiang Liu and
Xin Wang and
Shiwen Mao Scheduling of Collaborative Sequential
Compressed Sensing Over Wide Spectrum
Band . . . . . . . . . . . . . . . . . . 492--505
Abhishek Sinha and
Eytan Modiano Optimal Control for Generalized
Network-Flow Problems . . . . . . . . . 506--519
Haipeng Dai and
Yunhuai Liu and
Guihai Chen and
Xiaobing Wu and
Tian He and
Alex X. Liu and
Yang Zhao SCAPE: Safe Charging With Adjustable
Power . . . . . . . . . . . . . . . . . 520--533
Peter Peresini and
Maciej Kuzniar and
Dejan Kostic Dynamic, Fine-Grained Data Plane
Monitoring With Monocle . . . . . . . . 534--547
Andrea Araldo and
Gyorgy Dan and
Dario Rossi Caching Encrypted Content Via Stochastic
Cache Partitioning . . . . . . . . . . . 548--561
Pengzhan Wang and
Hongli Xu and
Liusheng Huang and
Chen Qian and
Shaowei Wang and
Yanjing Sun Minimizing Controller Response Time
Through Flow Redirecting in SDNs . . . . 562--575
Guang Yang and
Ming Xiao and
Hussein Al-Zubaidy and
Yongming Huang and
James Gross Analysis of Millimeter-Wave Multi-Hop
Networks With Full-Duplex Buffered
Relays . . . . . . . . . . . . . . . . . 576--590
Marcin Bienkowski and
Nadi Sarrar and
Stefan Schmid and
Steve Uhlig Online Aggregation of the Forwarding
Information Base: Accounting for
Locality and Churn . . . . . . . . . . . 591--604
Bin Tang and
Shenghao Yang An LDPC Approach for Chunked Network
Codes . . . . . . . . . . . . . . . . . 605--617
Hongli Xu and
He Huang and
Shigang Chen and
Gongming Zhao and
Liusheng Huang Achieving High Scalability Through
Hybrid Switching in Software-Defined
Networking . . . . . . . . . . . . . . . 618--632
Luoyi Fu and
Xinzhe Fu and
Zesen Zhang and
Zhiying Xu and
Xudong Wu and
Xinbing Wang and
Songwu Lu Joint Optimization of Multicast Energy
in Delay-Constrained Mobile Wireless
Networks . . . . . . . . . . . . . . . . 633--646
Eric Norige and
Alex X. Liu and
Eric Torng and
Eric Torng and
Eric Norige and
Alex X. Liu A Ternary Unification Framework for
Optimizing TCAM-Based Packet
Classification Systems . . . . . . . . . 657--670
Desheng Zhang and
Tian He and
Fan Zhang and
Chengzhong Xu and
Tian He and
Fan Zhang and
Desheng Zhang and
Chengzhong Xu Urban-Scale Human Mobility Modeling With
Multi-Source Urban Network Data . . . . 671--684
Haichuan Ding and
Chi Zhang and
Xuanheng Li and
Jianqing Liu and
Miao Pan and
Yuguang Fang and
Shigang Chen and
Yuguang Fang and
Chi Zhang and
Miao Pan and
Xuanheng Li and
Jianqing Liu and
Haichuan Ding and
Shigang Chen Session-Based Cooperation in Cognitive
Radio Networks: a Network-Level Approach 685--698
Yongzheng Jia and
Chuan Wu and
Zongpeng Li and
Franck Le and
Alex Liu and
Zongpeng Li and
Yongzheng Jia and
Chuan Wu and
Franck Le and
Alex Liu Online Scaling of NFV Service Chains
Across Geo-Distributed Datacenters . . . 699--710
Yuxiao Hou and
Yuanqing Zheng and
Yuxiao Hou and
Yuanqing Zheng PHY-Tree: Physical Layer Tree-Based RFID
Identification . . . . . . . . . . . . . 711--723
Han Deng and
I-Hong Hou and
I-Hong Hou and
Han Deng Optimal Capacity Provisioning for Online
Job Allocation With Hard Allocation
Ratio Requirement . . . . . . . . . . . 724--736
Stratis Ioannidis and
Edmund Yeh and
Edmund Yeh and
Stratis Ioannidis Adaptive Caching Networks With
Optimality Guarantees . . . . . . . . . 737--750
Wei Gong and
Haoxiang Liu and
Jiangchuan Liu and
Xiaoyi Fan and
Kebin Liu and
Qiang Ma and
Xiaoyu Ji and
Kebin Liu and
Jiangchuan Liu and
Xiaoyi Fan and
Qiang Ma and
Haoxiang Liu and
Wei Gong and
Xiaoyu Ji Channel-Aware Rate Adaptation for
Backscatter Networks . . . . . . . . . . 751--764
Yue Cao and
Zhiyun Qian and
Zhongjie Wang and
Tuan Dao and
Srikanth V. Krishnamurthy and
Lisa M. Marvel and
Yue Cao and
Tuan Dao and
Lisa M. Marvel and
Zhongjie Wang and
Zhiyun Qian and
Srikanth V. Krishnamurthy Off-Path TCP Exploits of the Challenge
ACK Global Rate Limit . . . . . . . . . 765--778
Tingjun Chen and
Javad Ghaderi and
Dan Rubenstein and
Gil Zussman and
Dan Rubenstein and
Tingjun Chen and
Javad Ghaderi and
Gil Zussman Maximizing Broadcast Throughput Under
Ultra-Low-Power Constraints . . . . . . 779--792
Kun Xie and
Lele Wang and
Xin Wang and
Gaogang Xie and
Jigang Wen and
Guangxing Zhang and
Jiannong Cao and
Dafang Zhang and
Kun Xie and
Xin Wang and
Dafang Zhang and
Jiannong Cao and
Lele Wang and
Gaogang Xie and
Jigang Wen and
Guangxing Zhang Accurate Recovery of Internet Traffic
Data: a Sequential Tensor Completion
Approach . . . . . . . . . . . . . . . . 793--806
Jian Du and
Xue Liu and
Lei Rao and
Jian Du and
Lei Rao and
Xue Liu Proactive Doppler Shift Compensation in
Vehicular Cyber-Physical Systems . . . . 807--818
Yoann Desmouceaux and
Pierre Pfister and
Jerome Tollet and
Mark Townsley and
Thomas Clausen and
Jerome Tollet and
Mark Townsley and
Yoann Desmouceaux and
Thomas Clausen and
Pierre Pfister 6LB: Scalable and Application-Aware Load
Balancing with Segment Routing . . . . . 819--834
Anat Bremler-Barr and
Yotam Harchol and
David Hay and
Yacov Hel-Or and
Yotam Harchol and
Anat Bremler-Barr and
David Hay and
Yacov Hel-Or Encoding Short Ranges in TCAM Without
Expansion: Efficient Algorithm and
Applications . . . . . . . . . . . . . . 835--850
Jiayi Liu and
Qinghai Yang and
Gwendal Simon and
Jiayi Liu and
Gwendal Simon and
Qinghai Yang Congestion Avoidance and Load Balancing
in Content Placement and Request
Redirection for Mobile CDN . . . . . . . 851--863
Shiva Raj Pokhrel and
Carey Williamson and
Carey Williamson and
Shiva Raj Pokhrel Modeling Compound TCP Over WiFi for IoT 864--878
Avhishek Chatterjee and
Michael Borokhovich and
Lav R. Varshney and
Sriram Vishwanath and
Lav R. Varshney and
Avhishek Chatterjee and
Sriram Vishwanath and
Michael Borokhovich Efficient and Flexible Crowdsourcing of
Specialized Tasks With Precedence
Constraints . . . . . . . . . . . . . . 879--892
Xiaoqi Ren and
Palma London and
Juba Ziani and
Adam Wierman and
Palma London and
Juba Ziani and
Adam Wierman and
Xiaoqi Ren Datum: Managing Data Purchasing and Data
Placement in a Geo-Distributed Data
Market . . . . . . . . . . . . . . . . . 893--905
Cheng-Shang Chang and
Duan-Shin Lee and
Chia-Kai Su and
Cheng-Shang Chang and
Chia-Kai Su and
Duan-Shin Lee Greenput: a Power-Saving Algorithm That
Achieves Maximum Throughput in Wireless
Networks . . . . . . . . . . . . . . . . 906--919
Thomas Blasius and
Tobias Friedrich and
Anton Krohmer and
Soren Laue and
Anton Krohmer and
Soren Laue and
Tobias Friedrich and
Thomas Blasius Efficient Embedding of Scale-Free Graphs
in the Hyperbolic Plane . . . . . . . . 920--933
Cory J. Kleinheksel and
Arun K. Somani and
Arun K. Somani and
Cory J. Kleinheksel Enhancing Fault Tolerance and Resource
Utilization in Unidirectional
Quorum-Based Cycle Routing . . . . . . . 934--947
Arsany Basta and
Andreas Blenk and
Szymon Dudycz and
Arne Ludwig and
Stefan Schmid and
Stefan Schmid and
Szymon Dudycz and
Andreas Blenk and
Arne Ludwig and
Arsany Basta Efficient Loop-Free Rerouting of
Multiple SDN Flows . . . . . . . . . . . 948--961
Bo Yan and
Yang Xu and
H. Jonathan Chao and
H. Jonathan Chao and
Yang Xu and
Bo Yan Adaptive Wildcard Rule Cache Management
for Software-Defined Networks . . . . . 962--975
Jhih-Yu Huang and
Pi-Chung Wang and
Jhih-Yu Huang and
Pi-Chung Wang TCAM-Based IP Address Lookup Using
Longest Suffix Split . . . . . . . . . . 976--989
Xiaofeng Gao and
Jiahao Fan and
Fan Wu and
Guihai Chen and
Jiahao Fan and
Guihai Chen and
Xiaofeng Gao and
Fan Wu Approximation Algorithms for Sweep
Coverage Problem With Multiple Mobile
Sensors . . . . . . . . . . . . . . . . 990--1003
Sheng-Chun Kao and
Ding-Yuan Lee and
Ting-Sheng Chen and
An-Yeu Wu and
Sheng-Chun Kao and
Ding-Yuan Lee and
An-Yeu Wu and
Ting-Sheng Chen Dynamically Updatable Ternary Segmented
Aging Bloom Filter for
OpenFlow-Compliant Low-Power Packet
Processing . . . . . . . . . . . . . . . 1004--1017
Hongbo Jiang and
Ping Zhao and
Chen Wang and
Chen Wang and
Hongbo Jiang and
Ping Zhao RobLoP: Towards Robust Privacy
Preserving Against Location Dependent
Attacks in Continuous LBS Queries . . . 1018--1032
Ye Liu and
Chung Shue Chen and
Chi Wan Sung and
Chandramani Singh and
Ye Liu and
Chi Wan Sung and
Chung Shue Chen and
Chandramani Singh Corrections to ``A Game Theoretic
Distributed Algorithm for FeICIC
Optimization in LTE-A HetNets'' . . . . 1033--1033
Qian Ma and
Lin Gao and
Ya-Feng Liu and
Jianwei Huang Incentivizing Wi-Fi Network
Crowdsourcing: a Contract Theoretic
Approach . . . . . . . . . . . . . . . . 1035--1048
Ying Zhang and
Lei Deng and
Minghua Chen and
Peijian Wang Joint Bidding and Geographical Load
Balancing for Datacenters: Is
Uncertainty a Blessing or a Curse? . . . 1049--1062
Soumya Basu and
Aditya Sundarrajan and
Javad Ghaderi and
Sanjay Shakkottai and
Ramesh Sitaraman Adaptive TTL-Based Caching for Content
Delivery . . . . . . . . . . . . . . . . 1063--1077
Li Yan and
Haiying Shen and
Kang Chen MobiT: Distributed and
Congestion-Resilient Trajectory-Based
Routing for Vehicular Delay Tolerant
Networks . . . . . . . . . . . . . . . . 1078--1091
Luoyi Fu and
Songjun Ma and
Lingkun Kong and
Shiyu Liang and
Xinbing Wang FINE: a Framework for Distributed
Learning on Incomplete Observations for
Heterogeneous Crowdsensing Networks . . 1092--1109
Jose Yallouz and
Ori Rottenstreich and
Peter Babarczi and
Avi Mendelson and
Ariel Orda Minimum-Weight Link-Disjoint
Node-``Somewhat Disjoint'' Paths . . . . 1110--1122
Gang Wang and
Bolun Wang and
Tianyi Wang and
Ana Nika and
Haitao Zheng and
Ben Y. Zhao Ghost Riders: Sybil Attacks on
Crowdsourced Mobile Mapping Services . . 1123--1136
Kun Xie and
Can Peng and
Xin Wang and
Gaogang Xie and
Jigang Wen and
Jiannong Cao and
Dafang Zhang and
Zheng Qin Accurate Recovery of Internet Traffic
Data Under Variable Rate Measurements 1137--1150
Ye Yu and
Djamal Belazzougui and
Chen Qian and
Qin Zhang Memory-Efficient and Ultra-Fast Network
Lookup and Forwarding Using Othello
Hashing . . . . . . . . . . . . . . . . 1151--1164
Gil Einziger and
Benny Fellman and
Roy Friedman and
Yaron Kassner ICE Buckets: Improved Counter Estimation
for Network Measurement . . . . . . . . 1165--1178
Carlee Joe-Wong and
Soumya Sen and
Sangtae Ha Sponsoring Mobile Data: Analyzing the
Impact on Internet Stakeholders . . . . 1179--1192
Wenxin Li and
Xiaobo Zhou and
Keqiu Li and
Heng Qi and
Deke Guo TrafficShaper: Shaping Inter-Datacenter
Traffic to Reduce the Transmission Cost 1193--1206
Haiying Shen and
Liuhua Chen Resource Demand Misalignment: an
Important Factor to Consider for
Reducing Resource Over-Provisioning in
Cloud Datacenters . . . . . . . . . . . 1207--1221
Kun Xie and
Xiaocan Li and
Xin Wang and
Jiannong Cao and
Gaogang Xie and
Jigang Wen and
Dafang Zhang and
Zheng Qin On-Line Anomaly Detection With High
Accuracy . . . . . . . . . . . . . . . . 1222--1235
Xiaocong Jin and
Yanchao Zhang Privacy-Preserving Crowdsourced Spectrum
Sensing . . . . . . . . . . . . . . . . 1236--1249
Mate Nagy and
Janos Tapolcai and
Gabor Retvari Node Virtualization for IP Level
Resilience . . . . . . . . . . . . . . . 1250--1263
Yitu Wang and
Wei Wang and
Ying Cui and
Kang G. Shin and
Zhaoyang Zhang Distributed Packet Forwarding and
Caching Based on Stochastic Network
Utility Maximization . . . . . . . . . . 1264--1277
Dongxiao Yu and
Yifei Zou and
Jiguo Yu and
Xiuzhen Cheng and
Qiang-Sheng Hua and
Hai Jin and
Francis C. M. Lau Stable Local Broadcast in Multihop
Wireless Networks Under SINR . . . . . . 1278--1291
Marco Chiesa and
Gabor Retvari and
Michael Schapira Oblivious Routing in IP Networks . . . . 1292--1305
Talha Cihad Gulcu and
Vaggos Chatziafratis and
Yingrui Zhang and
Osman Yagan Attack Vulnerability of Power Systems
Under an Equal Load Redistribution Model 1306--1319
Nicolas Huin and
Brigitte Jaumard and
Frederic Giroire Optimal Network Service Chain
Provisioning . . . . . . . . . . . . . . 1320--1333
Sabrina Klos nee Muller and
Cem Tekin and
Mihaela van der Schaar and
Anja Klein Context-Aware Hierarchical Online
Learning for Performance Maximization in
Mobile Crowdsourcing . . . . . . . . . . 1334--1347
Haiying Shen and
Liuhua Chen CompVM: a Complementary VM Allocation
Mechanism for Cloud Systems . . . . . . 1348--1361
Xingliang Yuan and
Huayi Duan and
Cong Wang Assuring String Pattern Matching in
Outsourced Middleboxes . . . . . . . . . 1362--1375
Guo Chen and
Yuanwei Lu and
Yuan Meng and
Bojie Li and
Kun Tan and
Dan Pei and
Peng Cheng and
Layong Luo and
Yongqiang Xiong and
Xiaoliang Wang and
Youjian Zhao FUSO: Fast Multi-Path Loss Recovery for
Data Center Networks . . . . . . . . . . 1376--1389
Guillaume Artero Gallardo and
Gentian Jakllari and
Lucile Canourgues and
Andre-Luc Beylot Statistical Admission Control in
Multi-Hop Cognitive Radio Networks . . . 1390--1403
Marton Sipos and
Josh Gahm and
Narayan Venkat and
Dave Oran Network-Aware Feasible Repairs for
Erasure-Coded Storage . . . . . . . . . 1404--1417
Tao Zhao and
Korok Ray and
I-Hong Hou A Non-Monetary Mechanism for Optimal
Rate Control Through Efficient Cost
Allocation . . . . . . . . . . . . . . . 1418--1431
Fan Wu and
Tong Meng and
Aijing Li and
Guihai Chen and
Nitin H. Vaidya Have You Recorded My Voice: Toward
Robust Neighbor Discovery in Mobile
Wireless Networks . . . . . . . . . . . 1432--1445
Zhen Tu and
Fengli Xu and
Yong Li and
Pengyu Zhang and
Depeng Jin A New Privacy Breach: User Trajectory
Recovery From Aggregated Mobility Data 1446--1459
Huikang Li and
Yi Gao and
Wei Dong and
Chun Chen Taming Both Predictable and
Unpredictable Link Failures for Network
Tomography . . . . . . . . . . . . . . . 1460--1473
Sherif ElAzzouni and
Eylem Ekici Node-Based Distributed Channel Access
With Enhanced Delay Characteristics . . 1474--1487
Chen Tian and
Ali Munir and
Alex X. Liu and
Jie Yang and
Yangming Zhao OpenFunction: an Extensible Data Plane
Abstraction Protocol for
Platform-Independent Software-Defined
Middleboxes . . . . . . . . . . . . . . 1488--1501
Beatriz Lorenzo and
Alireza Shams Shafigh and
Jianqing Liu and
Francisco J. Gonzalez-Castano and
Yuguang Fang Data and Spectrum Trading Policies in a
Trusted Cognitive Dynamic Network
Architecture . . . . . . . . . . . . . . 1502--1516
Kaikai Liu and
Xiaolin Li Enhancing Localization Scalability and
Accuracy via Opportunistic Sensing . . . 1517--1530
Lei Jiao and
Antonia Maria Tulino and
Jaime Llorca and
Yue Jin and
Alessandra Sala Corrections to ``Smoothed Online
Resource Allocation in Multi-Tier
Distributed Cloud Networks'' . . . . . . 1531--1531
Danfeng Shan and
Fengyuan Ren ECN Marking With Micro-Burst Traffic:
Problem, Analysis, and Improvement . . . 1533--1546
Sajad Shirali-Shahreza and
Yashar Ganjali Delayed Installation and Expedited
Eviction: an Alternative Approach to
Reduce Flow Table Occupancy in SDN
Switches . . . . . . . . . . . . . . . . 1547--1561
Tung-Wei Kuo and
Bang-Heng Liou and
Kate Ching-Ju Lin and
Ming-Jer Tsai Deploying Chains of Virtual Network
Functions: On the Relation Between Link
and Server Usage . . . . . . . . . . . . 1562--1576
Apostolos Destounis and
Stefano Paris and
Lorenzo Maggi and
Georgios S. Paschos and
Jeremie Leguay Minimum Cost SDN Routing With
Reconfiguration Frequency Constraints 1577--1590
Yu Ma and
Weifa Liang and
Wenzheng Xu Charging Utility Maximization in
Wireless Rechargeable Sensor Networks by
Charging Multiple Sensors Simultaneously 1591--1604
Hao Yu and
Michael J. Neely A New Backpressure Algorithm for Joint
Rate Control and Routing With Vanishing
Utility Optimality Gaps and Finite Queue
Lengths . . . . . . . . . . . . . . . . 1605--1618
Lixing Chen and
Sheng Zhou and
Jie Xu Computation Peer Offloading for
Energy-Constrained Mobile Edge Computing
in Small-Cell Networks . . . . . . . . . 1619--1632
Anis Elgabli and
Vaneet Aggarwal and
Shuai Hao and
Feng Qian and
Subhabrata Sen LBP: Robust Rate Adaptation Algorithm
for SVC Video Streaming . . . . . . . . 1633--1645
Jianping Weng and
Jessie Hui Wang and
Jiahai Yang and
Yang Root Cause Analysis of Anomalies of
Multitier Services in Public Clouds . . 1646--1659
Jiangbo Qian and
Zhipeng Huang and
Qiang Zhu and
Huahui Chen Hamming Metric Multi-Granularity
Locality-Sensitive Bloom Filter . . . . 1660--1673
Mehrnoosh Shafiee and
Javad Ghaderi An Improved Bound for Minimizing the
Total Weighted Completion Time of
Coflows in Datacenters . . . . . . . . . 1674--1687
Pengjin Xie and
Jingchao Feng and
Zhichao Cao and
Jiliang Wang GeneWave: Fast Authentication and Key
Agreement on Commodity Mobile Devices 1688--1700
Fu Xiao and
Lei Chen and
Chaoheng Sha and
Lijuan Sun and
Ruchuan Wang and
Alex X. Liu and
Faraz Ahmed Noise Tolerant Localization for Sensor
Networks . . . . . . . . . . . . . . . . 1701--1714
Qi Li and
Yanyu Chen and
Patrick P. C. Lee and
Mingwei Xu and
Kui Ren Security Policy Violations in SDN Data
Plane . . . . . . . . . . . . . . . . . 1715--1727
Kai Han and
He Huang and
Jun Luo Quality-Aware Pricing for Mobile
Crowdsensing . . . . . . . . . . . . . . 1728--1741
Jingyuan Fan and
Chaowen Guan and
Kui Ren and
Chunming Qiao Middlebox-Based Packet-Level Redundancy
Elimination Over Encrypted Network
Traffic . . . . . . . . . . . . . . . . 1742--1753
Tatsuya Otoshi and
Yuichi Ohsita and
Masayuki Murata and
Yousuke Takahashi and
Keisuke Ishibashi and
Kohei Shiomoto and
Tomoaki Hashimoto Hierarchical Model Predictive Traffic
Engineering . . . . . . . . . . . . . . 1754--1767
Ping-Chun Hsieh and
I-Hong Hou Heavy-Traffic Analysis of QoE Optimality
for On-Demand Video Streams Over Fading
Channels . . . . . . . . . . . . . . . . 1768--1781
Ravi Kumar Kolla and
Krishna Jagannathan and
Aditya Gopalan Collaborative Learning of Stochastic
Bandits Over a Social Network . . . . . 1782--1795
Peruru Subrahmanya Swamy and
Venkata Pavan Kumar Bellam and
Radha Krishna Ganti and
Krishna Jagannathan Efficient CSMA Using Regional Free
Energy Approximations . . . . . . . . . 1796--1809
Longbo Huang and
Minghua Chen and
Yunxin Liu Learning-Aided Stochastic Network
Optimization With State Prediction . . . 1810--1820
Tong Yang and
Gaogang Xie and
Alex X. Liu and
Qiaobin Fu and
Yanbiao Li and
Xiaoming Li and
Laurent Mathy Constant IP Lookup With FIB Explosion 1821--1836
Gongming Zhao and
Hongli Xu and
Shigang Chen and
Liusheng Huang and
Pengzhan Wang Joint Optimization of Flow Table and
Group Table for Default Paths in SDNs 1837--1850
Timmy Schuller and
Nils Aschenbruck and
Markus Chimani and
Martin Horneffer and
Stefan Schnitter Traffic Engineering Using Segment
Routing and Considering Requirements of
a Carrier IP Network . . . . . . . . . . 1851--1864
Haipeng Dai and
Xiaoyu Wang and
Alex X. Liu and
Huizhen Ma and
Guihai Chen and
Wanchun Dou Wireless Charger Placement for
Directional Charging . . . . . . . . . . 1865--1878
Sebastien Henri and
Christina Vlachou and
Patrick Thiran Multi-Armed Bandit in Action: Optimizing
Performance in Dynamic Hybrid Networks 1879--1892
Abusayeed Saifullah and
Mahbubur Rahman and
Dali Ismail and
Chenyang Lu and
Jie Liu and
Ranveer Chandra Low-Power Wide-Area Network Over White
Spaces . . . . . . . . . . . . . . . . . 1893--1906
Sorrachai Yingchareonthawornchai and
James Daly and
Alex X. Liu and
Eric Torng A Sorted-Partitioning Approach to Fast
and Scalable Dynamic Packet
Classification . . . . . . . . . . . . . 1907--1920
Abubakr O. Al-Abbasi and
Vaneet Aggarwal Video Streaming in Distributed
Erasure-Coded Storage Systems: Stall
Duration Analysis . . . . . . . . . . . 1921--1932
Ning Li and
Jose-Fernan Martinez-Ortega and
Vicente Hernandez Diaz and
Jose Antonio Sanchez Fernandez Probability Prediction-Based Reliable
and Efficient Opportunistic Routing
Algorithm for VANETs . . . . . . . . . . 1933--1947
Zhuotao Liu and
Hao Jin and
Yih-Chun Hu and
Michael Bailey Practical Proactive DDoS-Attack
Mitigation via Endpoint-Driven
In-Network Traffic Control . . . . . . . 1948--1961
Shuo Wang and
Jiao Zhang and
Tao Huang and
Tian Pan and
Jiang Liu and
Yunjie Liu Multi-Attributes-Based Coflow Scheduling
Without Prior Knowledge . . . . . . . . 1962--1975
Xueying Guo and
Rahul Singh and
P. R. Kumar and
Zhisheng Niu A Risk-Sensitive Approach for Packet
Inter-Delivery Time Optimization in
Networked Cyber-Physical Systems . . . . 1976--1989
Morteza Mehrnoush and
Vanlin Sathya and
Sumit Roy and
Monisha Ghosh Analytical Modeling of Wi-Fi and LTE-LAA
Coexistence: Throughput and Impact of
Energy Detection Threshold . . . . . . . 1990--2003
Simone Ferlin and
Stepan Kucera and
Holger Claussen and
Ozgu Alay MPTCP Meets FEC: Supporting
Latency-Sensitive Applications Over
Heterogeneous Networks . . . . . . . . . 2005--2018
Haiming Jin and
Lu Su and
Houping Xiao and
Klara Nahrstedt Incentive Mechanism for Privacy-Aware
Data Aggregation in Mobile Crowd Sensing
Systems . . . . . . . . . . . . . . . . 2019--2032
Ying Cui and
Muriel Medard and
Edmund Yeh and
Douglas Leith and
Ken R. Duffy Optimization-Based Linear Network Coding
for General Connections of Continuous
Flows . . . . . . . . . . . . . . . . . 2033--2047
Haifeng Zhou and
Chunming Wu and
Chengyu Yang and
Pengfei Wang and
Qi Yang and
Zhouhao Lu and
Qiumei Cheng SDN--RDCD: a Real-Time and Reliable
Method for Detecting Compromised SDN
Devices . . . . . . . . . . . . . . . . 2048--2061
Ming Tang and
Haitian Pang and
Shou Wang and
Lin Gao and
Jianwei Huang and
Lifeng Sun Multi-Dimensional Auction Mechanisms for
Crowdsourced Mobile Video Streaming . . 2062--2075
Christopher G. Brinton and
Swapna Buccapatnam and
Liang Zheng and
Da Cao and
Andrew S. Lan and
Felix M. F. Wong and
Sangtae Ha and
Mung Chiang and
H. Vincent Poor On the Efficiency of Online Social
Learning Networks . . . . . . . . . . . 2076--2089
Jianan Zhang and
Eytan Modiano Connectivity in Interdependent Networks 2090--2103
Yifei Yuan and
Dong Lin and
Siri Anil and
Harsh Verma and
Anirudh Chelluri and
Rajeev Alur and
Boon Thau Loo NetEgg: a Scenario-Based Programming
Toolkit for SDN Policies . . . . . . . . 2104--2117
Hao Feng and
Jaime Llorca and
Antonia M. Tulino and
Andreas F. Molisch Optimal Dynamic Cloud Network Control 2118--2131
Yifei Zhu and
Silvery D. Fu and
Jiangchuan Liu and
Yong Cui Truthful Online Auction Toward Maximized
Instance Utilization in the Cloud . . . 2132--2145
Lei Xie and
Qingliang Cai and
Alex X. Liu and
Wei Wang and
Yafeng Yin and
Sanglu Lu Synchronize Inertial Readings From
Multiple Mobile Devices in Spatial
Dimension . . . . . . . . . . . . . . . 2146--2159
Satyam Agarwal and
Swades De Rural Broadband Access via Clustered
Collaborative Communication . . . . . . 2160--2173
Seongmin Kim and
Juhyeng Han and
Jaehyeong Ha and
Taesoo Kim and
Dongsu Han SGX-Tor: a Secure and Practical Tor
Anonymity Network With SGX Enclaves . . 2174--2187
Robert Soule and
Shrutarshi Basu and
Parisa Jalili Marandi and
Fernando Pedone and
Robert Kleinberg and
Emin Gun Sirer and
Nate Foster Merlin: a Language for Managing Network
Resources . . . . . . . . . . . . . . . 2188--2201
Konstantinos Psychas and
Javad Ghaderi Randomized Algorithms for Scheduling
Multi-Resource Jobs in the Cloud . . . . 2202--2215
Leonardo Maccari and
Renato Lo Cigno Improving Routing Convergence With
Centrality: Theory and Implementation of
Pop-Routing . . . . . . . . . . . . . . 2216--2229
Zhemin Qian and
Fujie Fan and
Bing Hu and
Kwan L. Yeung and
Liyan Li Global Round Robin: Efficient Routing
With Cut-Through Switching in Fat-Tree
Data Center Networks . . . . . . . . . . 2230--2241
Tianyuan Sun and
Yongcai Wang and
Deying Li and
Zhaoquan Gu and
Jia Xu WCS: Weighted Component Stitching for
Sparse Network Localization . . . . . . 2242--2253
Jianyuan Lu and
Tong Yang and
Yi Wang and
Huichen Dai and
Xi Chen and
Linxiao Jin and
Haoyu Song and
Bin Liu Low Computational Cost Bloom Filters . . 2254--2267
Monireh Dabaghchian and
Amir Alipour-Fanid and
Kai Zeng and
Qingsi Wang and
Peter Auer Online Learning With Randomized Feedback
Graphs for Optimal PUE Attacks in
Cognitive Radio Networks . . . . . . . . 2268--2281
Anfu Zhou and
Teng Wei and
Xinyu Zhang and
Huadong Ma FastND: Accelerating Directional
Neighbor Discovery for 60-GHz
Millimeter-Wave Wireless Networks . . . 2282--2295
Li-On Raviv and
Amir Leshem Maximizing Service Reward for Queues
With Deadlines . . . . . . . . . . . . . 2296--2308
Chunpu Wang and
Chen Feng and
Julian Cheng Distributed Join-the-Idle-Queue for Low
Latency Cloud Services . . . . . . . . . 2309--2319
Yonglong Zhang and
Konstantinos Psounis Consistently High MIMO Rates via
Switched-Beam Antennas . . . . . . . . . 2320--2333
Neminath Hubballi and
Mayank Swarnkar BitCoding: Network Traffic
Classification Through Encoded Bit Level
Signatures . . . . . . . . . . . . . . . 2334--2346
Quan Chen and
Hong Gao and
Zhipeng Cai and
Lianglun Cheng and
Jianzhong Li Distributed Low-Latency Data Aggregation
for Duty-Cycle Wireless Sensor Networks 2347--2360
Vincenzo Sciancalepore and
Ilario Filippini and
Vincenzo Mancuso and
Antonio Capone and
Albert Banchs A Multi-Traffic Inter-Cell Interference
Coordination Scheme in Dense Cellular
Networks . . . . . . . . . . . . . . . . 2361--2375
Xiong Wang and
Mehdi Malboubi and
Zhihao Pan and
Jing Ren and
Sheng Wang and
Shizhong Xu and
Chen-Nee Chuah ProgLIMI: Programmable LInk Metric
Identification in Software-Defined
Networks . . . . . . . . . . . . . . . . 2376--2389
Yasaman Ghasempour and
Muhammad Kumail Haider and
Edward W. Knightly Decoupling Beam Steering and User
Selection for MU--MIMO 60-GHz WLANs . . 2390--2403
Zhao Zhang and
Weili Wu and
Jing Yuan and
Ding-Zhu Du Breach-Free Sleep-Wakeup Scheduling for
Barrier Coverage With Heterogeneous
Wireless Sensors . . . . . . . . . . . . 2404--2413
Mengyao Ge and
Douglas M. Blough High Throughput and Fair Scheduling for
Multi-AP Multiuser MIMO in Dense
Wireless Networks . . . . . . . . . . . 2414--2427
Haipeng Dai and
Muhammad Shahzad and
Alex X. Liu and
Meng Li and
Yuankun Zhong and
Guihai Chen Identifying and Estimating Persistent
Items in Data Streams . . . . . . . . . 2429--2442
Ning Wu and
Yingjie Bi and
Nithin Michael and
Ao Tang and
John C. Doyle and
Nikolai Matni A Control-Theoretic Approach to
In-Network Congestion Management . . . . 2443--2456
Kun Chen and
Longbo Huang Timely-Throughput Optimal Scheduling
With Prediction . . . . . . . . . . . . 2457--2470
Pavlos Sermpezis and
Vasileios Kotronis and
Petros Gigis and
Xenofontas Dimitropoulos and
Danilo Cicalese and
Alistair King and
Alberto Dainotti ARTEMIS: Neutralizing BGP Hijacking
Within a Minute . . . . . . . . . . . . 2471--2486
Gek Hong Sim and
Sabrina Klos and
Arash Asadi and
Anja Klein and
Matthias Hollick An Online Context-Aware Machine Learning
Algorithm for $5$G mmWave Vehicular
Communications . . . . . . . . . . . . . 2487--2500
Subhashini Krishnasamy and
P. T. Akhil and
Ari Arapostathis and
Rajesh Sundaresan and
Sanjay Shakkottai Augmenting Max-Weight With Explicit
Learning for Wireless Scheduling With
Switching Costs . . . . . . . . . . . . 2501--2514
Yi Gao and
Yuan Jing and
Wei Dong UniROPE: Universal and Robust Packet
Trajectory Tracing for Software-Defined
Networks . . . . . . . . . . . . . . . . 2515--2527
Jiaxiao Zheng and
Pablo Caballero and
Gustavo de Veciana and
Seung Jun Baek and
Albert Banchs Statistical Multiplexing and Traffic
Shaping Games for Network Slicing . . . 2528--2541
Yuanjie Li and
Chunyi Peng and
Haotian Deng and
Zengwen Yuan and
Guan-Hua Tu and
Jiayao Li and
Songwu Lu and
Xi Li Device-Customized Multi-Carrier Network
Access on Commodity Smartphones . . . . 2542--2555
Changhee Joo and
Atilla Eryilmaz Wireless Scheduling for Information
Freshness and Synchrony: Drift-Based
Design and Heavy-Traffic Analysis . . . 2556--2568
Arne Ludwig and
Szymon Dudycz and
Matthias Rost and
Stefan Schmid Transiently Policy-Compliant Network
Updates . . . . . . . . . . . . . . . . 2569--2582
Michael Borokhovich and
Yvonne-Anne Pignolet and
Stefan Schmid and
Gilles Tredan Load-Optimal Local Fast Rerouting for
Dense Networks . . . . . . . . . . . . . 2583--2597
Haichuan Ding and
Xuanheng Li and
Ying Cai and
Beatriz Lorenzo and
Yuguang Fang Intelligent Data Transportation in Smart
Cities: a Spectrum-Aware Approach . . . 2598--2611
Reuven Cohen and
Evgeny Moroshko Sampling-on-Demand in SDN . . . . . . . 2612--2622
Gourav Saha and
Alhussein A. Abouzeid and
Marja Matinmikko-Blue Online Algorithm for Leasing Wireless
Channels in a Three-Tier Spectrum
Sharing Framework . . . . . . . . . . . 2623--2636
Igor Kadota and
Abhishek Sinha and
Elif Uysal-Biyikoglu and
Rahul Singh and
Eytan Modiano Scheduling Policies for Minimizing Age
of Information in Broadcast Wireless
Networks . . . . . . . . . . . . . . . . 2637--2650
Fengxian Guo and
Heli Zhang and
Hong Ji and
Xi Li and
Victor C. M. Leung An Efficient Computation Offloading
Management Scheme in the Densely
Deployed Small Cell Networks With Mobile
Edge Computing . . . . . . . . . . . . . 2651--2664
Andres Garcia-Saavedra and
Paul Patras and
Victor Valls and
Xavier Costa-Perez and
Douglas J. Leith ORLA/OLAA: Orthogonal Coexistence of LAA
and WiFi in Unlicensed Spectrum . . . . 2665--2678
Aakanksha Chowdhery and
Kyle Jamieson Aerial Channel Prediction and User
Scheduling in Mobile Drone Hotspots . . 2679--2692
Mao Zou and
Richard T. B. Ma and
Xin Wang and
Yinlong Xu On Optimal Service Differentiation in
Congested Network Markets . . . . . . . 2693--2706
Xuanyu Cao and
Junshan Zhang and
H. Vincent Poor Data Center Demand Response With On-Site
Renewable Generation: a Bargaining
Approach . . . . . . . . . . . . . . . . 2707--2720
Jean-Yves Le Boudec A Theory of Traffic Regulators for
Deterministic Networks With Application
to Interleaved Regulators . . . . . . . 2721--2733
Cheol-Ho Hong and
Kyungwoon Lee and
Jaehyun Hwang and
Hyunchan Park and
Chuck Yoo Kafe: Can OS Kernels Forward Packets
Fast Enough for Software Routers? . . . 2734--2747
Yibo Pi and
Sugih Jamin and
Peter Danzig and
Jacob Shaha AP-Atoms: a High-Accuracy Data-Driven
Client Aggregation for Global Load
Balancing . . . . . . . . . . . . . . . 2748--2761
Lichao Yang and
Heli Zhang and
Xi Li and
Hong Ji and
Victor C. M. Leung A Distributed Computation Offloading
Strategy in Small-Cell Networks
Integrated With Mobile Edge Computing 2762--2773
Xiwen Yu and
Hongli Xu and
Da Yao and
Haibo Wang and
Liusheng Huang CountMax: a Lightweight and Cooperative
Sketch Measurement for Software-Defined
Networks . . . . . . . . . . . . . . . . 2774--2786
Mohamed Lamine Lamali and
Nasreddine Fergani and
Johanne Cohen Algorithmic and Complexity Aspects of
Path Computation in Multi-Layer Networks 2787--2800
Francesca Fossati and
Sahar Hoteit and
Stefano Moretti and
Stefano Secci Fair Resource Allocation in Systems With
Complete Information Sharing . . . . . . 2801--2814
Salvatore D'Oro and
Francesco Restuccia and
Tommaso Melodia and
Sergio Palazzo Low-Complexity Distributed Radio Access
Network Slicing: Algorithms and
Experimental Results . . . . . . . . . . 2815--2828
Anna Engelmann and
Wolfgang Bziuk and
Admela Jukan and
Muriel Medard Exploiting Parallelism With Random
Linear Network Coding in High-Speed
Ethernet Systems . . . . . . . . . . . . 2829--2842
An Wang and
Wentao Chang and
Songqing Chen and
Aziz Mohaisen Delving Into Internet DDoS Attacks by
Botnets: Characterization and Analysis 2843--2855
Ping Zhao and
Hongbo Jiang and
John C. S. Lui and
Chen Wang and
Fanzi Zeng and
Fu Xiao and
Zhetao Li P3-LOC: a Privacy-Preserving
Paradigm-Driven Framework for Indoor
Localization . . . . . . . . . . . . . . 2856--2869
Xudong Wu and
Luoyi Fu and
Yuhang Yao and
Xinzhe Fu and
Xinbing Wang and
Guihai Chen GLP: a Novel Framework for Group-Level
Location Promotion in Geo-Social
Networks . . . . . . . . . . . . . . . . 2870--2883
Wei Dong and
Chenhong Cao and
Xiaoyu Zhang and
Yi Gao Understanding Path Reconstruction
Algorithms in Multihop Wireless Networks 1--14
Alireza Shams Shafigh and
Savo Glisic and
Ekram Hossain and
Beatriz Lorenzo and
Luiz A. DaSilva User-Centric Distributed Spectrum
Sharing in Dynamic Network Architectures 15--28
Siddhartha S. Borkotoky and
Michael B. Pursley Fountain-Coded Broadcast Distribution in
Multiple-Hop Packet Radio Networks . . . 29--41
Jihong Yu and
Wei Gong and
Jiangchuan Liu and
Lin Chen and
Kehao Wang On Efficient Tree-Based Tag Search in
Large-Scale RFID Systems . . . . . . . . 42--55
Alain Pegatoquet and
Trong Nhan Le and
Michele Magno A Wake-Up Radio-Based MAC Protocol for
Autonomous Wireless Sensor Networks . . 56--70
Wahhab Albazrqaoe and
Jun Huang and
Guoliang Xing A Practical Bluetooth Traffic Sniffing
System: Design, Implementation, and
Countermeasure . . . . . . . . . . . . . 71--84
Sladana Josilo and
Gyorgy Dan Decentralized Algorithm for Randomized
Task Allocation in Fog Computing Systems 85--97
Guoming Tang and
Huan Wang and
Kui Wu and
Deke Guo Tapping the Knowledge of Dynamic Traffic
Demands for Optimal CDN Design . . . . . 98--111
John Tadrous and
Atilla Eryilmaz and
Ashutosh Sabharwal Action-Based Scheduling: Leveraging App
Interactivity for Scheduler Efficiency 112--125
Jiaqi Liu and
Luoyi Fu and
Yuhang Yao and
Xinzhe Fu and
Xinbing Wang and
Guihai Chen Modeling, Analysis and Validation of
Evolving Networks With Hybrid
Interactions . . . . . . . . . . . . . . 126--142
Qingjun Xiao and
Shigang Chen and
Jia Liu and
Guang Cheng and
Junzhou Luo A Protocol for Simultaneously Estimating
Moments and Popular Groups in a
Multigroup RFID System . . . . . . . . . 143--158
Jia Liu and
Shigang Chen and
Qingjun Xiao and
Min Chen and
Bin Xiao and
Lijun Chen Efficient Information Sampling in
Multi-Category RFID Systems . . . . . . 159--172
Peng Zhang and
Cheng Zhang and
Chengchen Hu Fast Data Plane Testing for
Software-Defined Networks With
RuleChecker . . . . . . . . . . . . . . 173--186
Wenping Liu and
Hongbo Jiang and
Guoyin Jiang and
Jiangchuan Liu and
Xiaoqiang Ma and
Yufu Jia and
Fu Xiao Indoor Navigation With Virtual Graph
Representation: Exploiting Peak
Intensities of Unmodulated Luminaries 187--200
Xiaofeng Gao and
Yuanning Gao and
Yichen Zhu and
Guihai Chen U2-Tree: a Universal Two-Layer
Distributed Indexing Scheme for Cloud
Storage System . . . . . . . . . . . . . 201--213
Yong Cui and
Yimin Jiang and
Zeqi Lai and
Xiaomeng Chen and
Y. Charlie Hu and
Kun Tan and
Minglong Dai and
Kai Zheng and
Yi Li Wireless Network Instabilities in the
Wild: Measurement, Applications
NonResilience, and OS Remedy . . . . . . 214--230
Xu Zhang and
Edward W. Knightly CSIsnoop: Inferring Channel State
Information in Multi-User MIMO WLANs . . 231--244
Linsong Cheng and
Jiliang Wang Walls Have No Ears: a Non-Intrusive
WiFi-Based User Identification System
for Mobile Devices . . . . . . . . . . . 245--257
Yigal Bejerano and
Chandrashekhar Raman and
Chun-Nam Yu and
Varun Gupta and
Craig Gutterman and
Tomas Young and
Hugo A. Infante and
Yousef M. Abdelmalek and
Gil Zussman DyMo: Dynamic Monitoring of Large-Scale
LTE-Multicast Systems . . . . . . . . . 258--271
Jianer Zhou and
Zhenyu Li and
Qinghua Wu and
Peter Steenkiste and
Steve Uhlig and
Jun Li and
Gaogang Xie TCP Stalls at the Server Side:
Measurement and Mitigation . . . . . . . 272--287
Konstantinos Poularakis and
George Iosifidis and
Georgios Smaragdakis and
Leandros Tassiulas Optimizing Gradual SDN Upgrades in ISP
Networks . . . . . . . . . . . . . . . . 288--301
Per Hurtig and
Karl-Johan Grinnemo and
Anna Brunstrom and
Simone Ferlin and
Ozgu Alay and
Nicolas Kuhn Low-Latency Scheduling in MPTCP . . . . 302--315
Ali Maatouk and
Mohamad Assaad and
Anthony Ephremides Energy Efficient and Throughput Optimal
CSMA Scheme . . . . . . . . . . . . . . 316--329
Meng Jin and
Yuan He and
Xin Meng and
Yilun Zheng and
Dingyi Fang and
Xiaojiang Chen FlipTracer: Practical Parallel Decoding
for Backscatter Communication . . . . . 330--343
Zhenhua Han and
Haisheng Tan and
Rui Wang and
Guihai Chen and
Yupeng Li and
Francis Chi Moon Lau Energy-Efficient Dynamic Virtual Machine
Management in Data Centers . . . . . . . 344--360
Chengwen Luo and
Xiao Liu and
Wanli Xue and
Yiran Shen and
Jianqiang Li and
Wen Hu and
Alex X. Liu Predictable Privacy-Preserving Mobile
Crowd Sensing: a Tale of Two Roles . . . 361--374
Yahui Sun and
Marcus Brazil and
Doreen Thomas and
Saman Halgamuge The Fast Heuristic Algorithms and
Post-Processing Techniques to Design
Large and Low-Cost Communication
Networks . . . . . . . . . . . . . . . . 375--388
Sen Liu and
Jiawei Huang and
Yutao Zhou and
Jianxin Wang and
Tian He Task-Aware TCP in Data Center Networks 389--404
Taha Bouchoucha and
Chen-Nee Chuah and
Zhi Ding Topology Inference of Unknown Networks
Based on Robust Virtual Coordinate
Systems . . . . . . . . . . . . . . . . 405--418
David Lynch and
Michael Fenton and
David Fagan and
Stepan Kucera and
Holger Claussen and
Michael O'Neill Automated Self-Optimization in
Heterogeneous Wireless Communications
Networks . . . . . . . . . . . . . . . . 419--432
Satyam Agarwal and
Francesco Malandrino and
Carla Fabiana Chiasserini and
Swades De VNF Placement and Resource Allocation
for the Support of Vertical Services in
$5$G Networks . . . . . . . . . . . . . 433--446
Li Lu and
Jiadi Yu and
Yingying Chen and
Hongbo Liu and
Yanmin Zhu and
Linghe Kong and
Minglu Li Lip Reading-Based User Authentication
Through Acoustic Sensing on Smartphones 447--460
Oladele Theophilus Sule and
Roberto Rojas-Cessa and
Ziqian Dong and
Chuan-Bi Lin A Split-Central-Buffered Load-Balancing
Clos-Network Switch With In-Order
Forwarding . . . . . . . . . . . . . . . 467--476
Mostafa Dehghan and
Weibo Chu and
Philippe Nain and
Don Towsley and
Zhi-Li Zhang Sharing Cache Resources Among Content
Providers: a Utility-Based Approach . . 477--490
Chang-Heng Wang and
Jaime Llorca and
Antonia M. Tulino and
Tara Javidi Dynamic Cloud Network Control Under
Reconfiguration Delay and Cost . . . . . 491--504
Vijay S. Rao and
R. Venkatesha Prasad and
T. V. Prabhakar and
Chayan Sarkar and
Madhusudan Koppal and
Ignas Niemegeers Understanding and Improving the
Performance of Constructive Interference
Using Destructive Interference in WSNs 505--517
Xianjin Xia and
Shining Li and
Yu Zhang and
Bingqi Li and
Yuanqing Zheng and
Tao Gu Enabling Out-of-Band Coordination of
Wi-Fi Communications on Smartphones . . 518--531
Irem Koprulu and
Yoora Kim and
Ness B. Shroff Battle of Opinions Over Evolving Social
Networks . . . . . . . . . . . . . . . . 532--545
Liang Song and
Chunyan Liu and
Hejiao Huang and
Hongwei Du and
Xiaohua Jia Minimum Connected Dominating Set Under
Routing Cost Constraint in Wireless
Sensor Networks With Different
Transmission Ranges . . . . . . . . . . 546--559
Ahmed Osama Fathy Atya and
Zhiyun Qian and
Srikanth V. Krishnamurthy and
Thomas La Porta and
Patrick McDaniel and
Lisa M. Marvel Catch Me if You Can: a Closer Look at
Malicious Co-Residency on the Cloud . . 560--576
Vaibhav Bajpai and
Jurgen Schonwalder A Longitudinal View of Dual-Stacked
Websites --- Failures, Latency and Happy
Eyeballs . . . . . . . . . . . . . . . . 577--590
Balint Tillman and
Athina Markopoulou and
Minas Gjoka and
Carter T. Buttsc 2K+ Graph Construction Framework:
Targeting Joint Degree Matrix and Beyond 591--606
S. Ramakrishnan and
Venkatesh Ramaiyan Completely Uncoupled Algorithms for
Network Utility Maximization . . . . . . 607--620
Xin Li and
Minmei Wang and
Huazhe Wang and
Ye Yu and
Chen Qian Toward Secure and Efficient
Communication for the Internet of Things 621--634
Roman Naumann and
Stefan Dietzel and
Bjorn Scheuermann Push the Barrier: Discrete Event
Protocol Emulation . . . . . . . . . . . 635--648
Xiang Li and
J. David Smith and
Thang N. Dinh and
My T. Thai TipTop: Almost Exact Solutions for
Influence Maximization in Billion-Scale
Networks . . . . . . . . . . . . . . . . 649--661
Pablo Caballero and
Albert Banchs and
Gustavo De Veciana and
Xavier Costa-Perez Network Slicing Games: Enabling
Customization in Multi-Tenant Mobile
Networks . . . . . . . . . . . . . . . . 662--675
Ming-Chun Lee and
Andreas F. Molisch and
Nishanth Sastry and
Aravindh Raman Individual Preference Probability
Modeling and Parameterization for Video
Content in Wireless Caching Networks . . 676--690
Yehuda Afek and
Anat Bremler-Barr and
Shir Landau Feibish Zero-Day Signature Extraction for
High-Volume Attacks . . . . . . . . . . 691--706
Cataldo Basile and
Fulvio Valenza and
Antonio Lioy and
Diego R. Lopez and
Antonio Pastor Perales Adding Support for Automatic Enforcement
of Security Policies in NFV Networks . . 707--720
Hui Cui and
Robert H. Deng and
Guilin Wang An Attribute-Based Framework for Secure
Communications in Vehicular Ad Hoc
Networks . . . . . . . . . . . . . . . . 721--733
Bijoy Chand Chatterjee and
Fujun He and
Eiji Oki and
Andrea Fumagalli and
Naoaki Yamanaka A Span Power Management Scheme for Rapid
Lightpath Provisioning and Releasing in
Multi-Core Fiber Networks . . . . . . . 734--747
Qingjun Xiao and
Youlin Zhang and
Shigang Chen and
Min Chen and
Jia Liu and
Guang Cheng and
Junzhou Luo Estimating Cardinality of Arbitrary
Expression of Multiple Tag Sets in a
Distributed RFID System . . . . . . . . 748--762
Peshal Nayak and
Michele Garetto and
Edward W. Knightly Modeling Multi-User WLANs Under
Closed-Loop Traffic . . . . . . . . . . 763--776
Chavoosh Ghasemi and
Hamed Yousefi and
Kang G. Shin and
Beichuan Zhang On the Granularity of Trie-Based Data
Structures for Name Lookups and Updates 777--789
Shih-Hao Tseng and
Ao Tang and
Gagan L. Choudhury and
Simon Tse Routing Stability in Hybrid
Software-Defined Networks . . . . . . . 790--804
Kai Gao and
Qiao Xiang and
Xin Wang and
Yang Richard Yang and
Jun Bi An Objective-Driven On-Demand Network
Abstraction for Adaptive Applications 805--818
Qiongzheng Lin and
Lei Yang and
Chunhui Duan and
Zhenlin An Tash: Toward Selective Reading as Hash
Primitives for Gen2 RFIDs . . . . . . . 819--834
Abubakr O. Al-Abbasi and
Vaneet Aggarwal and
Moo-Ryong Ra Multi-Tier Caching Analysis in CDN-Based
Over-the-Top Video Streaming Systems . . 835--847
Qian Wang and
Jing Huang and
Yanjiao Chen and
Xin Tian and
Qian Zhang Privacy-Preserving and Truthful Double
Auction for Heterogeneous Spectrum . . . 848--861
Kunal Phalak and
D. Manjunath and
Jayakrishnan Nair Zero Rating: The Power in the Middle . . 862--874
Josu Doncel and
Samuli Aalto and
Urtzi Ayesta Performance Degradation in
Parallel-Server Systems . . . . . . . . 875--888
Shuihai Hu and
Yibo Zhu and
Peng Cheng and
Chuanxiong Guo and
Kun Tan and
Jitendra Padhye and
Kai Chen Tagger: Practical PFC Deadlock
Prevention in Data Center Networks . . . 889--902
Michael J. Neely Convergence and Adaptation for Utility
Optimal Opportunistic Scheduling . . . . 904--917
Giovanni Chisci and
Hesham Elsawy and
Andrea Conti and
Mohamed-Slim Alouini and
Moe Z. Win Uncoordinated Massive Wireless Networks:
Spatiotemporal Models and Multiaccess
Strategies . . . . . . . . . . . . . . . 918--931
Zicheng Chi and
Yan Li and
Hongyu Sun and
Yao and
Ting Zhu Concurrent Cross-Technology
Communication Among Heterogeneous IoT
Devices . . . . . . . . . . . . . . . . 932--947
Jia Liu and
Bin Xiao and
Xuan Liu and
Kai Bu and
Lijun Chen and
Changhai Nie Efficient Polling-Based Information
Collection in RFID Systems . . . . . . . 948--961
Abbas Kiani and
Nirwan Ansari and
Abdallah Khreishah Hierarchical Capacity Provisioning for
Fog Computing . . . . . . . . . . . . . 962--971
Jiaxi Gu and
Jiliang Wang and
Zhiwen Yu and
Kele Shen Traffic-Based Side-Channel Attack in
Video Streaming . . . . . . . . . . . . 972--985
Meng Zhang and
Lin Gao and
Jianwei Huang and
Michael L. Honig Hybrid Pricing for Mobile Collaborative
Internet Access . . . . . . . . . . . . 986--999
Marco Di Bartolomeo and
Valentino Di Donato and
Maurizio Pizzonia and
Claudio Squarcella and
Massimo Rimondini Extracting Routing Events From
Traceroutes: a Matter of Empathy . . . . 1000--1012
Mostafa Dehghan and
Laurent Massoulie and
Don Towsley and
Daniel Sadoc Menasche and
Y. C. Tay A Utility Optimization Approach to
Network Cache Design . . . . . . . . . . 1013--1027
Tie Qiu and
Jie Liu and
Weisheng Si and
Dapeng Oliver Wu Robustness Optimization Scheme With
Multi-Population Co-Evolution for
Scale-Free Wireless Sensor Networks . . 1028--1042
Semih Cayci and
Atilla Eryilmaz Optimal Learning for Dynamic Coding in
Deadline-Constrained Multi-Channel
Networks . . . . . . . . . . . . . . . . 1043--1054
Linghe Kong and
Yifeng Cao and
Liang He and
Guihai Chen and
Min-You Wu and
Tian He Multi-Rate Selection in ZigBee . . . . . 1055--1068
Wenchao Jiang and
Zhimeng Yin and
Ruofeng Liu and
Zhijun Li and
Song Min Kim and
Tian He Boosting the Bitrate of Cross-Technology
Communication on Commodity IoT Devices 1069--1083
Hirotada Honda and
Hiroshi Saito Nation-Wide Disaster Avoidance Control
Against Heavy Rain . . . . . . . . . . . 1084--1097
Zongzong Lin and
Wenlian Lu and
Shouhuai Xu Unified Preventive and Reactive Cyber
Defense Dynamics Is Still Globally
Convergent . . . . . . . . . . . . . . . 1098--1111
Kung-Jui Pai and
Jou-Ming Chang Dual-CISTs: Configuring a Protection
Routing on Some Cayley Networks . . . . 1112--1123
Zonghui Li and
Hai Wan and
Zaiyu Pang and
Qiubo Chen and
Yangdong Deng and
Xibin Zhao and
Yue Gao and
Xiaoyu Song and
Ming Gu An Enhanced Reconfiguration for
Deterministic Transmission in
Time-Triggered Networks . . . . . . . . 1124--1137
Anis Elgabli and
Muhamad Felemban and
Vaneet Aggarwal GroupCast: Preference-Aware Cooperative
Video Streaming With Scalable Video
Coding . . . . . . . . . . . . . . . . . 1138--1150
Duong Tung Nguyen and
Long Bao Le and
Vijay K. Bhargava A Market-Based Framework for
Multi-Resource Allocation in Fog
Computing . . . . . . . . . . . . . . . 1151--1164
Federico Chiariotti and
Stepan Kucera and
Andrea Zanella and
Holger Claussen Analysis and Design of a Latency Control
Protocol for Multi-Path Data Delivery
With Pre-Defined QoS Guarantees . . . . 1165--1178
Xiulong Liu and
Jiannong Cao and
Yanni Yang and
Wenyu Qu and
Xibin Zhao and
Keqiu Li and
Didi Yao Fast RFID Sensory Data Collection:
Trade-off Between Computation and
Communication Costs . . . . . . . . . . 1179--1191
Thi-Minh Nguyen and
Andre Girard and
Catherine Rosenberg and
Serge Fdida Routing via Functions in Virtual
Networks: The Curse of Choices . . . . . 1192--1205
Jaehyun Nam and
Hyeonseong Jo and
Yeonkeun Kim and
Phillip Porras and
Vinod Yegneswaran and
Seungwon Shin Operator-Defined Reconfigurable Network
OS for Software-Defined Networks . . . . 1206--1219
Kaiping Xue and
Peixuan He and
Xiang Zhang and
Qiudong Xia and
David S. L. Wei and
Hao Yue and
Feng Wu A Secure, Efficient, and Accountable
Edge-Based Access Control Framework for
Information Centric Networks . . . . . . 1220--1233
Junjie Xie and
Deke Guo and
Chen Qian and
Lei Liu and
Bangbang Ren and
Honghui Chen Validation of Distributed SDN Control
Plane Under Uncertain Failures . . . . . 1234--1247
Ahmed M. Bedewy and
Yin Sun and
Ness B. Shroff The Age of Information in Multihop
Networks . . . . . . . . . . . . . . . . 1248--1257
Han Deng and
Tao Zhao and
I-Hong Hou Online Routing and Scheduling With
Capacity Redundancy for Timely Delivery
Guarantees in Multihop Networks . . . . 1258--1271
Shiqiang Wang and
Rahul Urgaonkar and
Murtaza Zafer and
Ting He and
Kevin Chan and
Kin K. Leung Dynamic Service Migration in Mobile Edge
Computing Based on Markov Decision
Process . . . . . . . . . . . . . . . . 1272--1288
G. Enrico Santagati and
Tommaso Melodia Corrections to ``A Software-Defined
Ultrasonic Networking Framework for
Wearable Devices'' . . . . . . . . . . . 1289--1289
Giovanni Chisci and
Andrea Conti and
Lorenzo Mucchi and
Moe Z. Win Intrinsic Secrecy in Inhomogeneous
Stochastic Networks . . . . . . . . . . 1291--1304
Anvitha Nandigam and
Suraj Jog and
D. Manjunath and
Jayakrishnan Nair and
Balakrishna J. Prabhu Sharing Within Limits: Partial Resource
Pooling in Loss Systems . . . . . . . . 1305--1318
Tianheng Wang and
Andrea Conti and
Moe Z. Win Network Navigation With Scheduling:
Distributed Algorithms . . . . . . . . . 1319--1329
Chien-Sheng Yang and
Ramtin Pedarsani and
A. Salman Avestimehr Communication-Aware Scheduling of Serial
Tasks for Dispersed Computing . . . . . 1330--1343
George Trimponias and
Yan Xiao and
Xiaorui Wu and
Hong Xu and
Yanhui Geng Node-Constrained Traffic Engineering:
Theory and Applications . . . . . . . . 1344--1358
Igor Kadota and
Abhishek Sinha and
Eytan Modiano Scheduling Algorithms for Optimizing Age
of Information in Wireless Networks With
Throughput Constraints . . . . . . . . . 1359--1372
Shengchao Liu and
Jianping Weng and
Jessie Hui Wang and
Changqing An and
Yipeng Zhou and
Jilong Wang An Adaptive Online Scheme for Scheduling
and Resource Enforcement in Storm . . . 1373--1386
Bruno Y. L. Kimura and
Demetrius C. S. F. Lima and
Leandro A. Villas and
Antonio A. F. Loureiro Interpath Contention in MultiPath TCP
Disjoint Paths . . . . . . . . . . . . . 1387--1400
Vishal Shrivastav and
Ki Suh Lee and
Han Wang and
Hakim Weatherspoon Globally Synchronized Time via
Datacenter Networks . . . . . . . . . . 1401--1416
James Daly and
Valerio Bruschi and
Leonardo Linguaglossa and
Salvatore Pontarelli and
Dario Rossi and
Jerome Tollet and
Eric Torng and
Andrew Yourtchenko TupleMerge: Fast Software Packet
Processing for Online Packet
Classification . . . . . . . . . . . . . 1417--1431
Ran Ben Basat and
Xiaoqi Chen and
Gil Einziger and
Roy Friedman and
Yaron Kassner Randomized Admission Policy for
Efficient Top-$k$, Frequency, and Volume
Estimation . . . . . . . . . . . . . . . 1432--1445
Yahia Shabara and
C. Emre Koksal and
Eylem Ekici Beam Discovery Using Linear Block Codes
for Millimeter Wave Communication
Networks . . . . . . . . . . . . . . . . 1446--1459
Zhizhen Zhong and
Nan Hua and
Massimo Tornatore and
Jialong Li and
Yanhe Li and
Xiaoping Zheng and
Biswanath Mukherjee Provisioning Short-Term Traffic
Fluctuations in Elastic Optical Networks 1460--1473
Miroslaw Klinkowski and
Krzysztof Walkowiak An Efficient Optimization Framework for
Solving RSSA Problems in Spectrally and
Spatially Flexible Optical Networks . . 1474--1486
Jie Chuai and
Victor O. K. Li An Analytical Framework for Resource
Allocation Between Data and Delayed
Network State Information . . . . . . . 1487--1500
Hao Yu and
Michael J. Neely Learning-Aided Optimization for
Energy-Harvesting Devices With Outdated
State Information . . . . . . . . . . . 1501--1514
Xiaonan Zhang and
Pei Huang and
Linke Guo and
Yuguang Fang Social-Aware Energy-Efficient Data
Offloading With Strong Stability . . . . 1515--1528
Thibaut Stimpfling and
Normand Belanger and
J. M. Pierre Langlois and
Yvon Savaria SHIP: a Scalable High-Performance IPv6
Lookup Algorithm That Exploits Prefix
Characteristics . . . . . . . . . . . . 1529--1542
Vincenzo Sciancalepore and
Xavier Costa-Perez and
Albert Banchs RL-NSB: Reinforcement Learning-Based
$5$G Network Slice Broker . . . . . . . 1543--1557
Yuedong Xu and
Zhujun Xiao and
Tianyu Ni and
Jessie Hui Wang and
Xin Wang and
Eitan Altman On The Robustness of Price-Anticipating
Kelly Mechanism . . . . . . . . . . . . 1558--1571
Arjun Bakshi and
Lu Chen and
Kannan Srinivasan and
C. Emre Koksal and
Atilla Eryilmaz EMIT: an Efficient MAC Paradigm for the
Internet of Things . . . . . . . . . . . 1572--1583
Cheng-Shang Chang and
Duan-Shin Lee and
Chun Wang Asynchronous Grant-Free Uplink
Transmissions in Multichannel Wireless
Networks With Heterogeneous QoS
Guarantees . . . . . . . . . . . . . . . 1584--1597
Yongquan Fu and
Dongsheng Li and
Pere Barlet-Ros and
Chun Huang and
Zhen Huang and
Siqi Shen and
Huayou Su A Skewness-Aware Matrix Factorization
Approach for Mesh-Structured Cloud
Services . . . . . . . . . . . . . . . . 1598--1611
Yong Cui and
Ningwei Dai and
Zeqi Lai and
Minming Li and
Zhenhua Li and
Yuming Hu and
Kui Ren and
Yuchi Chen TailCutter: Wisely Cutting Tail Latency
in Cloud CDNs Under Cost Constraints . . 1612--1628
Ahmed Boubrima and
Walid Bechkit and
Herve Rivano On the Deployment of Wireless Sensor
Networks for Air Quality Mapping:
Optimization Models and Algorithms . . . 1629--1642
Ziyao Zhang and
Liang Ma and
Kin K. Leung and
Franck Le and
Sastry Kompella and
Leandros Tassiulas How Advantageous Is It? An Analytical
Study of Controller-Assisted Path
Construction in Distributed SDN . . . . 1643--1656
Arpan Mukhopadhyay and
Nidhi Hegde and
Marc Lelarge Asymptotics of Replication and Matching
in Large Caching Systems . . . . . . . . 1657--1668
Junyang Shi and
Mo Sha and
Zhicheng Yang Distributed Graph Routing and Scheduling
for Industrial Wireless Sensor-Actuator
Networks . . . . . . . . . . . . . . . . 1669--1682
Nikolaos Liakopoulos and
Georgios S. Paschos and
Thrasyvoulos Spyropoulos Robust Optimization Framework for
Proactive User Association in UDNs: a
Data-Driven Approach . . . . . . . . . . 1683--1695
Christos Liaskos and
Ageliki Tsioliaridou and
Shuai Nie and
Andreas Pitsillides and
Sotiris Ioannidis and
Ian F. Akyildiz On the Network-Layer Modeling and
Configuration of Programmable Wireless
Environments . . . . . . . . . . . . . . 1696--1713
Yu Zhou and
Jun Bi and
Cheng Zhang and
Bingyang Liu and
Zhaogeng Li and
Yangyang Wang and
Mingli Yu P4DB: On-the-Fly Debugging for
Programmable Data Planes . . . . . . . . 1714--1727
Siddhartha Satpathi and
Supratim Deb and
R. Srikant and
He Yan Learning Latent Events From Network
Message Logs . . . . . . . . . . . . . . 1728--1741
Fujun He and
Takehiro Sato and
Eiji Oki Optimization Model for Backup Resource
Allocation in Middleboxes With
Importance . . . . . . . . . . . . . . . 1742--1755
Francesco Malandrino and
Carla Fabiana Chiasserini and
Claudio Casetti and
Giada Landi and
Marco Capitani An Optimization-Enhanced MANO for
Energy-Efficient $5$G Networks . . . . . 1756--1769
Haisheng Tan and
Shaofeng H.-C. Jiang and
Yupeng Li and
Xiang-Yang Li and
Chenzi Zhang and
Zhenhua Han and
Francis Chi Moon Lau Joint Online Coflow Routing and
Scheduling in Data Center Networks . . . 1771--1786
Cesar Ghali and
Gene Tsudik and
Ersin Uzun In Content We Trust: Network-Layer Trust
in Content-Centric Networking . . . . . 1787--1800
Huikang Li and
Yi Gao and
Wei Dong and
Chun Chen Preferential Link Tomography in Dynamic
Networks . . . . . . . . . . . . . . . . 1801--1814
Pan Zhou and
Jie Xu and
Wei Wang and
Yuchong Hu and
Dapeng Oliver Wu and
Shouling Ji Toward Optimal Adaptive Online Shortest
Path Routing With Acceleration Under
Jamming Attack . . . . . . . . . . . . . 1815--1829
Majid Khabbazian and
Keyvan Gharouni Saffar The Gain of Energy Accumulation in
Multi-Hop Wireless Network Broadcast . . 1830--1844
Tong Yang and
Haowei Zhang and
Jinyang Li and
Junzhi Gong and
Steve Uhlig and
Shigang Chen and
Xiaoming Li HeavyKeeper: an Accurate Algorithm for
Finding Top-$k$ Elephant Flows . . . . . 1845--1858
Jiaqi Zheng and
Hong Xu and
Xiaojun Zhu and
Guihai Chen and
Yanhui Geng Sentinel: Failure Recovery in
Centralized Traffic Engineering . . . . 1859--1872
Xiulong Liu and
Xin Xie and
Shangguang Wang and
Jia Liu and
Didi Yao and
Jiannong Cao and
Keqiu Li Efficient Range Queries for Large-Scale
Sensor-Augmented RFID Systems . . . . . 1873--1886
Qing He and
Gyorgy Dan and
Viktoria Fodor Joint Assignment and Scheduling for
Minimizing Age of Correlated Information 1887--1900
Dalia Popescu and
Philippe Jacquet and
Bernard Mans and
Robert Dumitru and
Andra Pastrav and
Emanuel Puschita Information Dissemination Speed in Delay
Tolerant Urban Vehicular Networks in a
Hyperfractal Setting . . . . . . . . . . 1901--1914
H. V. Kalpanie Mendis and
Indika A. M. Balapuwaduge and
Frank Y. Li Dependability-Based Reliability Analysis
in URC Networks: Availability in the
Space Domain . . . . . . . . . . . . . . 1915--1930
Ruozhou Yu and
Guoliang Xue and
Xiang Zhang Provisioning QoS-Aware and Robust
Applications in Internet of Things: a
Network Perspective . . . . . . . . . . 1931--1944
Xiang-Yang Li and
Huiqi Liu and
Lan Zhang and
Zhenan Wu and
Yaochen Xie and
Ge Chen and
Chunxiao Wan and
Zhongwei Liang Finding the Stars in the Fireworks: Deep
Understanding of Motion Sensor
Fingerprint . . . . . . . . . . . . . . 1945--1958
Xiaowen Gong and
Ness B. Shroff Truthful Mobile Crowdsensing for
Strategic Users With Private Data
Quality . . . . . . . . . . . . . . . . 1959--1972
Zhenjie Yang and
Yong Cui and
Xin Wang and
Yadong Liu and
Minming Li and
Shihan Xiao and
Chuming Li Cost-Efficient Scheduling of Bulk
Transfers in Inter-Datacenter WANs . . . 1973--1986
Pablo Garrido and
Douglas J. Leith and
Ramon Aguero Joint Scheduling and Coding for Low
In-Order Delivery Delay Over Lossy Paths
With Delayed Feedback . . . . . . . . . 1987--2000
Arjun Roy and
Rajdeep Das and
Hongyi Zeng and
Jasmeet Bagga and
Alex C. Snoeren Understanding the Limits of Passive
Realtime Datacenter Fault Detection and
Localization . . . . . . . . . . . . . . 2001--2014
Xuya Jia and
Dan Li and
Jing Zhu and
Yong Jiang Metro: an Efficient Traffic Fast
Rerouting Scheme With Low Overhead . . . 2015--2027
Christos Pappas and
Taeho Lee and
Raphael M. Reischuk and
Pawel Szalachowski and
Adrian Perrig Network Transparency for Better Internet
Security . . . . . . . . . . . . . . . . 2028--2042
Kang Yang and
Tianzhang Xing and
Yang Liu and
Zhenjiang Li and
Xiaoqing Gong and
Xiaojiang Chen and
Dingyi Fang cDeepArch: a Compact Deep Neural Network
Architecture for Mobile Sensing . . . . 2043--2055
Reza Motamedi and
Bahador Yeganeh and
Balakrishnan Chandrasekaran and
Reza Rejaie and
Bruce M. Maggs and
Walter Willinger On Mapping the Interconnections in
Today's Internet . . . . . . . . . . . . 2056--2070
Matthias Rost and
Stefan Schmid Virtual Network Embedding
Approximations: Leveraging Randomized
Rounding . . . . . . . . . . . . . . . . 2071--2084
Mikhail Hayhoe and
Fady Alajaji and
Bahman Gharesifard Curing Epidemics on Networks Using a
Polya Contagion Model . . . . . . . . . 2085--2097
Reuven Cohen and
Yuval Nezri Cardinality Estimation in a Virtualized
Network Device Using Online Machine
Learning . . . . . . . . . . . . . . . . 2098--2110
George Darzanos and
Iordanis Koutsopoulos and
George D. Stamoulis Cloud Federations: Economics, Games and
Benefits . . . . . . . . . . . . . . . . 2111--2124
Luca Baldesi and
Athina Markopoulou and
Carter T. Buttsc Spectral Graph Forge: a Framework for
Generating Synthetic Graphs With a
Target Modularity . . . . . . . . . . . 2125--2136
Benny Van Houdt Randomized Work Stealing Versus Sharing
in Large-Scale Systems With
Non-Exponential Job Sizes . . . . . . . 2137--2149
Kate Ching-Ju Lin and
Kai-Cheng Hsu and
Hung-Yu Wei Inter-Client Interference Cancellation
for Full-Duplex Networks With
Half-Duplex Clients . . . . . . . . . . 2150--2163
Kaiming Shen and
Wei Yu and
Licheng Zhao and
Daniel P. Palomar Optimization of MIMO Device-to-Device
Networks via Matrix Fractional
Programming: a
Minorization--Maximization Approach . . 2164--2177
Alex X. Liu and
Eric Norige A De-Compositional Approach to Regular
Expression Matching for Network Security 2179--2191
Orly Avner and
Shie Mannor Multi-User Communication Networks: a
Coordinated Multi-Armed Bandit Approach 2192--2207
Haiming Jin and
Baoxiang He and
Lu Su and
Klara Nahrstedt and
Xinbing Wang Data-Driven Pricing for Sensing Effort
Elicitation in Mobile Crowd Sensing
Systems . . . . . . . . . . . . . . . . 2208--2221
Kun Xie and
Xiangge Wang and
Xin Wang and
Yuxiang Chen and
Gaogang Xie and
Yudian Ouyang and
Jigang Wen and
Jiannong Cao and
Dafang Zhang Accurate Recovery of Missing Network
Measurement Data With Localized Tensor
Completion . . . . . . . . . . . . . . . 2222--2235
Tong Yang and
Jie Jiang and
Peng Liu and
Qun Huang and
Junzhi Gong and
Yang Zhou and
Rui Miao and
Xiaoming Li and
Steve Uhlig Adaptive Measurements Using One Elastic
Sketch . . . . . . . . . . . . . . . . . 2236--2251
Pedro Reviriego and
Ori Rottenstreich The Tandem Counting Bloom Filter --- It
Takes Two Counters to Tango . . . . . . 2252--2265
Mehmet Fatih Akta\cs and
Emina Soljanin Straggler Mitigation at Scale . . . . . 2266--2279
Daqing Yun and
Chase Q. Wu and
Nageswara S. V. Rao and
Rajkumar Kettimuthu Advising Big Data Transfer Over
Dedicated Connections Based on Profiling
Optimization . . . . . . . . . . . . . . 2280--2293
Haiqin Wu and
Liangmin Wang and
Guoliang Xue and
Jian Tang and
Dejun Yang Enabling Data Trustworthiness and User
Privacy in Mobile Crowdsensing . . . . . 2294--2307
Guo Chen and
Yuanwei Lu and
Bojie Li and
Kun Tan and
Yongqiang Xiong and
Peng Cheng and
Jiansong Zhang and
Thomas Moscibroda MP-RDMA: Enabling RDMA With Multi-Path
Transport in Datacenters . . . . . . . . 2308--2323
Chen Chen and
Lei Liu and
Tie Qiu and
Dapeng Oliver Wu and
Zhiyuan Ren Delay-Aware Grid-Based Geographic
Routing in Urban VANETs: a Backbone
Approach . . . . . . . . . . . . . . . . 2324--2337
Jinbin Hu and
Jiawei Huang and
Wenjun Lv and
Yutao Zhou and
Jianxin Wang and
Tian He CAPS: Coding-Based Adaptive Packet
Spraying to Reduce Flow Completion Time
in Data Center . . . . . . . . . . . . . 2338--2353
Qian Chen and
Xiao Juan Zhang and
Wei Lih Lim and
Yuen Sam Kwok and
Sumei Sun High Reliability, Low Latency and Cost
Effective Network Planning for
Industrial Wireless Mesh Networks . . . 2354--2362
Francesco Malandrino and
Carla Fabiana Chiasserini and
Gil Einziger and
Gabriel Scalosub Reducing Service Deployment Cost Through
VNF Sharing . . . . . . . . . . . . . . 2363--2376
Mauro Cociglio and
Giuseppe Fioccola and
Guido Marchetto and
Amedeo Sapio and
Riccardo Sisto Multipoint Passive Monitoring in Packet
Networks . . . . . . . . . . . . . . . . 2377--2390
Ping Zhao and
Hongbo Jiang and
Jie Li and
Fanzi Zeng and
Xiao Zhu and
Kun Xie and
Guanglin Zhang Synthesizing Privacy Preserving Traces:
Enhancing Plausibility With Social
Networks . . . . . . . . . . . . . . . . 2391--2404
Anura P. Jayasumana and
Randy Paffenroth and
Gunjan Mahindre and
Sridhar Ramasamy and
Kelum Gajamannage Network Topology Mapping From Partial
Virtual Coordinates and Graph Geodesics 2405--2417
Yang Liu and
Bo Li and
Brian D. O. Anderson and
Guodong Shi Clique Gossiping . . . . . . . . . . . . 2418--2431
Sepideh Nazemi and
Kin K. Leung and
Ananthram Swami Distributed Optimization Framework for
In-Network Data Processing . . . . . . . 2432--2443
Elaine Y.-N. Sun and
Hsiao-Chun Wu and
Scott C.-H. Huang Theoretical Analysis of Various
Software-Defined Multiplexing Codes . . 2444--2457
Han Zhang and
Haijun Geng and
Yahui Li and
Xia Yin and
Xingang Shi and
Zhiliang Wang and
Qianhong Wu and
Jianwei Liu DA&FD-Deadline-Aware and Flow
Duration-Based Rate Control for Mixed
Flows in DCNs . . . . . . . . . . . . . 2458--2471
Zhenhua Han and
Haisheng Tan and
Xiang-Yang Li and
Shaofeng H.-C. Jiang and
Yupeng Li and
Francis C. M. Lau OnDisc: Online Latency-Sensitive Job
Dispatching and Scheduling in
Heterogeneous Edge-Clouds . . . . . . . 2472--2485
Haipeng Dai and
Meng Li and
Alex X. Liu and
Jiaqi Zheng and
Guihai Chen Finding Persistent Items in Distributed
Datasets . . . . . . . . . . . . . . . . 1--14
Rajat Talak and
Sertac Karaman and
Eytan Modiano Optimizing Information Freshness in
Wireless Networks Under General
Interference Constraints . . . . . . . . 15--28
G. Enrico Santagati and
Neil Dave and
Tommaso Melodia Design and Performance Evaluation of an
Implantable Ultrasonic Networking
Platform for the Internet of Medical
Things . . . . . . . . . . . . . . . . . 29--42
Yan Qiao and
Jun Jiao and
Xinhong Cui and
Yuan Rao Robust Loss Inference in the Presence of
Noisy Measurements and Hidden Fault
Diagnosis . . . . . . . . . . . . . . . 43--56
Jia Zhao and
Jiangchuan Liu and
Haiyang Wang and
Chi Xu and
Wei Gong and
Changqiao Xu Measurement, Analysis, and Enhancement
of Multipath TCP Energy Efficiency for
Datacenters . . . . . . . . . . . . . . 57--70
Guocheng Liao and
Xu Chen and
Jianwei Huang Prospect Theoretic Analysis of
Privacy-Preserving Mechanism . . . . . . 71--83
Seokhyun Kim and
Kimin Lee and
Yeonkeun Kim and
Jinwoo Shin and
Seungwon Shin and
Song Chong Dynamic Control for On-Demand
Interference-Managed WLAN
Infrastructures . . . . . . . . . . . . 84--97
Danfeng Shan and
Fengyuan Ren and
Peng Cheng and
Ran Shu and
Chuanxiong Guo Observing and Mitigating Micro-Burst
Traffic in Data Center Networks . . . . 98--111
Lorenzo Saino and
Ioannis Psaras and
Emilio Leonardi and
George Pavlou Load Imbalance and Caching Performance
of Sharded Systems . . . . . . . . . . . 112--125
Xiulong Liu and
Sheng Chen and
Jia Liu and
Wenyu Qu and
Fengjun Xiao and
Alex X. Liu and
Jiannong Cao and
Jiangchuan Liu Fast and Accurate Detection of Unknown
Tags for RFID Systems --- Hash
Collisions are Desirable . . . . . . . . 126--139
K. P. Naveen and
Anurag Kumar Coverage in One-Dimensional Wireless
Networks With Infrastructure Nodes and
Relay Extensions . . . . . . . . . . . . 140--153
Shuyi Chen and
Xiqing Liu and
Tianyu Zhao and
Hsiao-Hwa Chen and
Weixiao Meng Performance Analysis of Joint
Transmission Schemes in Ultra-Dense
Networks --- A Unified Approach . . . . 154--167
Miralem Mehic and
Peppino Fazio and
Stefan Rass and
Oliver Maurhart and
Momtchil Peev and
Andreas Poppe and
Jan Rozhon and
Marcin Niemiec and
Miroslav Voznak A Novel Approach to Quality-of-Service
Provisioning in Trusted Relay Quantum
Key Distribution Networks . . . . . . . 168--181
Ashwin Ganesan Performance Guarantees of Distributed
Algorithms for QoS in Wireless Ad Hoc
Networks . . . . . . . . . . . . . . . . 182--195
Zongqing Lu and
Kevin Chan and
Rahul Urgaonkar and
Shiliang Pu and
Thomas La Porta NetVision: On-Demand Video Processing in
Wireless Networks . . . . . . . . . . . 196--209
Minh Pham and
Doan B. Hoang and
Zenon Chaczko Congestion-Aware and Energy-Aware
Virtual Network Embedding . . . . . . . 210--223
Caixia Kou and
Dedong Hu and
Jianhua Yuan and
Wenbao Ai Bisection and Exact Algorithms Based on
the Lagrangian Dual for a
Single-Constrained Shortest Path Problem 224--233
Xiong Wang and
Qi Deng and
Jing Ren and
Mehdi Malboubi and
Sheng Wang and
Shizhong Xu and
Chen-Nee Chuah The Joint Optimization of Online Traffic
Matrix Measurement and Traffic
Engineering For Software-Defined
Networks . . . . . . . . . . . . . . . . 234--247
Yannis Thomas and
Merkourios Karaliopoulos and
George Xylomenos and
George C. Polyzos Low Latency Friendliness for Multipath
TCP . . . . . . . . . . . . . . . . . . 248--261
Sangeeta Bhattacharjee and
Tamaghna Acharya and
Uma Bhattacharya Energy-Efficient Multicasting in Hybrid
Cognitive Small Cell Networks: a
Cross-Layer Approach . . . . . . . . . . 262--274
Levente Csikor and
Márk Szalay and
Gábor Rétvári and
Gergely Pongrácz and
Dimitrios P. Pezaros and
László Toka Transition to SDN is HARMLESS: Hybrid
Architecture for Migrating Legacy
Ethernet Switches to SDN . . . . . . . . 275--288
Alija Pa\vsi\'c and
Péter Babarczi and
János Tapolcai and
Erika R. Bérczi-Kovács and
Zoltán Király and
Lajos Rónyai Minimum Cost Survivable Routing
Algorithms for Generalized Diversity
Coding . . . . . . . . . . . . . . . . . 289--300
Xiuzhen Guo and
Yuan He and
Xiaolong Zheng and
Liangcheng Yu and
Omprakash Gnawali ZigFi: Harnessing Channel State
Information for Cross-Technology
Communication . . . . . . . . . . . . . 301--311
Ze Yang and
Kwan L. Yeung SDN Candidate Selection in Hybrid IP/SDN
Networks for Single Link Failure
Protection . . . . . . . . . . . . . . . 312--321
Jiachen Xue and
Muhammad Usama Chaudhry and
Balajee Vamanan and
T. N. Vijaykumar and
Mithuna Thottethodi Dart: Divide and Specialize for Fast
Response to Congestion in RDMA-Based
Datacenter Networks . . . . . . . . . . 322--335
Bin Tang and
Xiaoliang Wang and
Cam-Tu Nguyen and
Baoliu Ye and
Sanglu Lu Construction of Subexponential-Size
Optical Priority Queues With Switches
and Fiber Delay Lines . . . . . . . . . 336--346
Amr Albanna and
Homayoun Yousefi'Zadeh Congestion Minimization of LTE Networks:
a Deep Learning Approach . . . . . . . . 347--359
Luoyi Fu and
Jiapeng Zhang and
Shuaiqi Wang and
Xinyu Wu and
Xinbing Wang and
Guihai Chen De-Anonymizing Social Networks With
Overlapping Community Structure . . . . 360--375
Teng Liu and
Alhussein A. Abouzeid and
A. Agung Julius Traffic Flow Control in Vehicular
Multi-Hop Networks With Data Caching and
Infrastructure Support . . . . . . . . . 376--386
Takuro Fukunaga Adaptive Algorithm for Finding Connected
Dominating Sets in Uncertain Graphs . . 387--398
Qingjun Xiao and
Shigang Chen and
You Zhou and
Junzhou Luo Estimating Cardinality for Arbitrarily
Large Data Stream With Improved Memory
Efficiency . . . . . . . . . . . . . . . 433--446
Wei Dong and
Yi Gao and
Chenhong Cao and
Xiaoyu Zhang and
Wenbin Wu Universal Path Tracing for Large-Scale
Sensor Networks . . . . . . . . . . . . 447--460
Jona Beysens and
Qing Wang and
Ander Galisteo and
Domenico Giustiniano and
Sofie Pollin A Cell-Free Networking System With
Visible Light . . . . . . . . . . . . . 461--476
Arjun Anand and
Gustavo de Veciana and
Sanjay Shakkottai Joint Scheduling of URLLC and eMBB
Traffic in $5$G Wireless Networks . . . 477--490
Alejandro Cohen and
Asaf Cohen and
Omer Gurewitz Efficient Data Collection Over Multiple
Access Wireless Sensors Network . . . . 491--504
Tingwei Liu and
John C. S. Lui FAVE: a Fast and Efficient Network Flow
AVailability Estimation Method With
Bounded Relative Error . . . . . . . . . 505--518
Mingjun Xiao and
Guoju Gao and
Jie Wu and
Sheng Zhang and
Liusheng Huang Privacy-Preserving User Recruitment
Protocol for Mobile Crowdsensing . . . . 519--532
Matthew Clark and
Konstantinos Psounis Optimizing Primary User Privacy in
Spectrum Sharing Systems . . . . . . . . 533--546
Ge Wang and
Haofan Cai and
Chen Qian and
Jinsong Han and
Shouqian Shi and
Xin Li and
Han Ding and
Wei Xi and
Jizhong Zhao Hu-Fu: Replay-Resilient RFID
Authentication . . . . . . . . . . . . . 547--560
Martino Trevisan and
Danilo Giordano and
Idilio Drago and
Maurizio Matteo Munaf\`o and
Marco Mellia Five Years at the Edge: Watching
Internet From the ISP Network . . . . . 561--574
Yilong Hui and
Zhou Su and
Tom H. Luan Collaborative Content Delivery in
Software-Defined Heterogeneous Vehicular
Networks . . . . . . . . . . . . . . . . 575--587
Novella Bartolini and
Ting He and
Viviana Arrigoni and
Annalisa Massini and
Federico Trombetti and
Hana Khamfroush On Fundamental Bounds on Failure
Identifiability by Boolean Network
Tomography . . . . . . . . . . . . . . . 588--601
Wei Wang and
Shiyue He and
Qian Zhang and
Tao Jiang Enabling Low-Power OFDM for IoT by
Exploiting Asymmetric Clock Rates . . . 602--611
Yongrui Chen and
Shuai Wang and
Zhijun Li and
Tian He Reliable Physical-Layer Cross-Technology
Communication With Emulation Error
Correction . . . . . . . . . . . . . . . 612--624
Georgios S. Paschos and
Apostolos Destounis and
George Iosifidis Online Convex Optimization for Caching
Networks . . . . . . . . . . . . . . . . 625--638
Sameer G. Kulkarni and
Wei Zhang and
Jinho Hwang and
Shriram Rajagopalan and
K. K. Ramakrishnan and
Timothy Wood and
Mayutan Arumaithurai and
Xiaoming Fu NFVnice: Dynamic Backpressure and
Scheduling for NFV Service Chains . . . 639--652
Wenjia Wei and
Kaiping Xue and
Jiangping Han and
David S. L. Wei and
Peilin Hong Shared Bottleneck-Based Congestion
Control and Packet Scheduling for
Multipath TCP . . . . . . . . . . . . . 653--666
Sla\dbarana Jo\vsilo and
György Dán Computation Offloading Scheduling for
Periodic Tasks in Mobile Edge Computing 667--680
Yahui Sun and
Daniel Rehfeldt and
Marcus Brazil and
Doreen Thomas and
Saman Halgamuge A Physarum-Inspired Algorithm for
Minimum-Cost Relay Node Placement in
Wireless Sensor Networks . . . . . . . . 681--694
Sameer G. Kulkarni and
Guyue Liu and
K. K. Ramakrishnan and
Mayutan Arumaithurai and
Timothy Wood and
Xiaoming Fu REINFORCE: Achieving Efficient Failure
Resiliency for Network Function
Virtualization-Based Services . . . . . 695--708
Ajay Badita and
Parimal Parag and
Vaneet Aggarwal Optimal Server Selection for Straggler
Mitigation . . . . . . . . . . . . . . . 709--721
Jaya Prakash Champati and
Hussein Al-Zubaidy and
James Gross Transient Analysis for Multihop Wireless
Networks Under Static Routing . . . . . 722--735
Michael Lin and
Novella Bartolini and
Michael Giallorenzo and
Thomas F. La Porta On Interference Aware Power Adjustment
and Scheduling in Femtocell Networks . . 736--749
Sen Lin and
Junshan Zhang and
Lei Ying Crowdsensing for Spectrum Discovery: a
Waze-Inspired Design via Smartphone
Sensing . . . . . . . . . . . . . . . . 750--763
Tingjun Chen and
Jelena Diakonikolas and
Javad Ghaderi and
Gil Zussman Hybrid Scheduling in Heterogeneous Half-
and Full-Duplex Wireless Networks . . . 764--777
Hani Sami and
Azzam Mourad and
Wassim El-Hajj Vehicular-OBUs-As-On-Demand-Fogs:
Resource and Context Aware Deployment of
Containerized Micro-Services . . . . . . 778--790
Matthias Rost and
Stefan Schmid On the Hardness and Inapproximability of
Virtual Network Embeddings . . . . . . . 791--803
Xijian Zhong and
Yan Guo and
Ning Li and
Yancheng Chen Joint Optimization of Relay Deployment,
Channel Allocation, and Relay Assignment
for UAVs-Aided D$2$D Networks . . . . . 804--817
Ali Maatouk and
Mohamad Assaad and
Anthony Ephremides On the Age of Information in a CSMA
Environment . . . . . . . . . . . . . . 818--831
Haibo Wang and
Jessie Hui Wang and
Jilong Wang and
Weizhen Dang and
Jing'an Xue and
Fenghua Li and
Jinzhe Shan Squeezing the Gap: an Empirical Study on
DHCP Performance in a Large-Scale
Wireless Network . . . . . . . . . . . . 832--845
Kun Xie and
Yuxiang Chen and
Xin Wang and
Gaogang Xie and
Jiannong Cao and
Jigang Wen Accurate and Fast Recovery of Network
Monitoring Data: a GPU Accelerated
Matrix Completion . . . . . . . . . . . 958--971
Jie Wang and
Wenye Wang and
Cliff Wang Modeling and Analysis of Conflicting
Information Propagation in a Finite Time
Horizon . . . . . . . . . . . . . . . . 972--985
Gioacchino Tangari and
Marinos Charalambides and
Daphne Tuncer and
George Pavlou Accuracy-Aware Adaptive Traffic
Monitoring for Software Dataplanes . . . 986--1001
Yongce Chen and
Yan Huang and
Yi Shi and
Y. Thomas Hou and
Wenjing Lou and
Sastry Kompella On DoF-Based Interference Cancellation
Under General Channel Rank Conditions 1002--1016
Avinash Mohan and
Aditya Gopalan and
Anurag Kumar Reduced-State, Optimal Scheduling for
Decentralized Medium Access Control of a
Class of Wireless Networks . . . . . . . 1017--1032
Meng Li and
Haipeng Dai and
Xiaoyu Wang and
Rui Xia and
Alex X. Liu and
Guihai Chen Thresholded Monitoring in Distributed
Data Streams . . . . . . . . . . . . . . 1033--1046
Konstantinos Poularakis and
Jaime Llorca and
Antonia M. Tulino and
Ian Taylor and
Leandros Tassiulas Service Placement and Request Routing in
MEC Networks With Storage, Computation,
and Communication Constraints . . . . . 1047--1060
Ziyue Luo and
Chuan Wu An Online Algorithm for VNF Service
Chain Scaling in Datacenters . . . . . . 1061--1073
Juan Brenes and
Alberto García-Martínez and
Marcelo Bagnulo and
Andra Lutu and
Cristel Pelsser Power Prefixes Prioritization for
Smarter BGP Reconvergence . . . . . . . 1074--1087
Vitalii Demianiuk and
Sergey Nikolenko and
Pavel Chuprikov and
Kirill Kogan New Alternatives to Optimize Policy
Classifiers . . . . . . . . . . . . . . 1088--1101
Bo Cheng and
Shoulu Hou and
Ming Wang and
Shuai Zhao and
Junliang Chen HSOP: a Hybrid Service Orchestration
Platform for Internet-Telephony Networks 1102--1115
Xiaofeng Cao and
Guoming Tang and
Deke Guo and
Yan Li and
Weiming Zhang Edge Federation: Towards an Integrated
Service Provisioning Model . . . . . . . 1116--1129
Milad Mahdian and
Armin Moharrer and
Stratis Ioannidis and
Edmund Yeh Kelly Cache Networks . . . . . . . . . . 1130--1143
Ning Xie and
Shengli Zhang and
Alex X. Liu Physical-Layer Authentication in
Non-Orthogonal Multiple Access Systems 1144--1157
Ramon Fernandes and
César Marcon and
Rodrigo Cataldo and
Johanna Sepúlveda Using Smart Routing for Secure and
Dependable NoC-Based MPSoCs . . . . . . 1158--1171
Ran Ben Basat and
Xiaoqi Chen and
Gil Einziger and
Ori Rottenstreich Designing Heavy-Hitter Detection
Algorithms for Programmable Switches . . 1172--1185
Shay Vargaftik and
Isaac Keslassy and
Ariel Orda LSQ: Load Balancing in Large-Scale
Heterogeneous Systems With Multiple
Dispatchers . . . . . . . . . . . . . . 1186--1198
Ali Yekkehkhany and
Rakesh Nagi Blind GB-PANDAS: a Blind
Throughput-Optimal Load Balancing
Algorithm for Affinity Scheduling . . . 1199--1212
Alia Asheralieva and
Dusit Niyato Combining Contract Theory and Lyapunov
Optimization for Content Sharing With
Edge Caching and Device-to-Device
Communications . . . . . . . . . . . . . 1213--1226
Yongmin Zhang and
Xiaolong Lan and
Ju Ren and
Lin Cai Efficient Computing Resource Sharing for
Mobile Edge-Cloud Computing Networks . . 1227--1240
Qingyu Liu and
Lei Deng and
Haibo Zeng and
Minghua Chen A Tale of Two Metrics in Network Delay
Optimization . . . . . . . . . . . . . . 1241--1254
Fangxin Wang and
Cong Zhang and
Feng Wang and
Jiangchuan Liu and
Yifei Zhu and
Haitian Pang and
Lifeng Sun DeepCast: Towards Personalized QoE for
Edge-Assisted Crowdcast With Deep
Reinforcement Learning . . . . . . . . . 1255--1268
Kai Ding and
Homayoun Yousefi'zadeh and
Faryar Jabbari Connectivity Maintenance in Mobile
Networks . . . . . . . . . . . . . . . . 1269--1282
Damiano Carra and
Giovanni Neglia and
Pietro Michiardi Elastic Provisioning of Cloud Caches: a
Cost-Aware TTL Approach . . . . . . . . 1283--1296
Youlin Zhang and
Shigang Chen and
You Zhou and
Yuguang Fang Missing-Tag Detection With Unknown Tags 1297--1310
Francesca Fossati and
Stefano Moretti and
Patrice Perny and
Stefano Secci Multi-Resource Allocation for Network
Slicing . . . . . . . . . . . . . . . . 1311--1324
Jing Fu and
Bill Moran Energy-Efficient Job-Assignment Policy
With Asymptotically Guaranteed
Performance Deviation . . . . . . . . . 1325--1338
Xiaocan Li and
Kun Xie and
Xin Wang and
Gaogang Xie and
Dongliang Xie and
Zhenyu Li and
Jigang Wen and
Zulong Diao and
Tian Wang Quick and Accurate False Data Detection
in Mobile Crowd Sensing . . . . . . . . 1339--1352
Attila K\Horösi and
András Gulyás and
Zalan Heszberger and
József Bíró and
Gábor Rétvári On the Memory Requirement of Hop-by-Hop
Routing: Tight Bounds and Optimal
Address Spaces . . . . . . . . . . . . . 1353--1363
Yang Li and
Jianwei Zheng and
Zhenhua Li and
Yunhao Liu and
Feng Qian and
Sen Bai and
Yao Liu and
Xianlong Xin Understanding the Ecosystem and
Addressing the Fundamental Concerns of
Commercial MVNO . . . . . . . . . . . . 1364--1377
Mohammad Hassan Lotfi and
Saswati Sarkar and
George Kesidis Is Non-Neutrality Profitable for the
Stakeholders of the Internet Market? . . 1435--1448
Ankur Sarker and
Chenxi Qiu and
Haiying Shen Connectivity Maintenance for
Next-Generation Decentralized Vehicle
Platoon Networks . . . . . . . . . . . . 1449--1462
He Huang and
Yu-E Sun and
Chaoyi Ma and
Shigang Chen and
You Zhou and
Wenjian Yang and
Shaojie Tang and
Hongli Xu and
Yan Qiao An Efficient $K$-Persistent Spread
Estimator for Traffic Measurement in
High-Speed Networks . . . . . . . . . . 1463--1476
Yilei Lin and
Ting He and
Shiqiang Wang and
Kevin Chan and
Stephen Pasteris Looking Glass of NFV: Inferring the
Structure and State of NFV Network From
External Observations . . . . . . . . . 1477--1490
Zhangyu Guan and
Nan Cen and
Tommaso Melodia and
Scott M. Pudlewski Distributed Joint Power, Association and
Flight Control for Massive-MIMO
Self-Organizing Flying Drones . . . . . 1491--1505
Sudeep Bhattarai and
Jung-Min Park and
William Lehr Dynamic Exclusion Zones for Protecting
Primary Users in Database-Driven
Spectrum Sharing . . . . . . . . . . . . 1506--1519
Reza Banirazi and
Edmond Jonckheere and
Bhaskar Krishnamachari Heat-Diffusion: Pareto Optimal Dynamic
Routing for Time-Varying Wireless
Networks . . . . . . . . . . . . . . . . 1520--1533
Anfu Zhou and
Shaoqing Xu and
Song Wang and
Jingqi Huang and
Shaoyuan Yang and
Teng Wei and
Xinyu Zhang and
Huadong Ma Robotic Millimeter-Wave Wireless
Networks . . . . . . . . . . . . . . . . 1534--1549
Wojciech Kabaci\'nski and
Mustafa Abdulsahib Wide-Sense Nonblocking
Converting-Space-Converting Switching
Node Architecture Under XsVarSWITCH
Control Algorithm . . . . . . . . . . . 1550--1561
Zengfu Wang and
Qing Wang and
Bill Moran and
Moshe Zukerman Optimal Submarine Cable Path Planning
and Trunk-and-Branch Tree Network
Topology Design . . . . . . . . . . . . 1562--1572
Ying Tian and
Zhiliang Wang and
Xia Yin and
Xingang Shi and
Yingya Guo and
Haijun Geng and
Jiahai Yang Traffic Engineering in Partially
Deployed Segment Routing Over IPv6
Network With Deep Reinforcement Learning 1573--1586
Chenglong Shao and
Hoorin Park and
Heejun Roh and
Wonjun Lee and
Hyoil Kim PolarScout: Wi-Fi Interference-Resilient
ZigBee Communication via Shell-Shaping 1587--1600
Kun Xie and
Yuxiang Chen and
Xin Wang and
Gaogang Xie and
Jiannong Cao and
Jigang Wen and
Guangming Yang and
Jiaqi Sun Accurate and Fast Recovery of Network
Monitoring Data With GPU-Accelerated
Tensor Completion . . . . . . . . . . . 1601--1614
Vignesh Sivaraman and
Dibyajyoti Guha and
Biplab Sikdar Optimal Pending Interest Table Size for
ICN With Mobile Producers . . . . . . . 1615--1628
Zhe Wang and
Yifeng Cao and
Linghe Kong and
Guihai Chen and
Jiadi Yu and
Shaojie Tang and
Yingying Chen Reference Waveforms Forward Concurrent
Transmissions in ZigBee Communications 1629--1642
Yixin Li and
Bin Cao and
Mugen Peng and
Long Zhang and
Lei Zhang and
Daquan Feng and
Jihong Yu Direct Acyclic Graph-Based Ledger for
Internet of Things: Performance and
Security Analysis . . . . . . . . . . . 1643--1656
Konstantinos Konstantinidis and
Aditya Ramamoorthy Resolvable Designs for Speeding Up
Distributed Computing . . . . . . . . . 1657--1670
Guocheng Liao and
Xu Chen and
Jianwei Huang Social-Aware Privacy-Preserving
Mechanism for Correlated Data . . . . . 1671--1683
Sheng Zhang and
Yu Liang and
Jidong Ge and
Mingjun Xiao and
Jie Wu Provably Efficient Resource Allocation
for Edge Service Entities Using Hermes 1684--1697
Kevin Spiteri and
Rahul Urgaonkar and
Ramesh K. Sitaraman BOLA: Near-Optimal Bitrate Adaptation
for Online Videos . . . . . . . . . . . 1698--1711
Yue Cao and
Ahmed Osama Fathy Atya and
Shailendra Singh and
Zhiyun Qian and
Srikanth V. Krishnamurthy and
Thomas F. La Porta and
Prashant Krishnamurthy and
Lisa Marvel Packet Header Obfuscation Using MIMO . . 1712--1725
Huynh Tu Dang and
Pietro Bressana and
Han Wang and
Ki Suh Lee and
Noa Zilberman and
Hakim Weatherspoon and
Marco Canini and
Fernando Pedone and
Robert Soulé P4xos: Consensus as a Network Service 1726--1738
Rahul Vaze and
Jayakrishnan Nair Multiple Server SRPT With Speed Scaling
Is Competitive . . . . . . . . . . . . . 1739--1751
Songtao Wang and
Dan Li and
Yang Cheng and
Jinkun Geng and
Yanshu Wang and
Shuai Wang and
Shutao Xia and
Jianping Wu A Scalable, High-Performance, and
Fault-Tolerant Network Architecture for
Distributed Machine Learning . . . . . . 1752--1764
Rajat Talak and
Sertac Karaman and
Eytan Modiano Improving Age of Information in Wireless
Networks With Perfect Channel State
Information . . . . . . . . . . . . . . 1765--1778
Sarhad Arisdakessian and
Omar Abdel Wahab and
Azzam Mourad and
Hadi Otrok and
Nadjia Kara FoGMatch: an Intelligent Multi-Criteria
IoT-Fog Scheduling Approach Using Game
Theory . . . . . . . . . . . . . . . . . 1779--1789
Yidan Hu and
Rui Zhang A Spatiotemporal Approach for Secure
Crowdsourced Radio Environment Map
Construction . . . . . . . . . . . . . . 1790--1803
Zhenlin An and
Qiongzheng Lin and
Lei Yang and
Wei Lou and
Lei Xie Acquiring Bloom Filters Across
Commercial RFIDs in Physical Layer . . . 1804--1817
Pedram Kheirkhah Sangdeh and
Hossein Pirayesh and
Adnan Quadri and
Huacheng Zeng A Practical Spectrum Sharing Scheme for
Cognitive Radio Networks: Design and
Experiments . . . . . . . . . . . . . . 1818--1831
Yuqi Fan and
Wenlong Liu and
Dan Guo and
Weili Wu and
Dingzhu Du Shuffle Scheduling for MapReduce Jobs
Based on Periodic Network Status . . . . 1832--1844
Alireza Ameli Renani and
Jun Huang and
Guoliang Xing and
Abdol-Hossein Esfahanian and
Weiguo Wu Harnessing Hardware Defects for
Improving Wireless Link Performance . . 1913--1924
Ruomu Hou and
Irvan Jahja and
Loi Luu and
Prateek Saxena and
Haifeng Yu Randomized View Reconciliation in
Permissionless Distributed Systems . . . 1925--1938
Dheeraj Narasimha and
Srinivas Shakkottai and
Lei Ying A Mean Field Game Analysis of
Distributed MAC in Ultra-Dense
Multichannel Wireless Networks . . . . . 1939--1952
Mohammed Hawari and
Juan-Antonio Cordero-Fuertes and
Thomas Clausen High-Accuracy Packet Pacing on Commodity
Servers for Constant-Rate Flows . . . . 1953--1967
Nai-Wen Chang and
Sun-Yuan Hsieh Conditional Diagnosability of
Alternating Group Networks Under the PMC
Model . . . . . . . . . . . . . . . . . 1968--1980
Fardin Derogarian Miyandoab and
João Canas Ferreira and
Vítor M. Grade Tavares and
José Machado da Silva and
Fernando J. Velez A Multifunctional Integrated Circuit
Router for Body Area Network Wearable
Systems . . . . . . . . . . . . . . . . 1981--1994
Ye Li and
Hong Xie and
John C. S. Lui and
Kenneth L. Calvert Quantifying Deployability and
Evolvability of Future Internet
Architectures via Economic Models . . . 1995--2008
Hao Li and
Zhengda Bian and
Peng Zhang and
Zhun Sun and
Chengchen Hu and
Qiang Fu and
Tian Pan and
Jia Lv Application-Oblivious L7 Parsing Using
Recurrent Neural Networks . . . . . . . 2009--2022
Jia Liu and
Shigang Chen and
Min Chen and
Qingjun Xiao and
Lijun Chen Pose Sensing With a Single RFID Tag . . 2023--2036
Haojun Huang and
Wang Miao and
Geyong Min and
Chengqiang Huang and
Xu Zhang and
Chen Wang Resilient Range-Based $d$-Dimensional
Localization for Mobile Sensor Networks 2037--2050
Zina Chkirbene and
Rachid Hadjidj and
Sebti Foufou and
Ridha Hamila LaScaDa: a Novel Scalable Topology for
Data Center Network . . . . . . . . . . 2051--2064
Sara El Alaoui and
Byrav Ramamurthy MARS: a Multi-Attribute Routing and
Scheduling Algorithm for DTN
Interplanetary Networks . . . . . . . . 2065--2076
Nurullah Karakoç and
Anna Scaglione and
Angelia Nedi\'c and
Martin Reisslein Multi-Layer Decomposition of Network
Utility Maximization Problems . . . . . 2077--2091
Yutong Zhai and
Hongli Xu and
Haibo Wang and
Zeyu Meng and
He Huang Joint Routing and Sketch Configuration
in Software-Defined Networking . . . . . 2092--2105
Conor Sexton and
Nicola Marchetti and
Luiz A. DaSilva On Provisioning Slices and Overbooking
Resources in Service Tailored Networks
of the Future . . . . . . . . . . . . . 2106--2119
Si Chen and
Wei Gong and
Jia Zhao and
Jiangchuan Liu High-Throughput and Robust Rate
Adaptation for Backscatter Networks . . 2120--2131
Qingyu Liu and
Haibo Zeng and
Minghua Chen Network Utility Maximization Under
Maximum Delay Constraints and Throughput
Requirements . . . . . . . . . . . . . . 2132--2145
Hooshang Ghasemi and
Aditya Ramamoorthy Asynchronous Coded Caching With Uncoded
Prefetching . . . . . . . . . . . . . . 2146--2159
Jian Su and
Alex X. Liu and
Zhengguo Sheng and
Yongrui Chen A Partitioning Approach to RFID
Identification . . . . . . . . . . . . . 2160--2173
Youlin Zhang and
Shigang Chen and
You Zhou and
Olufemi O. Odegbile and
Yuguang Fang Efficient Anonymous Temporal-Spatial
Joint Estimation at Category Level Over
Multiple Tag Sets With Unreliable
Channels . . . . . . . . . . . . . . . . 2174--2187
Dingwen Yuan and
Hsuan-Yin Lin and
Jörg Widmer and
Matthias Hollick Optimal and Approximation Algorithms for
Joint Routing and Scheduling in
Millimeter-Wave Cellular Networks . . . 2188--2202
Francesco Devoti and
Ilario Filippini Planning mm-Wave Access Networks Under
Obstacle Blockages: a Reliability-Aware
Approach . . . . . . . . . . . . . . . . 2203--2214
Ali Maatouk and
Saad Kriouile and
Mohamad Assaad and
Anthony Ephremides The Age of Incorrect Information: a New
Performance Metric for Status Updates 2215--2228
David A. Hayes and
Michael Welzl and
Simone Ferlin and
David Ros and
Safiqul Islam Online Identification of Groups of Flows
Sharing a Network Bottleneck . . . . . . 2229--2242
Huanle Xu and
Yang Liu and
Wing Cheong Lau and
Tiantong Zeng and
Jun Guo and
Alex X. Liu Online Resource Allocation With Machine
Variability: a Bandit Perspective . . . 2243--2256
Ziling Wei and
Jinshu Su and
Baokang Zhao and
Xicheng Lu Distributed Opportunistic Scheduling in
Cooperative Networks With RF Energy
Harvesting . . . . . . . . . . . . . . . 2257--2270
Jaeyoung Choi and
Sangwoo Moon and
Jiin Woo and
Kyunghwan Son and
Jinwoo Shin and
Yung Yi Information Source Finding in Networks:
Querying With Budgets . . . . . . . . . 2271--2284
Peter Key and
Richard Steinberg Pricing, Competition and Content for
Internet Service Providers . . . . . . . 2285--2298
Cheng Chen and
Randall A. Berry and
Michael L. Honig and
Vijay G. Subramanian Pricing, Bandwidth Allocation, and
Service Competition in Heterogeneous
Wireless Networks . . . . . . . . . . . 2299--2308
Ning Xie and
Le Ou-Yang and
Alex X. Liu A Machine Learning Approach to Blind
Multi-Path Classification for Massive
MIMO Systems . . . . . . . . . . . . . . 2309--2322
Quang-Trung Luu and
Sylvaine Kerboeuf and
Alexandre Mouradian and
Michel Kieffer A Coverage-Aware Resource Provisioning
Method for Network Slicing . . . . . . . 2393--2406
Stefano Coniglio and
Luca Giovanni Gianoli and
Edoardo Amaldi and
Antonio Capone Elastic Traffic Engineering Subject to a
Fair Bandwidth Allocation via Bilevel
Programming . . . . . . . . . . . . . . 2407--2420
János Tapolcai and
Lajos Rónyai and
Balázs Vass and
László Gyimóthi Fast Enumeration of Regional Link
Failures Caused by Disasters With
Limited Size . . . . . . . . . . . . . . 2421--2434
Ali Munir and
Ting He and
Ramya Raghavendra and
Franck Le and
Alex X. Liu Network Scheduling and Compute Resource
Aware Task Placement in Datacenters . . 2435--2448
Xiuzhen Guo and
Yuan He and
Xiaolong Zheng WiZig: Cross-Technology Energy
Communication Over a Noisy Channel . . . 2449--2460
Guocong Quan and
Jian Tan and
Atilla Eryilmaz Counterintuitive Characteristics of
Optimal Distributed LRU Caching Over
Unreliable Channels . . . . . . . . . . 2461--2474
Jingxuan Zhang and
Kai Gao and
Y. Richard Yang and
Jun Bi Prophet: Toward Fast, Error-Tolerant
Model-Based Throughput Prediction for
Reactive Flows in DC Networks . . . . . 2475--2488
Yuxuan Jiang and
Mohammad Shahrad and
David Wentzlaff and
Danny H. K. Tsang and
Carlee Joe-Wong Burstable Instances for Clouds:
Performance Modeling, Equilibrium
Analysis, and Revenue Maximization . . . 2489--2502
Hao Zhou and
Xiaofeng Gao and
Jiaqi Zheng and
Guihai Chen Scheduling Relaxed Loop-Free Updates
Within Tight Lower Bounds in SDNs . . . 2503--2516
Thomas Stahlbuhk and
Brooke Shrader and
Eytan Modiano Throughput Maximization in Uncooperative
Spectrum Sharing Networks . . . . . . . 2517--2530
Zhanzhan Zhang and
Yin Sun and
Ashutosh Sabharwal and
Zhiyong Chen and
Bin Xia Scheduling and Power Allocation Dampens
the Negative Effect of Channel
Misreporting in Massive MIMO . . . . . . 2531--2544
Zhiwei Zhao and
Geyong Min and
Wei Dong and
Xue Liu and
Weifeng Gao and
Tao Gu and
Minghang Yang Exploiting Link Diversity for
Performance-Aware and Repeatable
Simulation in Low-Power Wireless
Networks . . . . . . . . . . . . . . . . 2545--2558
Ali Mohammadkhan and
K. K. Ramakrishnan and
Vivek A. Jain CleanG --- Improving the Architecture
and Protocols for Future Cellular
Networks With NFV . . . . . . . . . . . 2559--2572
Xianjin Xia and
Yuanqing Zheng and
Tao Gu FTrack: Parallel Decoding for LoRa
Transmissions . . . . . . . . . . . . . 2573--2586
Muhammad Shahbaz and
Lalith Suresh and
Jennifer Rexford and
Nick Feamster and
Ori Rottenstreich and
Mukesh Hira Elmo: Source Routed Multicast for Public
Clouds . . . . . . . . . . . . . . . . . 2587--2600
Mark Shifrin and
Daniel S. Menasché and
Asaf Cohen and
Dennis Goeckel and
Omer Gurewitz Optimal PHY Configuration in Wireless
Networks . . . . . . . . . . . . . . . . 2601--2614
Jinyong Chang and
Yanyan Ji and
Bilin Shao and
Maozhi Xu and
Rui Xue Certificateless Homomorphic Signature
Scheme for Network Coding . . . . . . . 2615--2628
Jinlong E. and
Yong Cui and
Zhenhua Li and
Mingkang Ruan and
Ennan Zhai HyCloud: Tweaking Hybrid Cloud Storage
Services for Cost-Efficient Filesystem
Hosting . . . . . . . . . . . . . . . . 2629--2642
Lingnan Gao and
George N. Rouskas Congestion Minimization for Service
Chain Routing Problems With Path Length
Considerations . . . . . . . . . . . . . 2643--2656
Sicheng Zhao and
Xing Wu and
Zuqing Zhu On Parallel and Hitless vSDN
Reconfiguration . . . . . . . . . . . . 2657--2670
Fehmina Malik and
Manjesh K. Hanawal and
Yezekael Hayel Zero-Rating of Content and Its Effect on
the Quality of Service in the Internet 2671--2684
Kemi Ding and
Junshan Zhang Multi-Party Privacy Conflict Management
in Online Social Networks: a Network
Game Perspective . . . . . . . . . . . . 2685--2698
Tong Ye and
Jingjie Ding and
Tony T. Lee and
Guido Maier AWG-Based Nonblocking Shuffle--Exchange
Networks . . . . . . . . . . . . . . . . 2699--2712
Huazhe Wang and
Xin Li and
Yang Wang and
Yu Zhao and
Ye Yu and
Hongkun Yang and
Chen Qian SICS: Secure and Dynamic Middlebox
Outsourcing . . . . . . . . . . . . . . 2713--2726
Juhyeng Han and
Seongmin Kim and
Daeyang Cho and
Byungkwon Choi and
Jaehyeong Ha and
Dongsu Han A Secure Middlebox Framework for
Enabling Visibility Over Multiple
Encryption Protocols . . . . . . . . . . 2727--2740
Hui Xia and
Rui Zhang and
Xiangguo Cheng and
Tie Qiu and
Dapeng Oliver Wu Two-Stage Game Design of Payoff
Decision-Making Scheme for Crowdsourcing
Dilemmas . . . . . . . . . . . . . . . . 2741--2754
Boyuan Yan and
Yongli Zhao and
Xiaosong Yu and
Yajie Li and
Sabidur Rahman and
Yongqi He and
Xiangjun Xin and
Jie Zhang Service Function Path Provisioning With
Topology Aggregation in Multi-Domain
Optical Networks . . . . . . . . . . . . 2755--2767
Yiming Zhang and
Haonan Wang and
Menghan Jia and
Jinyan Wang and
Dongsheng Li and
Guangtao Xue and
Kian-Lee Tan TopoX: Topology Refactorization for
Minimizing Network Communication in
Graph Computations . . . . . . . . . . . 2768--2782
Xi Huang and
Simeng Bian and
Ziyu Shao and
Hong Xu Predictive Switch-Controller Association
and Control Devolution for SDN Systems 2783--2796
Lei Deng and
Haifeng Zheng and
Xiao-Yang Liu and
Xinxin Feng and
Zhizhang David Chen Network Latency Estimation With Leverage
Sampling for Personal Devices: an
Adaptive Tensor Completion Approach . . 2797--2808
Vasileios Giotsas and
George Nomikos and
Vasileios Kotronis and
Pavlos Sermpezis and
Petros Gigis and
Lefteris Manassakis and
Christoph Dietzel and
Stavros Konstantaras and
Xenofontas Dimitropoulos O Peer, Where Art Thou? Uncovering
Remote Peering Interconnections at IXPs 1--16
Zehua Guo and
Yang Xu and
Ya-Feng Liu and
Sen Liu and
H. Jonathan Chao and
Zhi-Li Zhang and
Yuanqing Xia AggreFlow: Achieving Power Efficiency,
Load Balancing, and Quality of Service
in Data Center Networks . . . . . . . . 17--33
Lin Wang and
Lei Jiao and
Ting He and
Jun Li and
Henri Bal Service Placement for Collaborative Edge
Applications . . . . . . . . . . . . . . 34--47
Haipeng Dai and
Yunhuai Liu and
Nan Yu and
Chaofeng Wu and
Guihai Chen and
Tian He and
Alex X. Liu Radiation Constrained Wireless Charger
Placement . . . . . . . . . . . . . . . 48--64
Meng Jin and
Yuan He and
Xin Meng and
Dingyi Fang and
Xiaojiang Chen Parallel Backscatter in the Wild: When
Burstiness and Randomness Play With You 65--77
Xiaoli Zhang and
Qi Li and
Zeyu Zhang and
Jianping Wu and
Jiahai Yang vSFC: Generic and Agile Verification of
Service Function Chains in the Cloud . . 78--91
Minmei Wang and
Chen Qian and
Xin Li and
Shouqian Shi and
Shigang Chen Collaborative Validation of Public-Key
Certificates for IoT by Distributed
Caching . . . . . . . . . . . . . . . . 92--105
Zahra Naghsh and
Shahrokh Valaee Conflict-Free Scheduling in Cellular V2X
Communications . . . . . . . . . . . . . 106--119
Weng Chon Ao and
Po-Han Huang and
Konstantinos Psounis Joint Workload Distribution and Capacity
Augmentation in Hybrid Datacenter
Networks . . . . . . . . . . . . . . . . 120--133
Shaojun Zou and
Jiawei Huang and
Jianxin Wang and
Tian He Flow-Aware Adaptive Pacing to Mitigate
TCP Incast in Data Center Networks . . . 134--147
Yunpeng Li and
Costas A. Courcoubetis and
Lingjie Duan and
Richard Weber Optimal Pricing for Peer-to-Peer Sharing
With Network Externalities . . . . . . . 148--161
Chuanwen Luo and
Meghana N. Satpute and
Deying Li and
Yongcai Wang and
Wenping Chen and
Weili Wu Fine-Grained Trajectory Optimization of
Multiple UAVs for Efficient Data
Gathering from WSNs . . . . . . . . . . 162--175
Wenzheng Xu and
Weifa Liang and
Zichuan Xu and
Jian Peng and
Dezhong Peng and
Tang Liu and
Xiaohua Jia and
Sajal K. Das Approximation Algorithms for the
Generalized Team Orienteering Problem
and its Applications . . . . . . . . . . 176--189
Zuyuan Zhang and
Fangming Shao and
Nan Zhang and
Yifeng Niu Maximizing $k$-Terminal Network
Reliability in Some Sparse Graphs . . . 190--202
Huanhuan Huang and
Tong Ye and
Tony T. Lee and
Weiqiang Sun Delay and Stability Analysis of
Connection-Based Slotted-Aloha . . . . . 203--219
Konstantinos Psychasand and
Javad Ghaderi High-Throughput Bin Packing: Scheduling
Jobs With Random Resource Demands in
Clusters . . . . . . . . . . . . . . . . 220--233
B. R. Vinay Kumar and
Navin Kashyap Probabilistic Forwarding of Coded
Packets on Networks . . . . . . . . . . 234--247
Jianchun Liu and
Hongli Xu and
Gongming Zhao and
Chen Qian and
Xingpeng Fan and
Xuwei Yang and
He Huang Incremental Server Deployment for
Software-Defined NFV-Enabled Networks 248--261
Timmy Schüller and
Nils Aschenbruck and
Markus Chimani and
Martin Horneffer Failure Resiliency With Only a Few
Tunnels --- Enabling Segment Routing for
Traffic Engineering . . . . . . . . . . 262--274
Vitalii Demianiuk and
Sergey Gorinsky and
Sergey I. Nikolenko and
Kirill Kogan Robust Distributed Monitoring of Traffic
Flows . . . . . . . . . . . . . . . . . 275--288
Chunyu Qiao and
Jiliang Wang and
Yunhao Liu Beyond QoE: Diversity Adaptation in
Video Streaming at the Edge . . . . . . 289--302
Luca Maria Castiglione and
Paolo Falcone and
Alberto Petrillo and
Simon Pietro Romano and
Stefania Santini Cooperative Intersection Crossing Over
5G . . . . . . . . . . . . . . . . . . . 303--317
Ahsen Ejaz and
Vassilis Papaefstathiou and
Ioannis Sourdis HighwayNoC: Approaching Ideal NoC
Performance With Dual Data Rate Routers 318--331
Peng Zhang and
Fangzheng Zhang and
Shimin Xu and
Zuoru Yang and
Hao Li and
Qi Li and
Huanzhao Wang and
Chao Shen and
Chengchen Hu Network-Wide Forwarding Anomaly
Detection and Localization in Software
Defined Networks . . . . . . . . . . . . 332--345
Saadallah Kassir and
Pablo Caballero Garces and
Gustavo de Veciana and
Nannan Wang and
Xi Wang and
Paparao Palacharla An Analytical Model and Performance
Evaluation of Multihomed Multilane
VANETs . . . . . . . . . . . . . . . . . 346--359
Zhiyuan Xu and
Dejun Yang and
Jian Tang and
Yinan Tang and
Tongtong Yuan and
Yanzhi Wang and
Guoliang Xue An Actor--Critic-Based Transfer Learning
Framework for Experience-Driven
Networking . . . . . . . . . . . . . . . 360--371
Xinyu Tong and
Yang Wan and
Qianru Li and
Xiaohua Tian and
Xinbing Wang CSI Fingerprinting Localization With Low
Human Efforts . . . . . . . . . . . . . 372--385
Jianxiong Guo and
Tiantian Chen and
Weili Wu A Multi-Feature Diffusion Model: Rumor
Blocking in Social Networks . . . . . . 386--397
Canh T. Dinh and
Nguyen H. Tran and
Minh N. H. Nguyen and
Choong Seon Hong and
Wei Bao and
Albert Y. Zomaya and
Vincent Gramoli Federated Learning Over Wireless
Networks: Convergence Analysis and
Resource Allocation . . . . . . . . . . 398--409
Zhichao Cao and
Jiliang Wang and
Daibo Liu and
Qiang Ma and
Xin Miao and
Xufei Mao Chase++: Fountain-Enabled Fast Flooding
in Asynchronous Duty Cycle Networks . . 410--422
Wei Bai and
Shuihai Hu and
Kai Chen and
Kun Tan and
Yongqiang Xiong One More Config is Enough: Saving
(DC)TCP for High-Speed Extremely
Shallow-Buffered Datacenters . . . . . . 489--502
Sándor Laki and
Szilveszter Nádas and
Gerg\Ho Gombos and
Ferenc Fejes and
Péter Hudoba and
Zoltán Turányi and
Zoltán Kiss and
Csaba Keszei Core-Stateless Forwarding With QoS
Revisited: Decoupling Delay and
Bandwidth Requirements . . . . . . . . . 503--516
Gal Mendelson and
Shay Vargaftik and
Katherine Barabash and
Dean H. Lorenz and
Isaac Keslassy and
Ariel Orda AnchorHash: a Scalable Consistent Hash 517--528
Bahman Abolhassani and
John Tadrous and
Atilla Eryilmaz Delay Gain Analysis of Wireless
Multicasting for Content Distribution 529--542
Fan Cheng and
Congtao Wang and
Xingyi Zhang and
Yun Yang A Local-Neighborhood Information Based
Overlapping Community Detection
Algorithm for Large-Scale Complex
Networks . . . . . . . . . . . . . . . . 543--556
Wenjie Li and
Sharief M. A. Oteafy and
Marwan Fayed and
Hossam S. Hassanein Quality of Experience in ICN: Keep Your
Low- Bitrate Close and High-Bitrate
Closer . . . . . . . . . . . . . . . . . 557--570
Qiao Xiang and
Haitao Yu and
James Aspnes and
Franck Le and
Chin Guok and
Linghe Kong and
Y. Richard Yang Optimizing in the Dark: Learning Optimal
Network Resource Reservation Through a
Simple Request Interface . . . . . . . . 571--584
Xin Wang and
Yinlong Xu and
Richard T. B. Ma Paid Peering, Settlement-Free Peering,
or Both? . . . . . . . . . . . . . . . . 585--594
Liekang Zeng and
Xu Chen and
Zhi Zhou and
Lei Yang and
Junshan Zhang CoEdge: Cooperative DNN Inference With
Adaptive Workload Partitioning Over
Heterogeneous Edge Devices . . . . . . . 595--608
Itamar Cohen and
Gil Einziger and
Roy Friedman and
Gabriel Scalosub Access Strategies for Network Caching 609--622
Menghao Zhang and
Guanyu Li and
Lei Xu and
Jiasong Bai and
Mingwei Xu and
Guofei Gu and
Jianping Wu Control Plane Reflection Attacks and
Defenses in Software-Defined Networks 623--636
Marco Chiesa and
Roshan Sedar and
Gianni Antichi and
Michael Borokhovich and
Andrzej Kamisi\'nski and
Georgios Nikolaidis and
Stefan Schmid Fast ReRoute on Programmable Switches 637--650
Giuliano Casale and
Nicolas Gast Performance Analysis Methods for
List-Based Caches With Non-Uniform
Access . . . . . . . . . . . . . . . . . 651--664
Jing Hou and
Li Sun and
Tao Shu and
Yong Xiao and
Marwan Krunz Economics of Strategic Network
Infrastructure Sharing: a Backup
Reservation Approach . . . . . . . . . . 665--680
Libin Liu and
Hong Xu Elasecutor: Elastic Executor Scheduling
in Data Analytics Systems . . . . . . . 681--694
Lin He and
Gang Ren and
Ying Liu and
Jiahai Yang PAVI: Bootstrapping Accountability and
Privacy to IPv6 Internet . . . . . . . . 695--708
Qian Ma and
Edmund Yeh and
Jianwei Huang Selfish Caching Games on Directed Graphs 709--722
Zili Meng and
Yaning Guo and
Yixin Shen and
Jing Chen and
Chao Zhou and
Minhu Wang and
Jia Zhang and
Mingwei Xu and
Chen Sun and
Hongxin Hu Practically Deploying Heavyweight
Adaptive Bitrate Algorithms With
Teacher-Student Learning . . . . . . . . 723--736
Gauri Joshi and
Dhruva Kaushal Synergy via Redundancy: Adaptive
Replication Strategies and Fundamental
Limits . . . . . . . . . . . . . . . . . 737--749
Jeongmin Bae and
Joohyun Lee and
Song Chong Learning to Schedule Network Resources
Throughput and Delay Optimally Using
Q$^+$-Learning . . . . . . . . . . . . . 750--763
Shaoran Li and
Yan Huang and
Chengzhang Li and
Brian A. Jalaian and
Y. Thomas Hou and
Wenjing Lou and
Stephen Russell Maximize Spectrum Efficiency in Underlay
Coexistence With Channel Uncertainty . . 764--778
Vajiheh Farhadi and
Fidan Mehmeti and
Ting He and
Thomas F. La Porta and
Hana Khamfroush and
Shiqiang Wang and
Kevin S. Chan and
Konstantinos Poularakis Service Placement and Request Scheduling
for Data-Intensive Applications in Edge
Clouds . . . . . . . . . . . . . . . . . 779--792
Yong Huang and
Wei Wang and
Tao Jiang and
Qian Zhang Detecting Colluding Sybil Attackers in
Robotic Networks Using Backscatters . . 793--804
Galia Shabtai and
Danny Raz and
Yuval Shavitt Risk Aware Stochastic Placement of Cloud
Services . . . . . . . . . . . . . . . . 805--820
Zicheng Chi and
Yan Li and
Hongyu Sun and
Zhichuan Huang and
Ting Zhu Simultaneous Bi-Directional
Communications and Data Forwarding Using
a Single ZigBee Data Stream . . . . . . 821--833
Fujie Fan and
Hangyu Meng and
Bing Hu and
Kwan L. Yeung and
Zhifeng Zhao Roulette Wheel Balancing Algorithm With
Dynamic Flowlet Switching for Multipath
Datacenter Networks . . . . . . . . . . 834--847
Mohammad Jahanian and
K. K. Ramakrishnan Name Space Analysis: Verification of
Named Data Network Data Planes . . . . . 848--861
Che-Hao Yu and
Lin Huang and
Cheng-Shang Chang and
Duan-Shin Lee Poisson Receivers: a Probabilistic
Framework for Analyzing Coded Random
Access . . . . . . . . . . . . . . . . . 862--875
Ming Shi and
Xiaojun Lin and
Sonia Fahmy Competitive Online Convex Optimization
With Switching Costs and Ramp
Constraints . . . . . . . . . . . . . . 876--889
Xiaofeng Shi and
Haofan Cai and
Minmei Wang and
Ge Wang and
Baiwen Huang and
Junjie Xie and
Chen Qian TagAttention: Mobile Object Tracing With
Zero Appearance Knowledge by Vision-RFID
Fusion . . . . . . . . . . . . . . . . . 890--903
Rukhsana Ruby and
Shuxin Zhong and
Basem M. ElHalawany and
Hanjiang Luo and
Kaishun Wu SDN-Enabled Energy-Aware Routing in
Underwater Multi-Modal Communication
Networks . . . . . . . . . . . . . . . . 965--978
Behrooz Farkiani and
Bahador Bakhshi and
S. Ali MirHassani and
Tim Wauters and
Bruno Volckaert and
Filip De Turck Prioritized Deployment of Dynamic
Service Function Chains . . . . . . . . 979--993
Dongxiao Yu and
Yifei Zou and
Yong Zhang and
Hao Sheng and
Weifeng Lv and
Xiuzhen Cheng An Exact Implementation of the Abstract
MAC Layer via Carrier Sensing in Dynamic
Networks . . . . . . . . . . . . . . . . 994--1007
Jiadong Lou and
Xu Yuan and
Sastry Kompella and
Nian-Feng Tzeng Boosting or Hindering: AoI and
Throughput Interrelation in
Routing-Aware Multi-Hop Wireless
Networks . . . . . . . . . . . . . . . . 1008--1021
Chien-Sheng Yang and
Ramtin Pedarsani and
A. Salman Avestimehr Edge Computing in the Dark: Leveraging
Contextual-Combinatorial Bandit and
Coded Computing . . . . . . . . . . . . 1022--1031
Kamran Ali and
Alex X. Liu and
Ioannis Pefkianakis and
Kyu-Han Kim Distributed Spectrum Sharing for
Enterprise Powerline Communication
Networks . . . . . . . . . . . . . . . . 1032--1045
Mengyuan Zhang and
Lei Yang and
Shibo He and
Ming Li and
Junshan Zhang Privacy-Preserving Data Aggregation for
Mobile Crowdsensing With Externality: an
Auction Approach . . . . . . . . . . . . 1046--1059
Gourav Saha and
Alhussein A. Abouzeid and
Zaheer Khan and
Marja Matinmikko-Blue On the Optimal Duration of Spectrum
Leases in Exclusive License Markets With
Stochastic Demand . . . . . . . . . . . 1060--1073
Ahmed M. Abdelmoniem and
Brahim Bensaou T-RACKs: a Faster Recovery Mechanism for
TCP in Data Center Networks . . . . . . 1074--1087
Tianming Zhao and
Weisheng Si and
Wei Li and
Albert Y. Zomaya Optimizing the Maximum Vertex Coverage
Attacks Under Knapsack Constraint . . . 1088--1104
Guilherme Iecker Ricardo and
Alina Tuholukova and
Giovanni Neglia and
Thrasyvoulos Spyropoulos Caching Policies for Delay Minimization
in Small Cell Networks With Coordinated
Multi-Point Joint Transmissions . . . . 1105--1115
\'Ciril Ro\vzi\'c and
Galen Sasaki Optical Protection Cost of Loop Free
Alternates on Completely Connected IP
Networks Over Optical Rings . . . . . . 1116--1127
Meng Jin and
Yuan He and
Chengkun Jiang and
Yunhao Liu Parallel Backscatter: Channel Estimation
and Beyond . . . . . . . . . . . . . . . 1128--1140
Vitalii Demianiuk and
Kirill Kogan and
Sergey Nikolenko Approximate Packet Classifiers With
Controlled Accuracy . . . . . . . . . . 1141--1154
Holger Boche and
Rafael F. Schaefer and
H. Vincent Poor On the Algorithmic Solvability of
Channel Dependent Classification
Problems in Communication Systems . . . 1155--1168
Dan Xia and
Xiaolong Zheng and
Liang Liu and
Chaoyu Wang and
Huadong Ma \em $c$--Chirp: Towards Symmetric
Cross-Technology Communication Over
Asymmetric Channels . . . . . . . . . . 1169--1182
Jiawei Huang and
Wenjun Lyu and
Weihe Li and
Jianxin Wang and
Tian He Mitigating Packet Reordering for Random
Packet Spraying in Data Center Networks 1183--1196
Yang Yang and
Yanjiao Chen and
Fei Chen A Compressive Integrity Auditing
Protocol for Secure Cloud Storage . . . 1197--1209
K. P. Naveen and
Rajesh Sundaresan Double-Auction Mechanisms for Resource
Trading Markets . . . . . . . . . . . . 1210--1223
Rahul Singh and
P. R. Kumar Adaptive CSMA for Decentralized
Scheduling of Multi-Hop Networks With
End-to-End Deadline Constraints . . . . 1224--1237
Gamal Sallam and
Bo Ji Joint Placement and Allocation of VNF
Nodes With Budget and Capacity
Constraints . . . . . . . . . . . . . . 1238--1251
Zhenlin An and
Lei Yang and
Qiongzheng Lin Identifying UHF RFIDs in Range of
Readers With WiFi . . . . . . . . . . . 1252--1265
Mohammed Alasmar and
Richard Clegg and
Nickolay Zakhleniuk and
George Parisis Internet Traffic Volumes are Not
Gaussian --- They are Log-Normal: an
18-Year Longitudinal Study With
Implications for Modelling and
Prediction . . . . . . . . . . . . . . . 1266--1279
Haisheng Tan and
Chi Zhang and
Chao Xu and
Yupeng Li and
Zhenhua Han and
Xiang-Yang Li Regularization-Based Coflow Scheduling
in Optical Circuit Switches . . . . . . 1280--1293
Cho-Chun Chiu and
Ting He Stealthy DGoS Attack: DeGrading of
Service Under the Watch of Network
Tomography . . . . . . . . . . . . . . . 1294--1307
Deke Guo and
Junjie Xie and
Xiaofeng Shi and
Haofan Cai and
Chen Qian and
Honghui Chen HDS: a Fast Hybrid Data Location Service
for Hierarchical Mobile Edge Computing 1308--1320
Feihong Yang and
Yuan Shen Critical Intensity for Unbounded
Sequential Localizability . . . . . . . 1321--1334
Liangxiao Xin and
David Starobinski Countering Cascading Denial of Service
Attacks on Wi-Fi Networks . . . . . . . 1335--1348
Trupil Limbasiya and
Debasis Das and
Sajal K. Das MComIoV: Secure and Energy-Efficient
Message Communication Protocols for
Internet of Vehicles . . . . . . . . . . 1349--1361
Subhramoy Mohanti and
Elif Bozkaya and
M. Yousof Naderi and
Berk Canberk and
Gokhan Secinti and
Kaushik R. Chowdhury WiFED Mobile: WiFi Friendly Energy
Delivery With Mobile Distributed
Beamforming . . . . . . . . . . . . . . 1362--1375
Jinwei Liu and
Haiying Shen and
Hongmei Chi and
Husnu S. Narman and
Yongyi Yang and
Long Cheng and
Wingyan Chung A Low-Cost Multi-Failure Resilient
Replication Scheme for High-Data
Availability in Cloud Storage . . . . . 1436--1451
Yan Gu and
Bo Liu and
Xiaojun Shen Asymptotically Optimal Online Scheduling
With Arbitrary Hard Deadlines in
Multi-Hop Communication Networks . . . . 1452--1466
Amir Behrouzi-Far and
Emina Soljanin Efficient Replication for Fast and
Predictable Performance in Distributed
Computing . . . . . . . . . . . . . . . 1467--1476
Jiancheng Ye and
Ka-Cheong Leung and
Steven H. Low Combating Bufferbloat in
Multi-Bottleneck Networks: Theory and
Algorithms . . . . . . . . . . . . . . . 1477--1493
Sneihil Gopal and
Sanjit K. Kaul and
Rakesh Chaturvedi and
Sumit Roy Coexistence of Age and Throughput
Optimizing Networks: a Spectrum Sharing
Game . . . . . . . . . . . . . . . . . . 1494--1508
Guanyu Li and
Menghao Zhang and
Shicheng Wang and
Chang Liu and
Mingwei Xu and
Ang Chen and
Hongxin Hu and
Guofei Gu and
Qi Li and
Jianping Wu Enabling Performant, Flexible and
Cost-Efficient DDoS Defense With
Programmable Switches . . . . . . . . . 1509--1526
Guanhao Wu and
Xiaofeng Gao and
Jiaqi Zheng and
Guihai Chen Achieving Fast Loop-Free Updates With
Ingress Port in Software-Defined
Networks . . . . . . . . . . . . . . . . 1527--1539
Miguel Neves and
Bradley Huffaker and
Kirill Levchenko and
Marinho Barcellos Dynamic Property Enforcement in
Programmable Data Planes . . . . . . . . 1540--1552
Huanle Xu and
Yang Liu and
Wing Cheong Lau Optimal Job Scheduling With Resource
Packing for Heterogeneous Servers . . . 1553--1566
Yuan He and
Xiuzhen Guo and
Jia Zhang and
Haotian Jiang WIDE: Physical-Level CTC via Digital
Emulation . . . . . . . . . . . . . . . 1567--1579
Ziyao Zhang and
Liang Ma and
Kin K. Leung and
Franck Le More Is Not Always Better: an Analytical
Study of Controller Synchronizations in
Distributed SDN . . . . . . . . . . . . 1580--1590
Tingjun Chen and
Mahmood Baraani Dastjerdi and
Harish Krishnaswamy and
Gil Zussman Wideband Full-Duplex Phased Array With
Joint Transmit and Receive Beamforming:
Optimization and Rate Gains . . . . . . 1591--1604
Zhe Chen and
Xu Zhang and
Sulei Wang and
Yuedong Xu and
Jie Xiong and
Xin Wang Enabling Practical Large-Scale MIMO in
WLANs With Hybrid Beamforming . . . . . 1605--1619
Cheng-Shang Chang and
Jang-Ping Sheu and
Yi-Jheng Lin On the Theoretical Gap of Channel
Hopping Sequences With Maximum
Rendezvous Diversity in the Multichannel
Rendezvous Problem . . . . . . . . . . . 1620--1633
Bijoy Chand Chatterjee and
Abdul Wadud and
Imran Ahmed and
Eiji Oki Priority-Based Inter-Core and Inter-Mode
Crosstalk-Avoided Resource Allocation
for Spectrally-Spatially Elastic Optical
Networks . . . . . . . . . . . . . . . . 1634--1647
Balázs Vass and
János Tapolcai and
Erika R. Bérczi-Kovács Enumerating Maximal Shared Risk Link
Groups of Circular Disk Failures Hitting
$k$ Nodes . . . . . . . . . . . . . . . 1648--1661
Yifei Zou and
Dongxiao Yu and
Jiguo Yu and
Yong Zhang and
Falko Dressler and
Xiuzhen Cheng Distributed Byzantine-Resilient
Multiple-Message Dissemination in
Wireless Networks . . . . . . . . . . . 1662--1675
Yuhui Zhang and
Dejun Yang RobustPay$^+$: Robust Payment Routing
With Approximation Guarantee in
Blockchain-Based Payment Channel
Networks . . . . . . . . . . . . . . . . 1676--1686
Ning Li and
Zhaoxin Zhang and
Alex X. Liu and
Xin Yuan and
Yexia Cheng Pairwise-Based Multi-Attribute Decision
Making Approach for Wireless Network . . 1687--1702
Christos Tsanikidis and
Javad Ghaderi On the Power of Randomization for
Scheduling Real-Time Traffic in Wireless
Networks . . . . . . . . . . . . . . . . 1703--1716
Si Chen and
Maolin Zhang and
Jia Zhao and
Wei Gong and
Jiangchuan Liu Reliable and Practical Bluetooth
Backscatter With Commodity Devices . . . 1717--1729
Gayane Vardoyan and
C. V. Hollot and
Don Towsley Towards Stability Analysis of Data
Transport Mechanisms: a Fluid Model and
Its Applications . . . . . . . . . . . . 1730--1744
Qian Ma and
Jianwei Huang and
Tamer Ba\csar and
Ji Liu and
Xudong Chen Reputation and Pricing Dynamics in
Online Markets . . . . . . . . . . . . . 1745--1759
Jianan Zhang and
Abhishek Sinha and
Jaime Llorca and
Antonia M. Tulino and
Eytan Modiano Optimal Control of Distributed Computing
Networks With Mixed-Cast Traffic Flows 1760--1773
Himaja Kesavareddigari and
Atilla Eryilmaz Counter-Intuitive Characteristics of
Rational Decision-Making Using Biased
Inputs in Information Networks . . . . . 1774--1785
Raimund Kirner and
Peter Puschner A Quantitative Analysis of Interfaces to
Time-Triggered Communication Buses . . . 1786--1797
Qiang Li and
Zhihao Wang and
Dawei Tan and
Jinke Song and
Haining Wang and
Limin Sun and
Jiqiang Liu GeoCAM: an IP-Based Geolocation Service
Through Fine-Grained and Stable Webcam
Landmarks . . . . . . . . . . . . . . . 1798--1812
Ming Tang and
Jianwei Huang How Do You Earn Money on Live Streaming
Platforms? --- A Study of Donation-Based
Markets . . . . . . . . . . . . . . . . 1813--1826
Ning Xie and
Haijun Tan and
Lei Huang and
Alex X. Liu Physical-Layer Authentication in
Wirelessly Powered Communication
Networks . . . . . . . . . . . . . . . . 1827--1840
Haisheng Tan and
Shaofeng H.-C. Jiang and
Zhenhua Han and
Mingxia Li Asymptotically Optimal Online Caching on
Multiple Caches With Relaying and
Bypassing . . . . . . . . . . . . . . . 1841--1852
Huy Duong and
Brigitte Jaumard and
David Coudert and
Romualdas Armolavicius Efficient Make-Before-Break Layer 2
Reoptimization . . . . . . . . . . . . . 1910--1921
Dianqi Han and
Ang Li and
Lili Zhang and
Yan Zhang and
Jiawei Li and
Tao Li and
Ting Zhu and
Yanchao Zhang Deep Learning-Guided Jamming for
Cross-Technology Wireless Networks:
Attack and Defense . . . . . . . . . . . 1922--1932
Isfar Tariq and
Rajat Sen and
Thomas Novlan and
Salam Akoum and
Milap Majmundar and
Gustavo de Veciana and
Sanjay Shakkottai Auto-Tuning for Cellular Scheduling
Through Bandit-Learning and
Low-Dimensional Clustering . . . . . . . 1933--1947
Gourav Saha and
Alhussein A. Abouzeid Optimal Spectrum Partitioning and
Licensing in Tiered Access Under
Stochastic Market Models . . . . . . . . 1948--1961
Tasmeen Zaman Ornee and
Yin Sun Sampling and Remote Estimation for the
Ornstein--Uhlenbeck Process Through
Queues: Age of Information and Beyond 1962--1975
Tian Pan and
Xingchen Lin and
Enge Song and
Cheng Xu and
Jiao Zhang and
Hao Li and
Jianhui Lv and
Tao Huang and
Bin Liu and
Beichuan Zhang NB-Cache: Non-Blocking In-Network
Caching for High-Performance Content
Routers . . . . . . . . . . . . . . . . 1976--1989
Wei Sun and
Lisong Xu and
Sebastian Elbaum and
Di Zhao Model-Agnostic and Efficient Exploration
of Numerical Congestion Control State
Space of Real-World TCP Implementations 1990--2004
Dai Zhang and
Yu Zhou and
Zhaowei Xi and
Yangyang Wang and
Mingwei Xu and
Jianping Wu HyperTester: High-Performance Network
Testing Driven by Programmable Switches 2005--2018
Su Wang and
Yichen Ruan and
Yuwei Tu and
Satyavrat Wagle and
Christopher G. Brinton and
Carlee Joe-Wong Network-Aware Optimization of
Distributed Learning for Fog Computing 2019--2032
I-Chieh Lin and
Yu-Hsuan Yeh and
Kate Ching-Ju Lin Toward Optimal Partial Parallelization
for Service Function Chaining . . . . . 2033--2044
Zai Shi and
Atilla Eryilmaz A Flexible Distributed Stochastic
Optimization Framework for Concurrent
Tasks in Processing Networks . . . . . . 2045--2058
Xuwei Yang and
Hongli Xu and
Shigang Chen and
He Huang Indirect Multi-Mapping for Burstiness
Management in Software Defined Networks 2059--2072
He Huang and
Yu-E Sun and
Chaoyi Ma and
Shigang Chen and
Yang Du and
Haibo Wang and
Qingjun Xiao Spread Estimation With Non-Duplicate
Sampling in High-Speed Networks . . . . 2073--2086
Kashyap Thimmaraju and
Liron Schiff and
Stefan Schmid Preacher: Network Policy Checker for
Adversarial Environments . . . . . . . . 2087--2100
Sergio Barrachina-Muñoz and
Boris Bellalta and
Edward W. Knightly Wi-Fi Channel Bonding: an All-Channel
System and Experimental Study From Urban
Hotspots to a Sold-Out Stadium . . . . . 2101--2114
Qixia Zhang and
Fangming Liu and
Chaobing Zeng Online Adaptive Interference-Aware VNF
Deployment and Migration for 5G Network
Slice . . . . . . . . . . . . . . . . . 2115--2128
Ahmed M. Bedewy and
Yin Sun and
Rahul Singh and
Ness B. Shroff Low-Power Status Updates via Sleep-Wake
Scheduling . . . . . . . . . . . . . . . 2129--2141
Dongxiao Yu and
Yifei Zou and
Jiguo Yu and
Yu Wu and
Weifeng Lv and
Xiuzhen Cheng and
Falko Dressler and
Francis C. M. Lau Distributed Broadcasting in Dynamic
Networks . . . . . . . . . . . . . . . . 2142--2155
Wenbin Liu and
Yongjian Yang and
En Wang and
Hengzhi Wang and
Zihe Wang and
Jie Wu Dynamic Online User Recruitment With
(Non-) Submodular Utility in Mobile
CrowdSensing . . . . . . . . . . . . . . 2156--2169
Hongzi Zhu and
Yuxiao Zhang and
Zifan Liu and
Xiao Wang and
Shan Chang and
Yingying Chen Localizing Acoustic Objects on a Single
Phone . . . . . . . . . . . . . . . . . 2170--2183
Yuhang Ye and
Brian Lee and
Ronan Flynn and
Jin Xu and
Guiming Fang and
Yuansong Qiao Delay-Based Network Utility Maximization
Modelling for Congestion Control in
Named Data Networking . . . . . . . . . 2184--2197
Anastasios Giovanidis and
Bruno Baynat and
Clémence Magnien and
Antoine Vendeville Ranking Online Social Users by Their
Influence . . . . . . . . . . . . . . . 2198--2214
Ouri Poupko and
Gal Shahaf and
Ehud Shapiro and
Nimrod Talmon Building a Sybil-Resilient Digital
Community Utilizing Trust-Graph
Connectivity . . . . . . . . . . . . . . 2215--2227
Hongbo Jiang and
Mengyuan Wang and
Ping Zhao and
Zhu Xiao and
Schahram Dustdar A Utility-Aware General Framework With
Quantifiable Privacy Preservation for
Destination Prediction in LBSs . . . . . 2228--2241
Jianghong Wei and
Xiaofeng Chen and
Jianfeng Ma and
Xuexian Hu and
Kui Ren Communication-Efficient and Fine-Grained
Forward-Secure Asynchronous Messaging 2242--2253
Tianqi Yu and
Xianbin Wang and
Jianling Hu A Fast Hierarchical Physical Topology
Update Scheme for Edge-Cloud
Collaborative IoT Systems . . . . . . . 2254--2266
Zhenhua Han and
Haisheng Tan and
Shaofeng H.-C. Jiang and
Wanli Cao and
Xiaoming Fu and
Lan Zhang and
Francis C. M. Lau SPIN: BSP Job Scheduling With
Placement-Sensitive Execution . . . . . 2267--2280
Federico Chiariotti and
Andrea Zanella and
Stepan Kucera and
Kariem Fahmi and
Holger Claussen The HOP Protocol: Reliable
Latency-Bounded End-to-End Multipath
Communication . . . . . . . . . . . . . 2281--2295
Luoyi Fu and
Jiasheng Xu and
Shan Qu and
Zhiying Xu and
Xinbing Wang and
Guihai Chen Seeking the Truth in a Decentralized
Manner . . . . . . . . . . . . . . . . . 2296--2312
Xin Yao and
Rui Zhang and
Dingquan Huang and
Yanchao Zhang Verifiable Query Processing Over
Outsourced Social Graph . . . . . . . . 2313--2326
Ran Ben-Basat and
Gil Einziger and
Shir Landau Feibish and
Jalil Moraney and
Bilal Tayh and
Danny Raz Routing-Oblivious Network-Wide
Measurements . . . . . . . . . . . . . . 2386--2398
Víctor Valls and
George Iosifidis and
Leandros Tassiulas Birkhoff's Decomposition Revisited:
Sparse Scheduling for High-Speed Circuit
Switches . . . . . . . . . . . . . . . . 2399--2412
Ajay Badita and
Parimal Parag and
Vaneet Aggarwal Single-Forking of Coded Subtasks for
Straggler Mitigation . . . . . . . . . . 2413--2424
Melih Bastopcu and
Sennur Ulukus Age of Information for Updates With
Distortion: Constant and Age-Dependent
Distortion Constraints . . . . . . . . . 2425--2438
Mohammad Jahanian and
Jiachen Chen and
K. K. Ramakrishnan Graph-Based Namespaces and Load Sharing
for Efficient Information Dissemination 2439--2452
Van Sy Mai and
Richard J. La and
Abdella Battou Optimal Cybersecurity Investments in
Large Networks Using SIS Model:
Algorithm Design . . . . . . . . . . . . 2453--2466
Mahdieh Ahmadi and
Morteza Golkarifard and
Ali Movaghar and
Hamed Yousefi Processor Sharing Queues With Impatient
Customers and State-Dependent Rates . . 2467--2477
Chi Lin and
Ziwei Yang and
Haipeng Dai and
Liangxian Cui and
Lei Wang and
Guowei Wu Minimizing Charging Delay for
Directional Charging . . . . . . . . . . 2478--2493
Zun Yan and
Peng Cheng and
Zhuo Chen and
Branka Vucetic and
Yonghui Li Two-Dimensional Task Offloading for
Mobile Networks: an Imitation Learning
Framework . . . . . . . . . . . . . . . 2494--2507
Kan Yu and
Jiguo Yu and
Xiuzhen Cheng and
Dongxiao Yu and
Anming Dong Efficient Link Scheduling Solutions for
the Internet of Things Under Rayleigh
Fading . . . . . . . . . . . . . . . . . 2508--2521
Beatriz Lorenzo and
Francisco Javier González-Castaño and
Linke Guo and
Felipe Gil-Castiñeira and
Yuguang Fang Autonomous Robustness Control for Fog
Reinforcement in Dynamic Wireless
Networks . . . . . . . . . . . . . . . . 2522--2535
Giovanni Neglia and
Emilio Leonardi and
Guilherme Iecker Ricardo and
Thrasyvoulos Spyropoulos A Swiss Army Knife for Online Caching in
Small Cell Networks . . . . . . . . . . 2536--2547
Vamseedhar Reddyvari and
Sarat Chandra Bobbili and
Parimal Parag and
Srinivas Shakkottai Mode-Suppression: a Simple, Stable and
Scalable Chunk-Sharing Algorithm for P2P
Networks . . . . . . . . . . . . . . . . 2548--2559
Tom Barbette and
Cyril Soldani and
Laurent Mathy Combined Stateful Classification and
Session Splicing for High-Speed NFV
Service Chaining . . . . . . . . . . . . 2560--2573
Panagiotis Promponas and
Christos Pelekis and
Eirini Eleni Tsiropoulou and
Symeon Papavassiliou Games in Normal and Satisfaction Form
for Efficient Transmission Power
Allocation Under Dual 5G Wireless
Multiple Access Paradigm . . . . . . . . 2574--2587
Ravi Kiran Raman and
Lav R. Varshney Coding for Scalable Blockchains via
Dynamic Distributed Storage . . . . . . 2588--2601
Xuying Meng and
Yequan Wang and
Suhang Wang and
Di Yao and
Yujun Zhang Interactive Anomaly Detection in Dynamic
Communication Networks . . . . . . . . . 2602--2615
Deliang Yang and
Xuan Huang and
Jun Huang and
Xiangmao Chang and
Guoliang Xing and
Yang Yang A First Look at Energy Consumption of
NB-IoT in the Wild: Tools and
Large-Scale Measurement . . . . . . . . 2616--2631
Xianjin Xia and
Yuanqing Zheng and
Tao Gu LiteNap: Downclocking LoRa Reception . . 2632--2645
Shrayan Das and
Kirtan Gopal Panda and
Debarati Sen and
Wasim Arif Maximizing Last-Minute Backup in
Endangered Time-Varying Inter-Datacenter
Networks . . . . . . . . . . . . . . . . 2646--2663
Xingpeng Fan and
Hongli Xu and
He Huang and
Xuwei Yang Real-Time Update of Joint SFC and
Routing in Software Defined Networks . . 2664--2677
Tong Li and
Kai Zheng and
Ke Xu and
Rahul Arvind Jadhav and
Tao Xiong and
Keith Winstein and
Kun Tan Revisiting Acknowledgment Mechanism for
Transport Control: Modeling, Analysis,
and Implementation . . . . . . . . . . . 2678--2692
Ying Wan and
Haoyu Song and
Yang Xu and
Yilun Wang and
Tian Pan and
Chuwen Zhang and
Yi Wang and
Bin Liu T-Cache: Efficient Policy-Based
Forwarding Using Small TCAM . . . . . . 2693--2708
Vignesh Sivaraman and
Biplab Sikdar A Defense Mechanism Against Timing
Attacks on User Privacy in ICN . . . . . 2709--2722
Mohammed Alasmar and
George Parisis and
Jon Crowcroft SCDP: Systematic Rateless Coding for
Efficient Data Transport in Data Centers 2723--2736
Jiazheng Tian and
Kun Xie and
Xin Wang and
Gaogang Xie and
Kenli Li and
Jigang Wen and
Dafang Zhang and
Jiannong Cao Efficiently Inferring Top-$k$ Largest
Monitoring Data Entries Based on
Discrete Tensor Completion . . . . . . . 2737--2750
Yuanyuan Li and
Stratis Ioannidis Cache Networks of Counting Queues . . . 2751--2764
Xinyi Zhang and
Gaogang Xie and
Xin Wang and
Penghao Zhang and
Yanbiao Li and
Kavé Salamatian Fast Online Packet Classification With
Convolutional Neural Network . . . . . . 2765--2778
Tao Hou and
Tao Wang and
Zhuo Lu and
Yao Liu Combating Adversarial Network Topology
Inference by Proactive Topology
Obfuscation . . . . . . . . . . . . . . 2779--2792
Mingli Yu and
Tian Xie and
Ting He and
Patrick McDaniel and
Quinn K. Burke Flow Table Security in SDN: Adversarial
Reconnaissance and Intelligent Attacks 2793--2806
Kuan-Yin Chen and
Sen Liu and
Yang Xu and
Ishant Kumar Siddhrau and
Siyu Zhou and
Zehua Guo and
H. Jonathan Chao SDNShield: NFV-Based Defense Framework
Against DDoS Attacks on SDN Control
Plane . . . . . . . . . . . . . . . . . 1--17
Archana Bura and
Desik Rengarajan and
Dileep Kalathil and
Srinivas Shakkottai and
Jean-Francois Chamberland Learning to Cache and Caching to Learn:
Regret Analysis of Caching Algorithms 18--31
Rajarshi Bhattacharyya and
Archana Bura and
Desik Rengarajan and
Mason Rumuly and
Bainan Xia and
Srinivas Shakkottai and
Dileep Kalathil and
Ricky K. P. Mok and
Amogh Dhamdhere QFlow: a Learning Approach to High QoE
Video Streaming at the Wireless Edge . . 32--46
Yi Ding and
Ling Liu and
Yu Yang and
Yunhuai Liu and
Desheng Zhang and
Tian He From Conception to Retirement: a
Lifetime Story of a 3-Year-Old Wireless
Beacon System in the Wild . . . . . . . 47--61
Vahid Khalilpour Akram and
Orhan Dagdeviren and
Bulent Tavli A Coverage-Aware Distributed
$k$-Connectivity Maintenance Algorithm
for Arbitrarily Large $k$ in Mobile
Sensor Networks . . . . . . . . . . . . 62--75
Jeman Park and
Rhongho Jang and
Manar Mohaisen and
David Mohaisen A Large-Scale Behavioral Analysis of the
Open DNS Resolvers on the Internet . . . 76--89
Xilai Liu and
Yan Xu and
Peng Liu and
Tong Yang and
Jiaqi Xu and
Lun Wang and
Gaogang Xie and
Xiaoming Li and
Steve Uhlig SEAD Counter: Self-Adaptive Counters
With Different Counting Ranges . . . . . 90--106
Arani Bhattacharya and
Caitao Zhan and
Abhishek Maji and
Himanshu Gupta and
Samir R. Das and
Petar M. Djuri\'c Selection of Sensors for Efficient
Transmitter Localization . . . . . . . . 107--119
Bangbang Ren and
Deke Guo and
Yali Yuan and
Guoming Tang and
Weijun Wang and
Xiaoming Fu Optimal Deployment of SRv6 to Enable
Network Interconnection Service . . . . 120--133
Yu Zhang and
Tao Gu and
Xi Zhang MDLdroid: a ChainSGD-Reduce Approach to
Mobile Deep Learning for Personal Mobile
Sensing . . . . . . . . . . . . . . . . 134--147
Amirhossein Reisizadeh and
Saurav Prakash and
Ramtin Pedarsani and
Amir Salman Avestimehr CodedReduce: a Fast and Robust Framework
for Gradient Aggregation in Distributed
Learning . . . . . . . . . . . . . . . . 148--161
Umut Can Çabuk and
Mustafa Tosun and
Orhan Dagdeviren MAX-Tree: a Novel Topology Formation for
Maximal Area Coverage in Wireless Ad-Hoc
Networks . . . . . . . . . . . . . . . . 162--175
Zhiguo Shi and
Guang Yang and
Xiaowen Gong and
Shibo He and
Jiming Chen Quality-Aware Incentive Mechanisms Under
Social Influences in Data Crowdsourcing 176--189
Xin Liu and
Lei Ying Universal Scaling of Distributed Queues
Under Load Balancing in the
Super-Halfin--Whitt Regime . . . . . . . 190--201
Muhammad Saad and
Victor Cook and
Lan Nguyen and
My T. Thai and
David Mohaisen Exploring Partitioning Attacks on the
Bitcoin Network . . . . . . . . . . . . 202--214
Xiaoxi Zhang and
Jianyu Wang and
Li-Feng Lee and
Tom Yang and
Akansha Kalra and
Gauri Joshi and
Carlee Joe-Wong Machine Learning on Volatile Instances:
Convergence, Runtime, and Cost Tradeoffs 215--228
Cho-Hsin Tsai and
Chih-Chun Wang Unifying AoI Minimization and Remote
Estimation --- Optimal Sensor/Controller
Coordination With Random Two-Way Delay 229--242
Xu Li and
Feilong Tang and
Yanmin Zhu and
Luoyi Fu and
Jiadi Yu and
Long Chen and
Jiacheng Liu Processing-While-Transmitting:
Cost-Minimized Transmission in SDN-Based
STINs . . . . . . . . . . . . . . . . . 243--256
Chong Li and
Sisu Xi and
Chenyang Lu and
Roch Guérin and
Christopher D. Gill Virtualization-Aware Traffic Control for
Soft Real-Time Network Traffic on Xen 257--270
Yuchong Hu and
Xiaoyang Zhang and
Patrick P. C. Lee and
Pan Zhou NCScale: Toward Optimal Storage Scaling
via Network Coding . . . . . . . . . . . 271--284
Sheng Zhang and
Can Wang and
Yibo Jin and
Jie Wu and
Zhuzhong Qian and
Mingjun Xiao and
Sanglu Lu Adaptive Configuration Selection and
Bandwidth Allocation for Edge-Based
Video Analytics . . . . . . . . . . . . 285--298
Chaoyi Ma and
Shigang Chen and
Youlin Zhang and
Qingjun Xiao and
Olufemi O. Odegbile Super Spreader Identification Using
Geometric-Min Filter . . . . . . . . . . 299--312
Junjie Xie and
Chen Qian and
Deke Guo and
Minmei Wang and
Ge Wang and
Honghui Chen COIN: an Efficient Indexing Mechanism
for Unstructured Data Sharing Systems 313--326
Xiaoyi Pang and
Zhibo Wang and
Defang Liu and
John C. S. Lui and
Qian Wang and
Ju Ren Towards Personalized Privacy-Preserving
Truth Discovery Over Crowdsourced Data
Streams . . . . . . . . . . . . . . . . 327--340
Tim Hellemans and
Benny Van Houdt Improved Load Balancing in Large Scale
Systems Using Attained Service Time
Reporting . . . . . . . . . . . . . . . 341--353
Tom Barbette and
Erfan Wu and
Dejan Kosti\'c and
Gerald Q. Maguire and
Panagiotis Papadimitratos and
Marco Chiesa Cheetah: a High-Speed Programmable
Load-Balancer Framework With Guaranteed
Per-Connection-Consistency . . . . . . . 354--367
Ning Chen and
Tie Qiu and
Zilong Lu and
Dapeng Oliver Wu An Adaptive Robustness Evolution
Algorithm With Self-Competition and its
$3$D Deployment for Internet of Things 368--381
Reuven Cohen and
Matty Kadosh and
Alan Lo and
Qasem Sayah LB Scalability: Achieving the Right
Balance Between Being Stateful and
Stateless . . . . . . . . . . . . . . . 382--393
Xiaobo Ma and
Jian Qu and
Jianfeng Li and
John C. S. Lui and
Zhenhua Li and
Wenmao Liu and
Xiaohong Guan Inferring Hidden IoT Devices and User
Interactions via Spatial-Temporal
Traffic Fingerprinting . . . . . . . . . 394--408
Xuewei Feng and
Qi Li and
Kun Sun and
Chuanpu Fu and
Ke Xu Off-Path TCP Hijacking Attacks via the
Side Channel of Downgraded IPID . . . . 409--422
Giovanni Neglia and
Michele Garetto and
Emilio Leonardi Similarity Caching: Theory and
Algorithms . . . . . . . . . . . . . . . 475--486
Jianhan Song and
Gustavo de Veciana and
Sanjay Shakkottai Meta-Scheduling for the Wireless
Downlink Through Learning With Bandit
Feedback . . . . . . . . . . . . . . . . 487--500
Cuiying Feng and
Jianwei An and
Kui Wu and
Jianping Wang Bound Inference and Reinforcement
Learning-Based Path Construction in
Bandwidth Tomography . . . . . . . . . . 501--514
Dapeng Qu and
Guoxin Lv and
Shijun Qu and
Haiying Shen and
Yue Yang and
Zhaoyang Heng An Effective and Lightweight
Countermeasure Scheme to Multiple
Network Attacks in NDN . . . . . . . . . 515--528
Zhuo Li and
Jindian Liu and
Liu Yan and
Beichuan Zhang and
Peng Luo and
Kaihua Liu Smart Name Lookup for NDN Forwarding
Plane via Neural Networks . . . . . . . 529--541
Shuihai Hu and
Gaoxiong Zeng and
Wei Bai and
Zilong Wang and
Baochen Qiao and
Kai Chen and
Kun Tan and
Yi Wang Aeolus: a Building Block for Proactive
Transport in Datacenter Networks . . . . 542--556
Yu Sun and
Chi Lin and
Haipeng Dai and
Pengfei Wang and
Lei Wang and
Guowei Wu and
Qiang Zhang Trading off Charging and Sensing for
Stochastic Events Monitoring in WRSNs 557--571
Shuai Wang and
Jinkun Geng and
Dan Li Impact of Synchronization Topology on
DML Performance: Both Logical Topology
and Physical Topology . . . . . . . . . 572--585
Yuanpeng Li and
Xiang Yu and
Yilong Yang and
Yang Zhou and
Tong Yang and
Zhuo Ma and
Shigang Chen Pyramid Family: Generic Frameworks for
Accurate and Fast Flow Size Measurement 586--600
Yan Huang and
Shaoran Li and
Y. Thomas Hou and
Wenjing Lou GPF+\_: a Novel Ultrafast GPU-Based
Proportional Fair Scheduler for 5G NReee 601--615
Leonardo Lanante and
Sumit Roy Performance Analysis of the IEEE
802.11ax OBSS\_PD-Based Spatial Reuse 616--628
Penghao Sun and
Zehua Guo and
Junfei Li and
Yang Xu and
Julong Lan and
Yuxiang Hu Enabling Scalable Routing in
Software-Defined Networks With Deep
Reinforcement Learning on Critical Nodes 629--640
Xiuzhen Guo and
Longfei Shangguan and
Yuan He and
Jia Zhang and
Haotian Jiang and
Awais Ahmad Siddiqi and
Yunhao Liu Efficient Ambient LoRa Backscatter With
On-Off Keying Modulation . . . . . . . . 641--654
Jorge Martín-Pérez and
Francesco Malandrino and
Carla Fabiana Chiasserini and
Milan Groshev and
Carlos J. Bernardos KPI Guarantees in Network Slicing . . . 655--668
Bahman Abolhassani and
John Tadrous and
Atilla Eryilmaz Single vs Distributed Edge Caching for
Dynamic Content . . . . . . . . . . . . 669--682
Sergi Rene and
Onur Ascigil and
Ioannis Psaras and
George Pavlou A Congestion Control Framework Based on
In-Network Resource Pooling . . . . . . 683--697
Yuchen Liu and
Yubing Jian and
Raghupathy Sivakumar and
Douglas M. Blough Maximizing Line-of-Sight Coverage for
mmWave Wireless LANs With Multiple
Access Points . . . . . . . . . . . . . 698--716
Hankun Cao and
Qifa Yan and
Xiaohu Tang and
Guojun Han Adaptive Gradient Coding . . . . . . . . 717--734
Pan Lai and
Rui Fan and
Xiao Zhang and
Wei Zhang and
Fang Liu and
Joey Tianyi Zhou Utility Optimal Thread Assignment and
Resource Allocation in Multi-Server
Systems . . . . . . . . . . . . . . . . 735--748
Bingyu Li and
Jingqiang Lin and
Fengjun Li and
Qiongxiao Wang and
Wei Wang and
Qi Li and
Guangshen Cheng and
Jiwu Jing and
Congli Wang The Invisible Side of Certificate
Transparency: Exploring the Reliability
of Monitors in the Wild . . . . . . . . 749--765
Ingo van Duijn and
Peter Gjòl Jensen and
Jesper Stenbjerg Jensen and
Troels Beck Krògh and
Jonas Sand Madsen and
Stefan Schmid and
Jirí Srba and
Marc Tom Thorgersen Automata-Theoretic Approach to
Verification of MPLS Networks Under Link
Failures . . . . . . . . . . . . . . . . 766--781
Sabarish Krishna Moorthy and
Maxwell Mcmanus and
Zhangyu Guan ESN Reinforcement Learning for Spectrum
and Flight Control in THz-Enabled Drone
Networks . . . . . . . . . . . . . . . . 782--795
Kurian Polachan and
Joydeep Pal and
Chandramani Singh and
T. V. Prabhakar and
Fernando A. Kuipers TCPSbed: a Modular Testbed for Tactile
Internet-Based Cyber-Physical Systems 796--811
Wenzheng Xu and
Tao Xiao and
Junqi Zhang and
Weifa Liang and
Zichuan Xu and
Xuxun Liu and
Xiaohua Jia and
Sajal K. Das Minimizing the Deployment Cost of UAVs
for Delay-Sensitive Data Collection in
IoT Networks . . . . . . . . . . . . . . 812--825
Qiaolun Zhang and
Omran Ayoub and
Jun Wu and
Francesco Musumeci and
Gaolei Li and
Massimo Tornatore Progressive Slice Recovery With
Guaranteed Slice Connectivity After
Massive Failures . . . . . . . . . . . . 826--839
Tzu-Hsuan Liu and
Che-Hao Yu and
Yi-Jheng Lin and
Chia-Ming Chang and
Cheng-Shang Chang and
Duan-Shin Lee ALOHA Receivers: a Network Calculus
Approach for Analyzing Coded Multiple
Access With SIC . . . . . . . . . . . . 840--854
Renyong Wu and
Jieming Ma and
Zhixiang Tang and
Xiehua Li and
Kim-Kwang Raymond Choo A Generic Secure Transmission Scheme
Based on Random Linear Network Coding 855--866
Chenghao Rong and
Jessie Hui Wang and
Juncai Liu and
Jilong Wang and
Fenghua Li and
Xiaolei Huang Scheduling Massive Camera Streams to
Optimize Large-Scale Live Video
Analytics . . . . . . . . . . . . . . . 867--880
Wenzheng Xu and
Yueying Sun and
Rui Zou and
Weifa Liang and
Qiufen Xia and
Feng Shan and
Tian Wang and
Xiaohua Jia and
Zheng Li Throughput Maximization of UAV Networks 881--895
Yanjiao Chen and
Meng Xue and
Jian Zhang and
Runmin Ou and
Qian Zhang and
Peng Kuang \em DetectDUI: an In-Car Detection
System for Drink Driving and BACs . . . 896--910
Ibrahim Kettaneh and
Ahmed Alquraan and
Hatem Takruri and
Ali José Mashtizadeh and
Samer Al-Kiswany Accelerating Reads With In-Network
Consistency-Aware Load Balancing . . . . 954--968
Zehua Guo and
Songshi Dou and
Sen Liu and
Wendi Feng and
Wenchao Jiang and
Yang Xu and
Zhi-Li Zhang Maintaining Control Resiliency and Flow
Programmability in Software-Defined WANs
During Controller Failures . . . . . . . 969--984
Yaniv Sadeh and
Ori Rottenstreich and
Haim Kaplan Optimal Weighted Load Balancing in TCAMs 985--998
Zhixiong Niu and
Qiang Su and
Peng Cheng and
Yongqiang Xiong and
Dongsu Han and
Keith Winstein and
Chun Jason Xue and
Hong Xu NetKernel: Making Network Stack Part of
the Virtualized Infrastructure . . . . . 999--1013
Yordanos Tibebu Woldeyohannes and
Besmir Tola and
Yuming Jiang and
K. K. Ramakrishnan CoShare: an Efficient Approach for
Redundancy Allocation in NFV . . . . . . 1014--1028
Zhengkai Shi and
Yipeng Zhou and
Di Wu and
Chen Wang PPVC: Online Learning Toward Optimized
Video Content Caching . . . . . . . . . 1029--1044
Ehsan Mohammadpour and
Jean-Yves Le Boudec On Packet Reordering in Time-Sensitive
Networks . . . . . . . . . . . . . . . . 1045--1057
Khashayar Kamran and
Edmund Yeh and
Qian Ma DECO: Joint Computation Scheduling,
Caching, and Communication in
Data-Intensive Computing Networks . . . 1058--1072
Alon Rashelbach and
Ori Rottenstreich and
Mark Silberstein A Computational Approach to Packet
Classification . . . . . . . . . . . . . 1073--1087
Hao Li and
Peng Zhang and
Guangda Sun and
Wanyue Cao and
Chengchen Hu and
Danfeng Shan and
Tian Pan and
Qiang Fu Compiling Cross-Language Network
Programs Into Hybrid Data Plane . . . . 1088--1103
Shuai Tong and
Jiliang Wang and
Yunhao Liu Combating Packet Collisions Using
Non-Stationary Signal Scaling in LPWANs 1104--1117
Jia Liu and
Xi Yu and
Xuan Liu and
Xingyu Chen and
Haisong Liu and
Yanyan Wang and
Lijun Chen Time-Efficient Range Detection in
Commodity RFID Systems . . . . . . . . . 1118--1131
Kaiyang Liu and
Jun Peng and
Jingrong Wang and
Jianping Pan Optimal Caching for Low Latency in
Distributed Coded Storage Systems . . . 1132--1145
Jingzhou Wang and
Gongming Zhao and
Hongli Xu and
Yutong Zhai and
Qianyu Zhang and
He Huang and
Yongqiang Yang A Robust Service Mapping Scheme for
Multi-Tenant Clouds . . . . . . . . . . 1146--1161
Sijie Xiong and
Anand D. Sarwate and
Narayan B. Mandayam Network Traffic Shaping for Enhancing
Privacy in IoT Systems . . . . . . . . . 1162--1177
Chongrong Fang and
Haoyu Liu and
Mao Miao and
Jie Ye and
Lei Wang and
Wansheng Zhang and
Daxiang Kang and
Biao Lyu and
Shunmin Zhu and
Peng Cheng and
Jiming Chen Towards Automatic Root Cause Diagnosis
of Persistent Packet Loss in Cloud
Overlay Network . . . . . . . . . . . . 1178--1192
Hehuan Shi and
Lin Chen Downlink Transmission Scheduling With
Data Sharing . . . . . . . . . . . . . . 1193--1202
Qingyu Liu and
Haibo Zeng and
Minghua Chen Minimizing AoI With Throughput
Requirements in Multi-Path Network
Communication . . . . . . . . . . . . . 1203--1216
Fernando Pérez-Bueno and
Luz García and
Gabriel Maciá-Fernández and
Rafael Molina Leveraging a Probabilistic PCA Model to
Understand the Multivariate Statistical
Network Monitoring Framework for Network
Security Anomaly Detection . . . . . . . 1217--1229
Huaqing Tu and
Gongming Zhao and
Hongli Xu and
Yangming Zhao and
Yutong Zhai A Robustness-Aware Real-Time SFC Routing
Update Scheme in Multi-Tenant Clouds . . 1230--1244
Hehuan Shi and
Lin Chen From Spectrum Bonding to
Contiguous-Resource Batching Task
Scheduling . . . . . . . . . . . . . . . 1245--1254
Qiong Wu and
Kaiwen He and
Xu Chen and
Shuai Yu and
Junshan Zhang Deep Transfer Learning Across Cities for
Mobile Traffic Prediction . . . . . . . 1255--1267
Abdalla Hussein and
Catherine Rosenberg and
Patrick Mitran Hybrid NOMA in Multi-Cell Networks: From
a Centralized Analysis to Practical
Schemes . . . . . . . . . . . . . . . . 1268--1282
Yiwen Qi and
Wenke Yu and
Xudong Zhao and
Xindi Xu Event-Triggered Control for
Network-Based Switched Systems With
Switching Signals Subject to
Dual-Terminal DoS Attacks . . . . . . . 1283--1293
Chaoyun Zhang and
Xavier Costa-Pérez and
Paul Patras Adversarial Attacks Against Deep
Learning-Based Network Intrusion
Detection Systems and Defense Mechanisms 1294--1311
Guocheng Liao and
Xu Chen and
Jianwei Huang Privacy-Aware Online Social Networking
With Targeted Advertisement . . . . . . 1312--1327
Hongyi Zhou and
Kefan Lv and
Longbo Huang and
Xiongfeng Ma Quantum Network: Security Assessment and
Key Management . . . . . . . . . . . . . 1328--1339
Yanyan Han and
Hongyi Wu Privacy-Aware Participant Recruitment in
Opportunistic Device to Device Networks 1340--1351
Jian An and
Zhenxing Wang and
Xin He and
Xiaolin Gui and
Jindong Cheng and
Ruowei Gui PPQC: a Blockchain-Based
Privacy-Preserving Quality Control
Mechanism in Crowdsensing Applications 1352--1367
Zhiyuan Wang and
Jiancheng Ye and
Dong Lin and
Yipei Chen and
John C. S. Lui Approximate and Deployable Shortest
Remaining Processing Time Scheduler . . 1368--1381
Ran Ben Basat and
Gil Einziger and
Isaac Keslassy and
Ariel Orda and
Shay Vargaftik and
Erez Waisbard Memento: Making Sliding Windows
Efficient for Heavy Hitters . . . . . . 1440--1453
Junghoon Kim and
Taejoon Kim and
Morteza Hashemi and
David J. Love and
Christopher G. Brinton Minimum Overhead Beamforming and
Resource Allocation in D2D Edge Networks 1454--1468
Jie Zhao and
Xin Wang On the Efficiency of Multi-Beam Medium
Access for Millimeter-Wave Networks . . 1469--1480
Xuedou Xiao and
Wei Wang and
Tao Jiang Sensor-Assisted Rate Adaptation for UAV
MU-MIMO Networks . . . . . . . . . . . . 1481--1493
Akshay Jajoo and
Y. Charlie Hu and
Xiaojun Lin A Case for Sampling-Based Learning
Techniques in Coflow Scheduling . . . . 1494--1508
Rahul Vaze and
Jayakrishnan Nair Speed Scaling on Parallel Servers With
MapReduce Type Precedence Constraints 1509--1524
Yuntao Wang and
Weiwei Chen and
Tom H. Luan and
Zhou Su and
Qichao Xu and
Ruidong Li and
Nan Chen Task Offloading for Post-Disaster Rescue
in Unmanned Aerial Vehicles Networks . . 1525--1539
Michael J. Neely A Converse Result on Convergence Time
for Opportunistic Wireless Scheduling 1540--1553
Hassan Iqbal and
Anand Singh and
Muhammad Shahzad Characterizing the Availability and
Latency in AWS Network From the
Perspective of Tenants . . . . . . . . . 1554--1568
Seyyedali Hosseinalipour and
Sheikh Shams Azam and
Christopher G. Brinton and
Nicol\`o Michelusi and
Vaneet Aggarwal and
David J. Love and
Huaiyu Dai Multi-Stage Hybrid Federated Learning
Over Large-Scale D2D-Enabled Fog
Networks . . . . . . . . . . . . . . . . 1569--1584
Deepak Nadig and
Byrav Ramamurthy and
Brian Bockelman SNAG: SDN-Managed Network Architecture
for GridFTP Transfers Using
Application-Awareness . . . . . . . . . 1585--1598
Zhuozhao Li and
Haiying Shen Co-Scheduler: a Coflow-Aware
Data-Parallel Job Scheduler in Hybrid
Electrical/Optical Datacenter Networks 1599--1612
Jun Du and
Chunxiao Jiang and
Abderrahim Benslimane and
Song Guo and
Yong Ren SDN-Based Resource Allocation in Edge
and Cloud Computing Systems: an
Evolutionary Stackelberg Differential
Game Approach . . . . . . . . . . . . . 1613--1628
Guanglei Song and
Jiahai Yang and
Zhiliang Wang and
Lin He and
Jinlei Lin and
Long Pan and
Chenxin Duan and
Xiaowen Quan DET: Enabling Efficient Probing of IPv6
Active Addresses . . . . . . . . . . . . 1629--1643
Zhuozhao Li and
Tanmoy Sen and
Haiying Shen and
Mooi Choo Chuah A Study on the Impact of Memory DoS
Attacks on Cloud Applications and
Exploring Real-Time Detection Schemes 1644--1658
Alden Hilton and
Joel Hirschmann and
Casey Deccio Beware of IPs in Sheep's Clothing:
Measurement and Disclosure of IP
Spoofing Vulnerabilities . . . . . . . . 1659--1673
Haibo Wang and
Chaoyi Ma and
Shigang Chen and
Yuanda Wang Fast and Accurate Cardinality Estimation
by Self-Morphing Bitmaps . . . . . . . . 1674--1688
Xiao-Yan Li and
Wanling Lin and
Jou-Ming Chang and
Xiaohua Jia Transmission Failure Analysis of
Multi-Protection Routing in Data Center
Networks With Heterogeneous Edge-Core
Servers . . . . . . . . . . . . . . . . 1689--1702
Yunxiang Cai and
Hongzi Zhu and
Shan Chang and
Xiao Wang and
Jiangang Shen and
Minyi Guo PeerProbe: Estimating Vehicular Neighbor
Distribution With Adaptive Compressive
Sensing . . . . . . . . . . . . . . . . 1703--1716
Chang Liu and
Jean Tourrilhes and
Chen-Nee Chuah and
Puneet Sharma Voyager: Revisiting Available Bandwidth
Estimation With a New Class of Methods
--- Decreasing- Chirp-Train Methods . . 1717--1732
Edwin Yang and
Song Fang and
Ian Markwood and
Yao Liu and
Shangqing Zhao and
Zhuo Lu and
Haojin Zhu Wireless Training-Free Keystroke
Inference Attack and Defense . . . . . . 1733--1748
Swaroop Gopalam and
Stephen V. Hanly and
Philip Whiting Distributed and Local Scheduling
Algorithms for mmWave Integrated Access
and Backhaul . . . . . . . . . . . . . . 1749--1764
Junsong Fu and
Na Wang and
Leyao Nie and
Baojiang Cui and
Bharat K. Bhargava Defending Trace-Back Attack in $3$D
Wireless Internet of Things . . . . . . 1765--1779
Ehsan Mohammadpour and
Jean-Yves Le Boudec Analysis of Dampers in Time-Sensitive
Networks With Non-Ideal Clocks . . . . . 1780--1794
Zaid H. Nasralla and
Taisir E. H. Elgorashi and
Ali Hammadi and
Mohamed O. I. Musa and
Jaafar M. H. Elmirghani Blackout Resilient Optical Core Network 1795--1806
Yuting Wang and
Xiaolong Zheng and
Liang Liu and
Huadong Ma PolarTracker: Attitude-Aware Channel
Access for Floating Low Power Wide Area
Networks . . . . . . . . . . . . . . . . 1807--1821
Artur Sterz and
Patrick Felka and
Bernd Simon and
Sabrina Klos and
Anja Klein and
Oliver Hinz and
Bernd Freisleben Multi-Stakeholder Service Placement via
Iterative Bargaining With Incomplete
Information . . . . . . . . . . . . . . 1822--1837
Chen Avin and
Kaushik Mondal and
Stefan Schmid Demand-Aware Network Design With Minimal
Congestion and Route Lengths . . . . . . 1838--1848
Kaiping Xue and
Peixuan He and
Jiayu Yang and
Qiudong Xia and
David S. L. Wei SCD2: Secure Content Delivery and
Deduplication With Multiple Content
Providers in Information Centric
Networking . . . . . . . . . . . . . . . 1849--1864
Sladana Jo\vsilo and
György Dán Joint Wireless and Edge Computing
Resource Management With Dynamic Network
Slice Selection . . . . . . . . . . . . 1865--1878
Ji\vrí Matou\vsek and
Adam Lu\vcanský and
David Jane\vcek and
Jozef Sabo and
Jan Ko\vrenek and
Gianni Antichi ClassBench-ng: Benchmarking Packet
Classification Algorithms in the
OpenFlow Era . . . . . . . . . . . . . . 1912--1925
Mohammad Jahanian and
K. K. Ramakrishnan CoNICE: Consensus in
Intermittently-Connected Environments by
Exploiting Naming With Application to
Emergency Response . . . . . . . . . . . 1926--1939
Nilanjan Biswas and
Goutam Das and
Priyadip Ray Buffer-Aware User Selection and Resource
Allocation for an Opportunistic
Cognitive Radio Network: a Cross-Layer
Approach . . . . . . . . . . . . . . . . 1940--1954
Kun Xie and
Jiazheng Tian and
Xin Wang and
Gaogang Xie and
Jiannong Cao and
Hongbo Jiang and
Jigang Wen Fast Retrieval of Large Entries With
Incomplete Measurement Data . . . . . . 1955--1969
Sushovan Das and
Afsaneh Rahbar and
Xinyu Crystal Wu and
Zhuang Wang and
Weitao Wang and
Ang Chen and
T. S. Eugene Ng Shufflecast: an Optical, Data-Rate
Agnostic, and Low-Power Multicast
Architecture for Next-Generation Compute
Clusters . . . . . . . . . . . . . . . . 1970--1985
Hai-Anh Tran and
Duc Tran and
Abdelhamid Mellouk State-Dependent Multi-Constraint
Topology Configuration for
Software-Defined Service Overlay
Networks . . . . . . . . . . . . . . . . 1986--2001
Nurullah Karakoç and
Anna Scaglione and
Martin Reisslein and
Ruiyuan Wu Federated Edge Network Utility
Maximization for a Multi-Server System:
Algorithm and Convergence . . . . . . . 2002--2017
Pooja Vyavahare and
Jayakrishnan Nair and
D. Manjunath Sponsored Data: On the Effect of ISP
Competition on Pricing Dynamics and
Content Provider Market Structures . . . 2018--2031
Zhenghao Zhang and
Raghav Rathi and
Steven Perez and
Jumana Bukhari and
Yaoguang Zhong ZCNET: Achieving High Capacity in Low
Power Wide Area Networks . . . . . . . . 2032--2045
Chengzhang Li and
Qingyu Liu and
Shaoran Li and
Yongce Chen and
Y. Thomas Hou and
Wenjing Lou and
Sastry Kompella Scheduling With Age of Information
Guarantee . . . . . . . . . . . . . . . 2046--2059
Meng Li and
Liehuang Zhu and
Zijian Zhang and
Chhagan Lal and
Mauro Conti and
Mamoun Alazab User-Defined Privacy-Preserving Traffic
Monitoring Against $n$-by-1 Jamming
Attack . . . . . . . . . . . . . . . . . 2060--2073
Gaoxiong Zeng and
Wei Bai and
Ge Chen and
Kai Chen and
Dongsu Han and
Yibo Zhu and
Lei Cui Congestion Control for Cross-Datacenter
Networks . . . . . . . . . . . . . . . . 2074--2089
Chun Li and
Yunyun Yang and
Hui Liang and
Boying Wu Learning Quantum Drift-Diffusion
Phenomenon by Physics-Constraint Machine
Learning . . . . . . . . . . . . . . . . 2090--2101
Kevin D. Smith and
Saber Jafarpour and
Ananthram Swami and
Francesco Bullo Topology Inference With Multivariate
Cumulants: The Möbius Inference Algorithm 2102--2116
Guangyang Zeng and
Biqiang Mu and
Jieqiang Wei and
Wing Shing Wong and
Junfeng Wu Localizability With Range-Difference
Measurements: Numerical Computation and
Error Bound Analysis . . . . . . . . . . 2117--2130
Yunshu Liu and
Zhixuan Fang and
Man Hon Cheung and
Wei Cai and
Jianwei Huang An Incentive Mechanism for Sustainable
Blockchain Storage . . . . . . . . . . . 2131--2144
Hui Yang and
Qiuyan Yao and
Bowen Bao and
Ao Yu and
Jie Zhang and
Athanasios V. Vasilakos Multi-Associated Parameters
Aggregation-Based Routing and Resources
Allocation in Multi-Core Elastic Optical
Networks . . . . . . . . . . . . . . . . 2145--2157
Renjie Xie and
Jiahao Cao and
Qi Li and
Kun Sun and
Guofei Gu and
Mingwei Xu and
Yuan Yang Disrupting the SDN Control Channel via
Shared Links: Attacks and
Countermeasures . . . . . . . . . . . . 2158--2172
Lin Dai A Theoretical Framework for Random
Access: Stability Regions and
Transmission Control . . . . . . . . . . 2173--2200
Xuezheng Liu and
Zhicong Zhong and
Yipeng Zhou and
Di Wu and
Xu Chen and
Min Chen and
Quan Z. Sheng Accelerating Federated Learning via
Parallel Servers: a Theoretically
Guaranteed Approach . . . . . . . . . . 2201--2215
Seyed Mohammadhossein Tabatabaee and
Jean-Yves Le Boudec Deficit Round-Robin: a Second Network
Calculus Analysis . . . . . . . . . . . 2216--2230
Feng Li and
Jichao Zhao and
Dongxiao Yu and
Xiuzhen Cheng and
Weifeng Lv Harnessing Context for Budget-Limited
Crowdsensing With Massive Uncertain
Workers . . . . . . . . . . . . . . . . 2231--2245
Hongli Xu and
Peng Xi and
Gongming Zhao and
Jianchun Liu and
Chen Qian and
Liusheng Huang SAFE-ME: Scalable and Flexible Policy
Enforcement in Middlebox Networks . . . 2246--2261
Lin Chen and
Shan Lin and
Hua Huang and
Weihua Yang Charging Path Optimization in Mobile
Networks . . . . . . . . . . . . . . . . 2262--2273
Lei Zhang and
Yong Cui and
Mowei Wang and
Kewei Zhu and
Yibo Zhu and
Yong Jiang DeepCC: Bridging the Gap Between
Congestion Control and Applications via
Multiobjective Optimization . . . . . . 2274--2288
Minghui Liwang and
Xianbin Wang Overbooking-Empowered Computing Resource
Provisioning in Cloud-Aided Mobile Edge
Networks . . . . . . . . . . . . . . . . 2289--2303
Lei Shi and
Yuhua Cheng and
Jinliang Shao and
Qingchen Liu and
Wei Xing Zheng Locating Link Failures in WSNs via
Cluster Consensus and Graph
Decomposition . . . . . . . . . . . . . 2304--2314
Bahman Abolhassani and
John Tadrous and
Atilla Eryilmaz and
Edmund Yeh Fresh Caching of Dynamic Content Over
the Wireless Edge . . . . . . . . . . . 2315--2327
Zhenlin An and
Qiongzheng Lin and
Lei Yang and
Lei Xie Tagcaster: Activating Wireless Voice of
Electronic Toll Collection Systems With
Zero Start-Up Cost . . . . . . . . . . . 2328--2342
Hyunseok Chang and
Matteo Varvello and
Fang Hao and
Sarit Mukherjee A Tale of Three Videoconferencing
Applications: Zoom, Webex, and Meet . . 2343--2358
Zhenhua Han and
Haisheng Tan and
Rui Wang and
Yuncong Hong and
Francis C. M. Lau Efficient Online Learning Based
Cross-Tier Uplink Scheduling in HetNets 2389--2402
Gregor Bankhamer and
Robert Elsässer and
Stefan Schmid Local Fast Rerouting With Low
Congestion: a Randomized Approach . . . 2403--2418
Chen Avin and
Kaushik Mondal and
Stefan Schmid Push-Down Trees: Optimal Self-Adjusting
Complete Trees . . . . . . . . . . . . . 2419--2432
Tian Xie and
Namitha Nambiar and
Ting He and
Patrick McDaniel Attack Resilience of Cache Replacement
Policies: a Study Based on TTL
Approximation . . . . . . . . . . . . . 2433--2447
Marcel Blöcher and
Lin Wang and
Patrick Eugster and
Max Schmidt Holistic Resource Scheduling for Data
Center In-Network Computing . . . . . . 2448--2463
Theo Jepsen and
Ali Fattaholmanan and
Masoud Moshref and
Nate Foster and
Antonio Carzaniga and
Robert Soulé Forwarding and Routing With Packet
Subscriptions . . . . . . . . . . . . . 2464--2479
Tianjiao Wang and
Zengfu Wang and
Bill Moran and
Moshe Zukerman Submarine Cable Network Design for
Regional Connectivity . . . . . . . . . 2480--2492
Xiaozhe Shao and
Zibin Chen and
Daniel Holcomb and
Lixin Gao Accelerating BGP Configuration
Verification Through Reducing Cycles in
SMT Constraints . . . . . . . . . . . . 2493--2504
Yang Cai and
Jaime Llorca and
Antonia M. Tulino and
Andreas F. Molisch Ultra-Reliable Distributed Cloud Network
Control With End-to-End Latency
Constraints . . . . . . . . . . . . . . 2505--2520
Reena Chackochan and
Albert Sunny and
Senthilkumar Dhanasekaran Approximate Aggregate Utility
Maximization Using Greedy Maximal
Scheduling . . . . . . . . . . . . . . . 2521--2530
Massieh Kordi Boroujeny and
Brian L. Mark Design of a Stochastic Traffic Regulator
for End-to-End Network Delay Guarantees 2531--2543
Darryl Veitch and
Sathiya Kumaran Mani and
Yi Cao and
Paul Barford iHorology: Lowering the Barrier to
Microsecond-Level Internet Time . . . . 2544--2558
Sijiang Huang and
Mowei Wang and
Yong Cui Traffic-Aware Buffer Management in
Shared Memory Switches . . . . . . . . . 2559--2573
Qingfeng Tan and
Xuebin Wang and
Wei Shi and
Jian Tang and
Zhihong Tian An Anonymity Vulnerability in Tor . . . 2574--2587
Xuehe Wang and
Lingjie Duan Dynamic Pricing and Mean Field Analysis
for Controlling Age of Information . . . 2588--2600
Zichuan Xu and
Haozhe Ren and
Weifa Liang and
Qiufen Xia and
Wanlei Zhou and
Pan Zhou and
Wenzheng Xu and
Guowei Wu and
Mingchu Li Near Optimal Learning-Driven Mechanisms
for Stable NFV Markets in Multitier
Cloud Networks . . . . . . . . . . . . . 2601--2615
Xianhao Chen and
Guangyu Zhu and
Haichuan Ding and
Lan Zhang and
Haixia Zhang and
Yuguang Fang End-to-End Service Auction: a General
Double Auction Mechanism for Edge
Computing Services . . . . . . . . . . . 2616--2629
Keerthi Priya Dasala and
Josep M. Jornet and
Edward W. Knightly Scaling mmWave WLANs With Single RF
Chain Multiuser Beamforming . . . . . . 2630--2643
Tie Qiu and
Lidi Zhang and
Ning Chen and
Songwei Zhang and
Wenyuan Liu and
Dapeng Oliver Wu Born This Way: a Self-Organizing
Evolution Scheme With Motif for Internet
of Things Robustness . . . . . . . . . . 2644--2657
Zhiyuan Yao and
Yoann Desmouceaux and
Juan-Antonio Cordero-Fuertes and
Mark Townsley and
Thomas Clausen HLB: Toward Load-Aware Load Balancing 2658--2673
Itamar Cohen and
Gil Einziger and
Gabriel Scalosub False Negative Awareness in
Indicator-Based Caching Systems . . . . 2674--2687
Dianxiong Liu and
Zhiyong Du and
Xiaodu Liu and
Heyu Luan and
Yitao Xu and
Yifan Xu Task-Based Network Reconfiguration in
Distributed UAV Swarms: a Bilateral
Matching Approach . . . . . . . . . . . 2688--2700
Ludovic Thomas and
Ahlem Mifdaoui and
Jean-Yves Le Boudec Worst-Case Delay Bounds in
Time-Sensitive Networks With Packet
Replication and Elimination . . . . . . 2701--2715
Zhiwei Zhao and
Wenliang Mao and
Geyong Min and
Weifeng Gao Joint Multichannel-Spatial Diversity for
Efficient Opportunistic Routing in
Low-Power Wireless Networks . . . . . . 2716--2729
Miao Zhang and
Yifei Zhu and
Jiangchuan Liu and
Feng Wang and
Fangxin Wang CharmSeeker: Automated Pipeline
Configuration for Serverless Video
Processing . . . . . . . . . . . . . . . 2730--2743
Luoyi Fu and
Jiapeng Zhang and
Shan Qu and
Huquan Kang and
Xinbing Wang and
Guihai Chen Measuring Social Network
De-Anonymizability by Means of Morphism
Property . . . . . . . . . . . . . . . . 2744--2759
Yao Xin and
Wenjun Li and
Guoming Tang and
Tong Yang and
Xiaohe Hu and
Yi Wang FPGA-Based Updatable Packet
Classification Using TSS-Combined
Bit-Selecting Tree . . . . . . . . . . . 2760--2775
Nishant Shakya and
Fan Li and
Jinyuan Chen On Distributed Computing With
Heterogeneous Communication Constraints 2776--2787
Xinzhe Fu and
Eytan Modiano Learning-NUM: Network Utility
Maximization With Unknown Utility
Functions and Queueing Delay . . . . . . 2788--2803
Zhirong Shen and
Guanglin Zhang Competitive Online Stay-or-Switch
Algorithms With Minimum Commitment and
Switching Cost . . . . . . . . . . . . . 2804--2817
Huikang Li and
Yi Gao and
Wei Dong and
Chun Chen Bound-Based Network Tomography for
Inferring Interesting Path Metrics . . . 1--14
Eric Ruzomberkaand and
David J. Love Interference Moral Hazard in Large
Multihop Networks . . . . . . . . . . . 15--29
Anirudh Sabnis and
Tareq Si Salem and
Giovanni Neglia and
Michele Garetto and
Emilio Leonardi and
Ramesh K. Sitaraman GRADES: Gradient Descent for Similarity
Caching . . . . . . . . . . . . . . . . 30--41
Xi Chen and
Qiao Xiang and
Linghe Kong and
Huisan Xu and
Xue Liu Learning From FM Communications: Toward
Accurate, Efficient, All-Terrain Vehicle
Localization . . . . . . . . . . . . . . 42--57
Haoyu Wang and
Zetian Liu and
Haiying Shen Machine Learning Feature Based Job
Scheduling for Distributed Machine
Learning Clusters . . . . . . . . . . . 58--73
Xujin Zhou and
Irem Koprulu and
Atilla Eryilmaz and
Michael J. Neely Efficient Distributed MAC for Dynamic
Demands: Congestion and Age Based
Designs . . . . . . . . . . . . . . . . 74--87
Federico Mason and
Gianfranco Nencioni and
Andrea Zanella Using Distributed Reinforcement Learning
for Resource Orchestration in a Network
Slicing Scenario . . . . . . . . . . . . 88--102
Jiao Zhang and
Xiaolong Zhong and
Zirui Wan and
Yu Tian and
Tian Pan and
Tao Huang RCC: Enabling Receiver-Driven RDMA
Congestion Control With Congestion
Divide-and-Conquer in Datacenter
Networks . . . . . . . . . . . . . . . . 103--117
Shaopeng Zhu and
Xiaolong Zheng and
Liang Liu and
Huadong Ma CSMA/PJ: a Protective Jamming Based MAC
Protocol to Harmonize the Long and Short
Links . . . . . . . . . . . . . . . . . 118--132
Konstantinos Oikonomou and
George Koufoudakis and
Sonia A\"\issa and
Ioannis Stavrakakis Probabilistic Flooding Performance
Analysis Exploiting Graph Spectra
Properties . . . . . . . . . . . . . . . 133--146
Juncheng Wang and
Min Dong and
Ben Liang and
Gary Boudreau and
Hatem Abou-Zeid Delay-Tolerant OCO With Long-Term
Constraints: Algorithm and Its
Application to Network Resource
Allocation . . . . . . . . . . . . . . . 147--163
Xiaochun Yun and
Yipeng Wang and
Yongzheng Zhang and
Chen Zhao and
Zijian Zhao Encrypted TLS Traffic Classification on
Cloud Platforms . . . . . . . . . . . . 164--177
Shouxi Luo and
Pingzhi Fan and
Huanlai Xing and
Hongfang Yu Meeting Coflow Deadlines in Data Center
Networks With Policy-Based Selective
Completion . . . . . . . . . . . . . . . 178--191
Zhehui Zhang and
Yuanjie Li and
Qianru Li and
Jinghao Zhao and
Ghufran Baig and
Lili Qiu and
Songwu Lu Movement-Based Reliable Mobility
Management for Beyond 5G Cellular
Networks . . . . . . . . . . . . . . . . 192--207
Tongyu Zong and
Chen Li and
Yuanyuan Lei and
Guangyu Li and
Houwei Cao and
Yong Liu Cocktail Edge Caching: Ride Dynamic
Trends of Content Popularity With
Ensemble Learning . . . . . . . . . . . 208--219
Cao Chen and
Fen Zhou and
Massimo Tornatore and
Shilin Xiao Maximizing Revenue With Adaptive
Modulation and Multiple FECs in Flexible
Optical Networks . . . . . . . . . . . . 220--233
Chia-Ming Chang and
Yi-Jheng Lin and
Cheng-Shang Chang and
Duan-Shin Lee On the Stability Regions of Coded
Poisson Receivers With Multiple Classes
of Users and Receivers . . . . . . . . . 234--247
Gongming Zhao and
Luyao Luo and
Hongli Xu and
Chun-Jen Chung and
Liguang Xie Southbound Message Delivery With Virtual
Network Topology Awareness in Clouds . . 248--263
Francesco Malandrino and
Carla Fabiana Chiasserini and
Nuria Molner and
Antonio de la Oliva Network Support for High-Performance
Distributed Machine Learning . . . . . . 264--278
Chao Xu and
Jessie Hui Wang and
Jilong Wang and
Tao Yu and
Yipeng Zhou and
Yuedong Xu and
Di Wu and
Changqing An Offloading Elastic Transfers to
Opportunistic Vehicular Networks Based
on Imperfect Trajectory Prediction . . . 279--293
João Luís Sobrinho and
Miguel Alves Ferreira From Non-Optimal Routing Protocols to
Routing on Multiple Optimality Criteria 294--307
Xudong Qin and
Bin Li and
Lei Ying Efficient Distributed Threshold-Based
Offloading for Large-Scale Mobile Cloud
Computing . . . . . . . . . . . . . . . 308--321
Akbar Majidi and
Xiaofeng Gao and
Shunjia Zhu and
Nazila Jahanbakhsh and
Jiaqi Zheng and
Guihai Chen MiFi: Bounded Update to Optimize Network
Performance in Software-Defined Data
Centers . . . . . . . . . . . . . . . . 322--335
Ge Wang and
Xiaofeng Shi and
Haofan Cai and
Chen Qian and
Han Ding and
Wei Xi and
Kun Zhao and
Jizhong Zhao and
Jinsong Han A Generalized Method to Combat
Multipaths for RFID Sensing . . . . . . 336--351
Chi Zhang and
Haisheng Tan and
Haoqiang Huang and
Zhenhua Han and
Shaofeng H.-C. Jiang and
Guopeng Li and
Xiang-Yang Li Online Approximation Scheme for
Scheduling Heterogeneous Utility Jobs in
Edge Computing . . . . . . . . . . . . . 352--365
Qiang Wu and
Xiangping Bryce Zhai and
Xi Liu and
Chun-Ming Wu and
Fangliang Lou and
Hongke Zhang Performance Tuning via Lean Measurements
for Acceleration of Network Functions
Virtualization . . . . . . . . . . . . . 366--379
Yijun Hao and
Fang Li and
Cong Zhao and
Shusen Yang Delay-Oriented Scheduling in 5G Downlink
Wireless Networks Based on Reinforcement
Learning With Partial Observations . . . 380--394
Shaoke Xi and
Kai Bu and
Wensen Mao and
Xiaoyu Zhang and
Kui Ren and
Xinxin Ren RuleOut Forwarding Anomalies for SDN . . 395--407
Jiayu Pan and
Ahmed M. Bedewy and
Yin Sun and
Ness B. Shroff Optimal Sampling for Data Freshness:
Unreliable Transmissions With Random
Two-Way Delay . . . . . . . . . . . . . 408--420
Shaofei Tang and
Sicheng Zhao and
Xiaoqin Pan and
Zuqing Zhu How to Use In-Band Network Telemetry
Wisely: Network-Wise Orchestration of
Sel-INT . . . . . . . . . . . . . . . . 421--435
Hao-Hsuan Chang and
Hao Chen and
Jianzhong Zhang and
Lingjia Liu Decentralized Deep Reinforcement
Learning Meets Mobility Load Balancing 473--484
Yunhua He and
Yueting Wu and
Cui Zhang and
Jialong Shen and
Ke Xiao and
Keshav Sood and
Limin Sun A Sparse Protocol Parsing Method for
IIoT Based on BPSO-vote-HMM Hybrid Model 485--496
Tuo Shi and
Zhipeng Cai and
Jianzhong Li and
Hong Gao and
Jiancheng Chen and
Ming Yang Services Management and Distributed
Multihop Requests Routing in Mobile Edge
Networks . . . . . . . . . . . . . . . . 497--510
Kai Lei and
Guanjie Lin and
Meimei Zhang and
Keke Li and
Qi Li and
Xiaojun Jing and
Peng Wang Measuring the Consistency Between Data
and Control Plane in SDN . . . . . . . . 511--525
Xinle Du and
Ke Xu and
Lei Xu and
Kai Zheng and
Meng Shen and
Bo Wu and
Tong Li R-AQM: Reverse ACK Active Queue
Management in Multitenant Data Centers 526--541
Yi Zhao and
Meina Qiao and
Haiyang Wang and
Rui Zhang and
Dan Wang and
Ke Xu Friendship Inference in Mobile Social
Networks: Exploiting Multi-Source
Information With Two-Stage Deep Learning
Framework . . . . . . . . . . . . . . . 542--557
Haibo Wang and
Chaoyi Ma and
Olufemi O. Odegbile and
Shigang Chen and
Jih-Kwon Peir Randomized Error Removal for Online
Spread Estimation in High-Speed Networks 558--573
Yi Ding and
Yu Yang and
Wenchao Jiang and
Yunhuai Liu and
Tian He and
Desheng Zhang Nationwide Deployment and Operation of a
Virtual Arrival Detection System in the
Wild . . . . . . . . . . . . . . . . . . 574--589
Lili Chen and
Kai Chen and
Jie Xiong and
Ke Li and
Sunghoon Ivan Lee and
Fuwei Wang and
Zhanyong Tang and
Zheng Wang and
Dingyi Fang and
Xiaojiang Chen Toward Wide-Area Contactless Wireless
Sensing . . . . . . . . . . . . . . . . 590--605
François Michel and
Alejandro Cohen and
Derya Malak and
Quentin De Coninck and
Muriel Médard and
Olivier Bonaventure FlEC: Enhancing QUIC With
Application-Tailored Reliability
Mechanisms . . . . . . . . . . . . . . . 606--619
Xiang Tian and
Baoxian Zhang and
Cheng Li Distributed Stable Multisource Global
Broadcast for SINR-Based Wireless
Multihop Networks . . . . . . . . . . . 620--633
Yixin Bao and
Yanghua Peng and
Chuan Wu Deep Learning-Based Job Placement in
Distributed Machine Learning Clusters
With Heterogeneous Workloads . . . . . . 634--647
En Wang and
Mijia Zhang and
Wenbin Liu and
Haoyi Xiong and
Bo Yang and
Yongjian Yang and
Jie Wu Outlier-Concerned Data Completion
Exploiting Intra- and Inter-Data
Correlations in Sparse CrowdSensing . . 648--663
Na Ruan and
Hanyi Sun and
Zenan Lou and
Jie Li A General Quantitative Analysis
Framework for Attacks in Blockchain . . 664--679
Waseem Ozan and
Izzat Darwazeh and
Kyle Jamieson Partial OFDM Symbol Recovery to Improve
Interfering Wireless Networks Operation
in Collision Environments . . . . . . . 680--694
Feridun Tütüncüo\uglu and
Sla\dbarana Jo\vsilo and
György Dán Online Learning for Rate-Adaptive Task
Offloading Under Latency Constraints in
Serverless Edge Computing . . . . . . . 695--709
Jianpeng Qi and
Rui Wang R2: a Distributed Remote Function
Execution Mechanism With Built-In
Metadata . . . . . . . . . . . . . . . . 710--723
Lu Tang and
Yao Xiao and
Qun Huang and
Patrick P. C. Lee A High-Performance Invertible Sketch for
Network-Wide Superspreader Detection . . 724--737
Jiawei Huang and
Wenlu Zhang and
Yijun Li and
Lin Li and
Zhaoyi Li and
Jin Ye and
Jianxin Wang ChainSketch: an Efficient and Accurate
Sketch for Heavy Flow Detection . . . . 738--753
Mukhtiar Ahmad and
Syed Muhammad Nawazish Ali and
Muhammad Taimoor Tariq and
Syed Usman Jafri and
Adnan Abbas and
Syeda Mashal Abbas Zaidi and
Muhammad Basit Iqbal Awan and
Zartash Afzal Uzmi and
Zafar Ayyub Qazi Neutrino: a Fast and Consistent
Edge-Based Cellular Control Plane . . . 754--769
Viviana Arrigoni and
Novella Bartolini and
Annalisa Massini and
Federico Trombetti A Bayesian Approach to Network
Monitoring for Progressive Failure
Localization . . . . . . . . . . . . . . 770--783
Vishrant Tripathi and
Rajat Talak and
Eytan Modiano Information Freshness in Multihop
Wireless Networks . . . . . . . . . . . 784--799
Yu-Han Lu and
Sandy Hsin-Yu Hsiao and
Chi-Yu Li and
Yi-Chen Hsieh and
Po-Yi Chou and
Yao-Yu Li and
Tian Xie and
Guan-Hua Tu Insecurity of Operational IMS Call
Systems: Vulnerabilities, Attacks, and
Countermeasures . . . . . . . . . . . . 800--815
Jielun Zhang and
Fuhao Li and
Feng Ye Sustaining the High Performance of
AI-Based Network Traffic Classification
Models . . . . . . . . . . . . . . . . . 816--827
Tianjian Dong and
Qi Qi and
Jingyu Wang and
Zirui Zhuang and
Haifeng Sun and
Jianxin Liao and
Zhu Han Standing on the Shoulders of Giants:
Cross-Slice Federated Meta Learning for
Resource Orchestration to Cold-Start
Slice . . . . . . . . . . . . . . . . . 828--845
Shicheng Wang and
Menghao Zhang and
Guanyu Li and
Chang Liu and
Zhiliang Wang and
Ying Liu and
Mingwei Xu Bolt: Scalable and Cost-Efficient
Multistring Pattern Matching With
Programmable Switches . . . . . . . . . 846--861
Guangtao Xue and
Yijie Li and
Hao Pan and
Lanqing Yang and
Yi-Chao Chen and
Xiaoyu Ji and
Jiadi Yu ScreenID: Enhancing QRCode Security by
Utilizing Screen Dimming Feature . . . . 862--876
Jiawei Li and
Chuyu Wang and
Ang Li and
Dianqi Han and
Yan Zhang and
Jinhang Zuo and
Rui Zhang and
Lei Xie and
Yanchao Zhang Rhythmic RFID Authentication . . . . . . 877--890
Yang Gao and
Hongli Zhang and
Xiangzhan Yu Higher-Order Community Detection: On
Information Degeneration and Its
Elimination . . . . . . . . . . . . . . 891--903
Dezhang Kong and
Yi Shen and
Xiang Chen and
Qiumei Cheng and
Hongyan Liu and
Dong Zhang and
Xuan Liu and
Shuangxi Chen and
Chunming Wu Combination Attacks and Defenses on SDN
Topology Discovery . . . . . . . . . . . 904--919
Wei Yang and
Chi Lin and
Haipeng Dai and
Pengfei Wang and
Jiankang Ren and
Lei Wang and
Guowei Wu and
Qiang Zhang Robust Wireless Rechargeable Sensor
Networks . . . . . . . . . . . . . . . . 949--964
Xiong Wang and
Jiancheng Ye and
John C. S. Lui Decentralized Scheduling and Dynamic
Pricing for Edge Computing: a Mean Field
Game Approach . . . . . . . . . . . . . 965--978
Marco Faltelli and
Giacomo Belocchi and
Francesco Quaglia and
Salvatore Pontarelli and
Giuseppe Bianchi Metronome: Adaptive and Precise
Intermittent Packet Retrieval in DPDK 979--993
Haoxian Chen and
Chenyuan Wu and
Andrew Zhao and
Mukund Raghothaman and
Mayur Naik and
Boon Thau Loo Synthesizing Formal Network
Specifications From Input--Output
Examples . . . . . . . . . . . . . . . . 994--1009
Yang Du and
He Huang and
Yu-E Sun and
Shigang Chen and
Guoju Gao and
Xiaocan Wu Self-Adaptive Sampling Based Per-Flow
Traffic Measurement . . . . . . . . . . 1010--1025
Feng Lin and
Ming Gao and
Lingfeng Zhang and
Yimin Li and
Weiye Xu and
Jinsong Han and
Xian Xu and
Wenyao Xu and
Kui Ren Mobile Communication Among COTS IoT
Devices via a Resonant Gyroscope With
Ultrasound . . . . . . . . . . . . . . . 1026--1041
Kan Yu and
Jiguo Yu and
Chuanwen Luo The Impact of Mobility on Physical Layer
Security of 5G IoT Networks . . . . . . 1042--1055
Min Yee Teh and
Shizhen Zhao and
Peirui Cao and
Keren Bergman Enabling Quasi-Static Reconfigurable
Networks With Robust Topology
Engineering . . . . . . . . . . . . . . 1056--1070
Yipeng Wang and
Huijie He and
Yingxu Lai and
Alex X. Liu A Two-Phase Approach to Fast and
Accurate Classification of Encrypted
Traffic . . . . . . . . . . . . . . . . 1071--1086
Karim Elsayed and
Amr Rizk Time-to-Live Caching With Network
Delays: Exact Analysis and Computable
Approximations . . . . . . . . . . . . . 1087--1100
Xiaofeng Lu and
Fan Yang and
Luwen Zou and
Pietro Lio and
Pan Hui An LTE Authentication and Key Agreement
Protocol Based on the ECC Self-Certified
Public Key . . . . . . . . . . . . . . . 1101--1116
Jianwei Liu and
Kaiyan Cui and
Xiang Zou and
Jinsong Han and
Feng Lin and
Kui Ren Reliable Multi-Factor User
Authentication With One Single Finger
Swipe . . . . . . . . . . . . . . . . . 1117--1131
Longzhi Yuan and
Qiwei Wang and
Jia Zhao and
Wei Gong Multiprotocol Backscatter With Commodity
Radios for Personal IoT Sensors . . . . 1132--1144
Jingling Liu and
Jiawei Huang and
Weihe Li and
Jianxin Wang and
Tian He Asymmetry-Aware Load Balancing With
Adaptive Switching Granularity in Data
Center . . . . . . . . . . . . . . . . . 1145--1158
Ningning Hou and
Xianjin Xia and
Yuanqing Zheng CloakLoRa: a Covert Channel Over LoRa
PHY . . . . . . . . . . . . . . . . . . 1159--1172
Tareq Si Salem and
Giovanni Neglia and
Damiano Carra Ascent Similarity Caching With
Approximate Indexes . . . . . . . . . . 1173--1186
Vishwaraj Doshi and
Shailaja Mallick and
Do Young Eun Convergence of Bi-Virus Epidemic Models
With Non-Linear Rates on Networks --- a
Monotone Dynamical Systems Approach . . 1187--1201
Junnyung Hur and
Hyeon Gy Shon and
Young Jae Kim and
Myungkeun Yoon Packet Chunking for File Detection . . . 1202--1215
Wenzheng Xu and
Hongbin Xie and
Chenxi Wang and
Weifa Liang and
Xiaohua Jia and
Zichuan Xu and
Pan Zhou and
Weigang Wu and
Xiang Chen An Approximation Algorithm for the h-Hop
Independently Submodular Maximization
Problem and Its Applications . . . . . . 1216--1229
Alon Rashelbach and
Ori Rottenstreich and
Mark Silberstein Scaling by Learning: Accelerating Open
vSwitch Data Path With Neural Networks 1230--1243
Erfan Meskar and
Ben Liang Fair Multi-Resource Allocation in
Heterogeneous Servers With an External
Resource Type . . . . . . . . . . . . . 1244--1262
Anders E. Kalòr and
Petar Popovski Timely Monitoring of Dynamic Sources
With Observations From Multiple Wireless
Sensors . . . . . . . . . . . . . . . . 1263--1276
Berksan Serbetci and
Eleftherios Lampiris and
Thrasyvoulos Spyropoulos and
Giuseppe Caire and
Petros Elia Multi-Transmitter Coded Caching Networks
With Transmitter-Side Knowledge of File
Popularity . . . . . . . . . . . . . . . 1277--1292
Matteo Salani and
Cristina Rottondi and
Leopoldo Ceré and
Massimo Tornatore Dual-Stage Planning for Elastic Optical
Networks Integrating
Machine-Learning-Assisted QoT Estimation 1293--1307
Shuqin Gao and
Costas A. Courcoubetis and
Lingjie Duan Distributed Double Auction Mechanisms
for Large-Scale Device-to-Device
Resource Trading . . . . . . . . . . . . 1308--1323
Pietro Bressana and
Noa Zilberman and
Robert Soulé PTA: Finding Hard-to-Find Data Plane
Bugs . . . . . . . . . . . . . . . . . . 1324--1337
Noor Felemban and
Fidan Mehmeti and
Thomas F. La Porta VidQ: Video Query Using Optimized
Audio-Visual Processing . . . . . . . . 1338--1352
Haodi Ping and
Yongcai Wang and
Deying Li and
Wenping Chen Understanding Node Localizability in
Barycentric Linear Localization . . . . 1353--1368
Peng Lin and
Kejiang Ye and
Yishen Hu and
Yanying Lin and
Cheng-Zhong Xu A Novel Multimodal Deep Learning
Framework for Encrypted Traffic
Classification . . . . . . . . . . . . . 1369--1384
Wenhao Li and
Xiao-Yu Zhang and
Huaifeng Bao and
Haichao Shi and
Qiang Wang ProGraph: Robust Network Traffic
Identification With Graph Propagation 1385--1399
Minghao Ye and
Junjie Zhang and
Zehua Guo and
H. Jonathan Chao FlexDATE: Flexible and Disturbance-Aware
Traffic Engineering With Reinforcement
Learning in Software-Defined Networks 1433--1448
Yongmin Zhang and
Wei Wang and
Ju Ren and
Jinge Huang and
Shibo He and
Yaoxue Zhang Efficient Revenue-Based MEC Server
Deployment and Management in Mobile
Edge-Cloud Computing . . . . . . . . . . 1449--1462
Xu Lin and
Deke Guo and
Yulong Shen and
Guoming Tang and
Bangbang Ren and
Ming Xu SFT-Box: an Online Approach for
Minimizing the Embedding Cost of
Multiple Hybrid SFCs . . . . . . . . . . 1463--1477
Songtao Fu and
Qi Li and
Min Zhu and
Xiaoliang Wang and
Su Yao and
Yangfei Guo and
Xinle Du and
Ke Xu MASK: Practical Source and Path
Verification Based on Multi-AS-Key . . . 1478--1493
Junchao Ma and
Lingjia Liu and
Bodong Shang and
Shashank Jere and
Pingzhi Fan Performance Analysis and Optimization
for Layer-Based Scalable Video Caching
in 6G Networks . . . . . . . . . . . . . 1494--1506
Jian Su and
Zhengguo Sheng and
Chenxi Huang and
Gang Li and
Alex X. Liu and
Zhangjie Fu Identifying RFID Tags in Collisions . . 1507--1520
Guy Goren and
Shay Vargaftik and
Yoram Moses Distributed Dispatching in the Parallel
Server Model . . . . . . . . . . . . . . 1521--1534
Qi Shi and
Dong Hao Social Sourcing: Incorporating Social
Networks Into Crowdsourcing Contest
Design . . . . . . . . . . . . . . . . . 1535--1549
Na Wang and
Junsong Fu and
Shancheng Zhang and
Zheng Zhang and
Jiawen Qiao and
Jianwei Liu and
Bharat K. Bhargava Secure and Distributed IoT Data Storage
in Clouds Based on Secret Sharing and
Collaborative Blockchain . . . . . . . . 1550--1565
Jianer Zhou and
Xinyi Qiu and
Zhenyu Li and
Qing Li and
Gareth Tyson and
Jingpu Duan and
Yi Wang and
Heng Pan and
Qinghua Wu A Machine Learning-Based Framework for
Dynamic Selection of Congestion Control
Algorithms . . . . . . . . . . . . . . . 1566--1581
Shiva Raj Pokhrel and
Jinho Choi and
Anwar Walid Fair and Efficient Distributed Edge
Learning With Hybrid Multipath TCP . . . 1582--1594
Juhyeng Han and
Insu Yun and
Seongmin Kim and
Taesoo Kim and
Sooel Son and
Dongsu Han Scalable and Secure Virtualization of
HSM With ScaleTrust . . . . . . . . . . 1595--1610
Xia Cheng and
Junyang Shi and
Mo Sha and
Linke Guo Revealing Smart Selective Jamming
Attacks in WirelessHART Networks . . . . 1611--1625
Tim Hellemans and
Grzegorz Kielanski and
Benny Van Houdt Performance of Load Balancers With
Bounded Maximum Queue Length in Case of
Non-Exponential Job Sizes . . . . . . . 1626--1641
Steffen Lindner and
Gabriel Paradzik and
Michael Menth Alternative Best Effort (ABE) for
Service Differentiation: Trading Loss
Versus Delay . . . . . . . . . . . . . . 1642--1656
Chi Lin and
Shibo Hao and
Wei Yang and
Pengfei Wang and
Lei Wang and
Guowei Wu and
Qiang Zhang Maximizing Energy Efficiency of
Period-Area Coverage With a UAV for
Wireless Rechargeable Sensor Networks 1657--1673
Dheeraj Narasimha and
Srinivas Shakkottai and
Lei Ying Age-Dependent Distributed MAC for
Ultra-Dense Wireless Networks . . . . . 1674--1687
Christos Tsanikidis and
Javad Ghaderi Randomized Scheduling of Real-Time
Traffic in Wireless Networks Over Fading
Channels . . . . . . . . . . . . . . . . 1688--1701
Francesco Malandrino and
Carla Fabiana Chiasserini and
Giuseppe di Giacomo Efficient Distributed DNNs in the
Mobile-Edge-Cloud Continuum . . . . . . 1702--1716
Xiang Chen and
Hongyan Liu and
Dong Zhang and
Qun Huang and
Haifeng Zhou and
Chunming Wu and
Qiang Yang Eliminating Control Plane Overload via
Measurement Task Placement . . . . . . . 1717--1731
Kaihui Gao and
Chen Sun and
Shuai Wang and
Dan Li and
Yu Zhou and
Hongqiang Harry Liu and
Lingjun Zhu and
Ming Zhang and
Xiang Deng and
Cheng Zhou and
Lu Lu Buffer-Based High-Coverage and
Low-Overhead Request Event Monitoring in
the Cloud . . . . . . . . . . . . . . . 1732--1747
Kaihui Gao and
Shuai Wang and
Kun Qian and
Dan Li and
Rui Miao and
Bo Li and
Yu Zhou and
Ennan Zhai and
Chen Sun and
Jiaqi Gao and
Dai Zhang and
Binzhang Fu and
Frank Kelly and
Dennis Cai and
Hongqiang Harry Liu and
Yan Li and
Hongwei Yang and
Tao Sun Dependable Virtualized Fabric on
Programmable Data Plane . . . . . . . . 1748--1764
Zheng Yang and
Xu Wang and
Jiahang Wu and
Yi Zhao and
Qiang Ma and
Xin Miao and
Li Zhang and
Zimu Zhou EdgeDuet: Tiling Small Object Detection
for Edge Assisted Autonomous Mobile
Vision . . . . . . . . . . . . . . . . . 1765--1778
Cho-Hsin Tsai and
Chih-Chun Wang Distribution-Oblivious Online Algorithms
for Age-of-Information Penalty
Minimization . . . . . . . . . . . . . . 1779--1794
Meng Jin and
Xinbing Wang and
Chenghu Zhou Key Agreement on IoT Devices With Echo
Profiling . . . . . . . . . . . . . . . 1795--1808
Bai Liu and
Qingkai Liang and
Eytan Modiano Tracking MaxWeight: Optimal Control for
Partially Observable and Controllable
Networks . . . . . . . . . . . . . . . . 1809--1821
Apoorv Shukla and
Kevin Hudemann and
Zsolt Vági and
Lily Hügerich and
Georgios Smaragdakis and
Artur Hecker and
Stefan Schmid and
Anja Feldmann Runtime Verification for Programmable
Switches . . . . . . . . . . . . . . . . 1822--1837
Youngmok Ha and
Eunji Pak and
Jongkil Park and
Taeho Kim and
Ji Won Yoon Clock Offset Estimation for Systems With
Asymmetric Packet Delays . . . . . . . . 1838--1853
Qilong Shi and
Yuchen Xu and
Jiuhua Qi and
Wenjun Li and
Tong Yang and
Yang Xu and
Yi Wang Cuckoo Counter: Adaptive Structure of
Counters for Accurate Frequency and
Top-$k$ Estimation . . . . . . . . . . . 1854--1869
Bingnan Hou and
Zhiping Cai and
Kui Wu and
Tao Yang and
Tongqing Zhou 6Scan: a High-Efficiency Dynamic
Internet-Wide IPv6 Scanner With Regional
Encoding . . . . . . . . . . . . . . . . 1870--1885
Qingjun Xiao and
Xuyuan Cai and
Yifei Qin and
Zhiying Tang and
Shigang Chen and
Yu Liu Universal and Accurate Sketch for
Estimating Heavy Hitters and Moments in
Data Streams . . . . . . . . . . . . . . 1919--1934
Daron Anderson and
George Iosifidis and
Douglas J. Leith Lazy Lagrangians for Optimistic Learning
With Budget Constraints . . . . . . . . 1935--1949
Shangyao Yan and
Zhimeng Yin and
Guang Tan CurveLight: an Accurate and Practical
Light Positioning System . . . . . . . . 1950--1964
Zehua Guo and
Songshi Dou and
Wenfei Wu and
Yuanqing Xia Toward Flexible and Predictable Path
Programmability Recovery Under Multiple
Controller Failures in Software-Defined
WANs . . . . . . . . . . . . . . . . . . 1965--1980
Tinghao Zhang and
Kwok-Yan Lam and
Jun Zhao and
Feng Li and
Huimei Han and
Norziana Jamil Enhancing Federated Learning With
Spectrum Allocation Optimization and
Device Selection . . . . . . . . . . . . 1981--1996
Xinzhe Fu and
Eytan Modiano Optimal Routing to Parallel Servers With
Unknown Utilities --- Multi--Armed
Bandit With Queues . . . . . . . . . . . 1997--2012
Suhan Jiang and
Jie Wu Approaching an Optimal Bitcoin Mining
Overlay . . . . . . . . . . . . . . . . 2013--2026
Jincheng Zhong and
Ziling Wei and
Shuang Zhao and
Shuhui Chen TupleTree: a High-Performance Packet
Classification Algorithm Supporting Fast
Rule-Set Updates . . . . . . . . . . . . 2027--2041
Rui Xia and
Haipeng Dai and
Jiaqi Zheng and
Rong Gu and
Xiaoyu Wang and
Weijun Wang and
Guihai Chen SAFE: Service Availability via Failure
Elimination Through VNF Scaling . . . . 2042--2057
Tianyou Qiu and
Yiping Li and
Xisheng Feng Optimal Broadcast Scheduling Algorithm
for a Multi-AUV Acoustic Communication
Network . . . . . . . . . . . . . . . . 2058--2069
Qian Chen and
Jiliang Wang AlignTrack: Push the SNR Limit of LoRa
Collision Decoding . . . . . . . . . . . 2070--2085
Rajeev Sahay and
Serena Nicoll and
Minjun Zhang and
Tsung-Yen Yang and
Carlee Joe-Wong and
Kerrie A. Douglas and
Christopher G. Brinton Predicting Learning Interactions in
Social Learning Networks: a Deep
Learning Enabled Approach . . . . . . . 2086--2100
Kun Xie and
Yudian Ouyang and
Xin Wang and
Gaogang Xie and
Kenli Li and
Wei Liang and
Jiannong Cao and
Jigang Wen Deep Adversarial Tensor Completion for
Accurate Network Traffic Measurement . . 2101--2116
Hao Kong and
Li Lu and
Jiadi Yu and
Yingying Chen and
Xiangyu Xu and
Feng Lyu Toward Multi-User Authentication Using
WiFi Signals . . . . . . . . . . . . . . 2117--2132
Keerthi Priya Dasala and
Josep Miquel Jornet and
Edward W. Knightly Scaling Multi-User mmWave WLANs: The
Case for Concurrent Uplink Transmissions
on a Single RF Chain . . . . . . . . . . 2133--2146
Guojun Xiong and
Shufan Wang and
Gang Yan and
Jian Li Reinforcement Learning for Dynamic
Dimensioning of Cloud Caches: a Restless
Bandit Approach . . . . . . . . . . . . 2147--2161
Jia Zhang and
Shaorui Ren and
Enhuan Dong and
Zili Meng and
Yuan Yang and
Mingwei Xu and
Sijie Yang and
Miao Zhang and
Yang Yue Reducing Mobile Web Latency Through
Adaptively Selecting Transport Protocol 2162--2177
Bahman Abolhassani and
John Tadrous and
Atilla Eryilmaz Optimal Load-Splitting and
Distributed-Caching for Dynamic Content
Over the Wireless Edge . . . . . . . . . 2178--2190
Andrea Baiocchi and
Ion Turcanu On Flow Control and Optimized Back-Off
in Non-Saturated CSMA . . . . . . . . . 2191--2206
Yijing Zeng and
Roberto Calvo-Palomino and
Domenico Giustiniano and
Gerome Bovet and
Suman Banerjee Adaptive Uplink Data Compression in
Spectrum Crowdsensing Systems . . . . . 2207--2221
Renpeng Zou and
Xixiang Lyu and
Jing Ma and
Bowen Zhang and
Danfang Wu BCMIX: a Blockchain-Based Dynamic
Self-Reconfigurable Mixnet . . . . . . . 2222--2235
Yuanyuan Li and
Yuezhou Liu and
Lili Su and
Edmund Yeh and
Stratis Ioannidis Experimental Design Networks: a Paradigm
for Serving Heterogeneous Learners Under
Networking Constraints . . . . . . . . . 2236--2250
Sarath Yasodharan and
Anurag Kumar Revenue Optimal Bandwidth Allocation in
a Class of Multihop Networks: Algorithms
and Asymptotic Optimality . . . . . . . 2251--2266
Jin Fang and
Gongming Zhao and
Hongli Xu and
Changbo Wu and
Zhuolong Yu GRID: Gradient Routing With In-Network
Aggregation for Distributed Training . . 2267--2280
Md Shahbaz Akhtar and
Krishnakumar G. and
Vishnu B. and
Abhishek Sinha Fast and Secure Routing Algorithms for
Quantum Key Distribution Networks . . . 2281--2296
Yitao Xing and
Kaiping Xue and
Yuan Zhang and
Jiangping Han and
Jian Li and
David S. L. WeiMember An Online Learning Assisted Packet
Scheduler for MPTCP in Mobile Networks 2297--2312
Yibo Jin and
Lei Jiao and
Mingtao Ji and
Zhuzhong Qian and
Sheng Zhang and
Ning Chen and
Sanglu Lu Scheduling In-Band Network Telemetry
With Convergence-Preserving Federated
Learning . . . . . . . . . . . . . . . . 2313--2328
Pengtao Fu and
Lailong Luo and
Deke Guo and
Shangsen Li and
Yun Zhou A Shifting Filter Framework for Dynamic
Set Queries . . . . . . . . . . . . . . 2329--2344
Riheng Jia and
Jinhao Wu and
Xiong Wang and
Jianfeng Lu and
Feilong Lin and
Zhonglong Zheng and
Minglu Li Energy Cost Minimization in Wireless
Rechargeable Sensor Networks . . . . . . 2345--2360
Yiran Zhang and
Qingkai Meng and
Yifan Liu and
Fengyuan Ren Revisiting Congestion Detection in
Lossless Networks . . . . . . . . . . . 2361--2375
Han Zhang and
Xia Yin and
Xingang Shi and
Jilong Wang and
Zhiliang Wang and
Yingya Guo and
Tian Lan and
Yahui Li and
Yongqing Zhu and
Ke Ruan and
Haijun Geng Achieving High Availability in Inter-DC
WAN Traffic Engineering . . . . . . . . 2406--2421
Yuntao Wang and
Zhou Su and
Qichao Xu and
Ruidong Li and
Tom H. Luan and
Pinghui Wang A Secure and Intelligent Data Sharing
Scheme for UAV-Assisted Disaster Rescue 2422--2438
Hong Xie and
John C. S. Lui Cooperation Preference Aware Shapley
Value: Modeling, Algorithms and
Applications . . . . . . . . . . . . . . 2439--2453
Congkai An and
Anfu Zhou and
Jialiang Pei and
Xi Liu and
Dongzhu Xu and
Liang Liu and
Huadong Ma Octopus: Exploiting the Edge
Intelligence for Accessible 5G Mobile
Performance Enhancement . . . . . . . . 2454--2469
Sara Garcia Sanchez and
Guillem Reus-Muns and
Carlos Bocanegra and
Yanyu Li and
Ufuk Muncuk and
Yousof Naderi and
Yanzhi Wang and
Stratis Ioannidis and
Kaushik Roy Chowdhury AirNN: Over-the-Air Computation for
Neural Networks via Reconfigurable
Intelligent Surfaces . . . . . . . . . . 2470--2482
Kiril Danilchenko and
Zeev Nutov and
Michael Segal Covering Users With QoS by a Connected
Swarm of Drones: Graph Theoretical
Approach and Experiments . . . . . . . . 2483--2498
Won Joon Yun and
Yunseok Kwak and
Hankyul Baek and
Soyi Jung and
Mingyue Ji and
Mehdi Bennis and
Jihong Park and
Joongheon Kim SlimFL: Federated Learning With
Superposition Coding Over Slimmable
Neural Networks . . . . . . . . . . . . 2499--2514
Guocheng Liao and
Xu Chen and
Jianwei Huang Privacy Protection Under Incomplete
Social and Data Correlation Information 2515--2528
Qian Lv and
Zuqing Zhu On the Multilayer Planning of Filterless
Optical Networks With OTN Encryption . . 2529--2544
Wei Wang and
Xin Liu and
Yao Yao and
Zicheng Chi and
Stuart Ray and
Ting Zhu and
Yanchao Zhang Simultaneous Data Dissemination Among
WiFi and ZigBee Devices . . . . . . . . 2545--2558
Zeqi Lai and
Hewu Li and
Qi Zhang and
Qian Wu and
Jianping Wu StarFront: Cooperatively Constructing
Pervasive and Low-Latency CDNs Upon
Emerging LEO Satellites and Clouds . . . 2559--2574
Songshi Dou and
Li Qi and
Chao Yao and
Zehua Guo Exploring the Impact of Critical
Programmability on Controller Placement
for Software-Defined Wide Area Networks 2575--2588
Yevheniya Nosyk and
Maciej Korczy\'nski and
Qasim Lone and
Marcin Skwarek and
Baptiste Jonglez and
Andrzej Duda The Closed Resolver Project: Measuring
the Deployment of Inbound Source Address
Validation . . . . . . . . . . . . . . . 2589--2603
Yongquan Fu and
Lun An and
Siqi Shen and
Kai Chen and
Pere Barlet-Ros A One-Pass Clustering Based Sketch
Method for Network Monitoring . . . . . 2604--2613
Ahmed M. Abdelmoniem and
Brahim Bensaou Enhancing TCP via Hysteresis Switching:
Theoretical Analysis and Empirical
Evaluation . . . . . . . . . . . . . . . 2614--2623
Fusheng Lin and
Hongyu Wang and
Guo Chen and
Guihua Zhou and
Tingting Xu and
Dehui Wei and
Li Chen and
Yuanwei Lu and
Andrew Qu and
Hua Shao and
Hongbo Jiang Fast, Scalable and Robust Centralized
Routing for Data Center Networks . . . . 2624--2639
Xuezheng Liu and
Zirui Yan and
Yipeng Zhou and
Di Wu and
Xu Chen and
Jessie Hui Wang Optimizing Parameter Mixing Under
Constrained Communications in Parallel
Federated Learning . . . . . . . . . . . 2640--2652
Ruijie Miao and
Yinda Zhang and
Zihao Zheng and
Ruixin Wang and
Ruwen Zhang and
Tong Yang and
Zaoxing Liu and
Junchen Jiang CocoSketch: High-Performance
Sketch-Based Measurement Over Arbitrary
Partial Key Query . . . . . . . . . . . 2653--2668
Kanatip Chitavisutthivong and
Sucha Supittayapornpong and
Pooria Namyar and
Mingyang Zhang and
Minlan Yu and
Ramesh Govindan Optimal Oblivious Routing With Concave
Objectives for Structured Networks . . . 2669--2681
Bhargav Ganguly and
Seyyedali Hosseinalipour and
Kwang Taik Kim and
Christopher G. Brinton and
Vaneet Aggarwal and
David J. Love and
Mung Chiang Multi-Edge Server-Assisted Dynamic
Federated Learning With an Optimized
Floating Aggregation Point . . . . . . . 2682--2697
Jiaxiao Zheng and
Albert Banchs and
Gustavo de Veciana Constrained Network Slicing Games:
Achieving Service Guarantees and Network
Efficiency . . . . . . . . . . . . . . . 2698--2713
Qi Shao and
Man Hon Cheung and
Jianwei Huang Crowdfunding With Cognitive Limitations 2714--2729
Chen Wang and
Qin Hu and
Dongxiao Yu and
Xiuzhen Cheng Online Learning for Failure-Aware Edge
Backup of Service Function Chains With
the Minimum Latency . . . . . . . . . . 2730--2744
Dian Shen and
Junzhou Luo and
Fang Dong and
Xiaolin Guo and
Ciyuan Chen and
Kai Wang and
John C. S. Lui Enabling Distributed and Optimal RDMA
Resource Sharing in Large-Scale Data
Center Networks: Modeling, Analysis, and
Implementation . . . . . . . . . . . . . 2745--2760
Linh T. Hoang and
Chuyen T. Nguyen and
Anh T. Pham Deep Reinforcement Learning-Based Online
Resource Management for UAV-Assisted
Edge Computing With Dual Connectivity 2761--2776
Yangming Zhao and
Chunming Qiao Distributed Transport Protocols for
Quantum Data Networks . . . . . . . . . 2777--2792
Ruixuan Li and
Xiaofeng Jia and
Zhenyong Zhang and
Jun Shao and
Rongxing Lu and
Jingqiang Lin and
Xiaoqi Jia and
Guiyi Wei A Longitudinal and Comprehensive
Measurement of DNS Strict Privacy . . . 2793--2808
Dong Yang and
Zongrong Cheng and
Weiting Zhang and
Hongke Zhang and
Xuemin Shen Burst-Aware Time-Triggered Flow
Scheduling With Enhanced Multi-CQF in
Time-Sensitive Networks . . . . . . . . 2809--2824
Lailong Luo and
Pengtao Fu and
Shangsen Li and
Deke Guo and
Qianzhen Zhang and
Huaimin Wang Ark Filter: a General and
Space-Efficient Sketch for Network Flow
Analysis . . . . . . . . . . . . . . . . 2825--2839
Xiuqi Huang and
Yuanning Gao and
Xinyi Zhou and
Xiaofeng Gao and
Guihai Chen An Adaptive Metadata Management Scheme
Based on Deep Reinforcement Learning for
Large-Scale Distributed File Systems . . 2840--2853
Junseon Kim and
Youngbin Im and
Kyunghan Lee Enabling Delay-Guaranteed Congestion
Control With One-Bit Feedback in
Cellular Networks . . . . . . . . . . . 3--16
Aakash Khochare and
Francesco Betti Sorbelli and
Yogesh Simmhan and
Sajal K. Das Improved Algorithms for Co-Scheduling of
Edge Analytics and Routes for UAV Fleet
Missions . . . . . . . . . . . . . . . . 17--33
Danfeng Shan and
Linbing Jiang and
Peng Zhang and
Wanchun Jiang and
Hao Li and
Yazhe Tang and
Fengyuan Ren Enforcing Fairness in the Traffic
Policer Among Heterogeneous Congestion
Control Algorithms . . . . . . . . . . . 34--49
Yali Yuan and
Weijun Wang and
Yuhan Wang and
Sripriya Srikant Adhatarao and
Bangbang Ren and
Kai Zheng and
Xiaoming Fu Joint Optimization of QoE and Fairness
for Adaptive Video Streaming in
Heterogeneous Mobile Environments . . . 50--64
Qiang He and
Zheng Feng and
Hui Fang and
Xingwei Wang and
Liang Zhao and
Yudong Yao and
Keping Yu A Blockchain-Based Scheme for Secure
Data Offloading in Healthcare With Deep
Reinforcement Learning . . . . . . . . . 65--80
Fabrício B. Carvalho and
Ronaldo A. Ferreira and
Ítalo Cunha and
Marcos A. M. Vieira and
Murali K. Ramanathan State Disaggregation for Dynamic Scaling
of Network Functions . . . . . . . . . . 81--95
Yizong Wang and
Dong Zhao and
Chenghao Huang and
Fuyu Yang and
Teng Gao and
Anfu Zhou and
Huanhuan Zhang and
Huadong Ma and
Yang Du and
Aiyun Chen TrafAda: Cost-Aware Traffic Adaptation
for Maximizing Bitrates in Live
Streaming . . . . . . . . . . . . . . . 96--109
Gongming Zhao and
Jingzhou Wang and
Hongli Xu and
Yangming Zhao and
Xuwei Yang and
He Huang Joint Request Updating and Elastic
Resource Provisioning With QoS Guarantee
in Clouds . . . . . . . . . . . . . . . 110--126
Wanchun Jiang and
Haoyang Li and
Jia Wu and
Zheyuan Liu and
Jiawei Huang and
Danfeng Shan and
Jianxin Wang Improvement of Copa: Behaviors and
Friendliness of Delay-Based Congestion
Control Algorithm . . . . . . . . . . . 127--142
Zehua Guo and
Songshi Dou and
Wenchao Jiang and
Yuanqing Xia Toward Improved Path Programmability
Recovery for Software-Defined WANs Under
Multiple Controller Failures . . . . . . 143--158
Xiaoli Zhang and
Wei Geng and
Yiqiao Song and
Hongbing Cheng and
Ke Xu and
Qi Li Privacy-Preserving and Lightweight
Verification of Deep Packet Inspection
in Clouds . . . . . . . . . . . . . . . 159--174
Yong Deng and
Min Dong Decentralized Caching Under Nonuniform
File Popularity and Size: Memory-Rate
Tradeoff Characterization . . . . . . . 175--190
Xiang Chen and
Hongyan Liu and
Qun Huang and
Dong Zhang and
Haifeng Zhou and
Chunming Wu and
Xuan Liu Toward Scalable and Low-Cost Traffic
Testing for Evaluating DDoS Defense
Solutions . . . . . . . . . . . . . . . 191--206
Meng Jin and
Yuan He and
Yunhao Liu and
Xinbing Wang Covert Communication With Acoustic Noise 207--221
Seyyedali Hosseinalipour and
Su Wang and
Nicol\`o Michelusi and
Vaneet Aggarwal and
Christopher G. Brinton and
David J. Love and
Mung Chiang Parallel Successive Learning for Dynamic
Distributed Model Training Over
Heterogeneous Wireless Networks . . . . 222--237
Kan Yu and
Jiguo Yu and
Zhiyong Feng and
Honglong Chen A Reassessment on Applying Protocol
Interference Model Under Rayleigh
Fading: From Perspective of Link
Scheduling . . . . . . . . . . . . . . . 238--252
Masahito Hayashi and
Takeshi Koshiba Universal Adaptive Construction of
Verifiable Secret Sharing and Its
Application to Verifiable Secure
Distributed Data Storage . . . . . . . . 253--267
Gongming Zhao and
Jingzhou Wang and
Yangming Zhao and
Hongli Xu and
Liusheng Huang and
Chunming Qiao Segmented Entanglement Establishment
With All-Optical Switching in Quantum
Networks . . . . . . . . . . . . . . . . 268--282
Christoph Lenzen and
Moti Medina and
Mehrdad Saberi and
Stefan Schmid Robust Routing Made Easy: Reinforcing
Networks Against Non-Benign Faults . . . 283--297
Masaki Murakami and
Takashi Kurimoto and
Satoru Okamoto and
Naoaki Yamanaka Experimental Evaluation on
Priority-Aware Guaranteed Resource
Allocation for Resource Pool Based
Reconfigurable Hardware . . . . . . . . 298--307
Marc Carrascosa-Zamacois and
Giovanni Geraci and
Edward Knightly and
Boris Bellalta Wi-Fi Multi-Link Operation: an
Experimental Study of Latency and
Throughput . . . . . . . . . . . . . . . 308--322
Weiguang Zhang and
Jiarong Liang and
Xinyu Liang Approximation Algorithms for Computing
Virtual Backbones Considering Routing
Costs in Wireless Networks . . . . . . . 323--337
Xin Liu and
Zicheng Chi and
Wei Wang and
Yao Yao and
Pei Hao and
Ting Zhu High-Granularity Modulation for OFDM
Backscatter . . . . . . . . . . . . . . 338--351
Yiming Zeng and
Jiarui Zhang and
Ji Liu and
Zhenhua Liu and
Yuanyuan Yang Entanglement Routing Design Over Quantum
Networks . . . . . . . . . . . . . . . . 352--367
Lutong Chen and
Kaiping Xue and
Jian Li and
Ruidong Li and
Nenghai Yu and
Qibin Sun and
Jun Lu Q-DDCA: Decentralized Dynamic Congestion
Avoid Routing in Large-Scale Quantum
Networks . . . . . . . . . . . . . . . . 368--381
Guorui Xie and
Qing Li and
Guanglin Duan and
Jiaye Lin and
Yutao Dong and
Yong Jiang and
Dan Zhao and
Yuan Yang Empowering In-Network Classification in
Programmable Switches by Binary Decision
Tree and Knowledge Distillation . . . . 382--395
Mingxin Cai and
Yutong Liu and
Linghe Kong and
Guihai Chen and
Liang Liu and
Meikang Qiu and
Shahid Mumtaz Resource Critical Flow Monitoring in
Software-Defined Networks . . . . . . . 396--410
Liyuan Gu and
Ye Tian and
Wei Chen and
Zhongxiang Wei and
Cenman Wang and
Xinming Zhang Per-Flow Network Measurement With
Distributed Sketch . . . . . . . . . . . 411--426
Fengyuan Zhu and
Renjie Zhao and
Bingbing Wang and
Xinbing Wang and
Xinping Guan and
Chenghu Zhou and
Xiaohua Tian Enabling OFDMA in Wi-Fi Backscatter . . 427--444
Ning Chen and
Sheng Zhang and
Zhi Ma and
Yu Chen and
Yibo Jin and
Jie Wu and
Zhuzhong Qian and
Yu Liang and
Sanglu Lu ViChaser: Chase Your Viewpoint for Live
Video Streaming With Block-Oriented
Super-Resolution . . . . . . . . . . . . 445--459
Qinhan Wei and
Yongcai Wang and
Deying Li EMI: an Efficient Algorithm for
Identifying Maximal Rigid Clusters in
$3$D Generic Graphs . . . . . . . . . . 460--474
Payam Abdisarabshali and
Minghui Liwang and
Amir Rajabzadeh and
Mahmood Ahmadi and
Seyyedali Hosseinalipour Decomposition Theory Meets Reliability
Analysis: Processing of
Computation-Intensive Dependent Tasks
Over Vehicular Clouds With Dynamic
Resources . . . . . . . . . . . . . . . 475--490
Xiong Wang and
Jiancheng Ye and
John C. S. Lui Mean Field Graph Based D$2$D
Collaboration and Offloading Pricing in
Mobile Edge Computing . . . . . . . . . 491--505
Zhengyu Liao and
Shiyou Qian and
Zhonglong Zheng and
Jiange Zhang and
Jian Cao and
Guangtao Xue and
Minglu Li PT-Tree: a Cascading Prefix Tuple Tree
for Packet Classification in Dynamic
Scenarios . . . . . . . . . . . . . . . 506--519
Jiaqi Zheng and
Zhuoxuan Du and
Zhenqing Zha and
Zixuan Yang and
Xiaofeng Gao and
Guihai Chen Learning to Configure Converters in
Hybrid Switching Data Center Networks 520--534
Xiaohua Tian and
Fengyuan Zhu and
Hao Li and
Mingwei Ouyang and
Luwei Feng and
Xinyu Tong and
Xinbing Wang MobiScatter: Enhancing Capacity in
Drone-Assisted High-Concurrency
Backscatter Networks . . . . . . . . . . 535--549
Liekang Zeng and
Xu Chen and
Peng Huang and
Ke Luo and
Xiaoxi Zhang and
Zhi Zhou Serving Graph Neural Networks With
Distributed Fog Servers for Smart IoT
Services . . . . . . . . . . . . . . . . 550--565
Hao Wang and
Chi Harold Liu and
Haoming Yang and
Guoren Wang and
Kin K. Leung Ensuring Threshold AoI for UAV-Assisted
Mobile Crowdsensing by Multi-Agent Deep
Reinforcement Learning With Transformer 566--581
Jianpeng Qi and
Xiao Su and
Rui Wang Toward Distributively Build
Time-Sensitive-Service Coverage in
Compute First Networking . . . . . . . . 582--597
Damien Guidolin-Pina and
Marc Boyer and
Jean-Yves Le Boudec Configuration of Guard Band and Offsets
in Cyclic Queuing and Forwarding . . . . 598--612
Xiaohan Zhang and
Jinwen Wang and
Yueqiang Cheng and
Qi Li and
Kun Sun and
Yao Zheng and
Ning Zhang and
Xinghua Li Interface-Based Side Channel in
TEE-Assisted Networked Services . . . . 613--626
Junxue Zhang and
Chaoliang Zeng and
Hong Zhang and
Shuihai Hu and
Kai Chen LiteFlow: Toward High-Performance
Adaptive Neural Networks for Kernel
Datapath . . . . . . . . . . . . . . . . 627--642
Bhargav Ganguly and
Vaneet Aggarwal Online Federated Learning via
Non-Stationary Detection and Adaptation
Amidst Concept Drift . . . . . . . . . . 643--653
Daniel Ayepah-Mensah and
Guolin Sun and
Gordon Owusu Boateng and
Stephen Anokye and
Guisong Liu Blockchain-Enabled Federated
Learning-Based Resource Allocation and
Trading for Network Slicing in 5G . . . 654--669
Si Wu and
Zhirong Shen and
Patrick P. C. Lee and
Zhiwei Bai and
Yinlong Xu Elastic Reed--Solomon Codes for
Efficient Redundancy Transitioning in
Distributed Key--Value Stores . . . . . 670--685
Tomer Voronov and
Danny Raz and
Ori Rottenstreich A Framework for Anomaly Detection in
Blockchain Networks With Sketches . . . 686--698
Zihao Wang and
Hang Wang and
Zhuowen Li and
Xinghua Li and
Yinbin Miao and
Yanbing Ren and
Yunwei Wang and
Zhe Ren and
Robert H. Deng Robust Permissioned Blockchain Consensus
for Unstable Communication in FANET . . 699--712
Liekang Zeng and
Haowei Chen and
Daipeng Feng and
Xiaoxi Zhang and
Xu Chen A$3$D: Adaptive, Accurate, and
Autonomous Navigation for Edge-Assisted
Drones . . . . . . . . . . . . . . . . . 713--728
Bin Luo and
Xinghua Li and
Yinbin Miao and
Man Zhang and
Ximeng Liu and
Yanbing Ren and
Xizhao Luo and
Robert H. Deng PAM$^3$S: Progressive Two-Stage
Auction-Based Multi-Platform Multi-User
Mutual Selection Scheme in MCS . . . . . 729--744
Miao Dai and
Gang Sun and
Hongfang Yu and
Dusit Niyato Maximize the Long-Term Average Revenue
of Network Slice Provider via Admission
Control Among Heterogeneous Slices . . . 745--760
Peyman Teymoori and
Michael Welzl and
David A. Hayes LGCC: a Novel High-Throughput and Low
Delay Paradigm Shift in Multi-Hop
Congestion Control . . . . . . . . . . . 761--776
Fulong Yan and
Xiong Deng and
Changshun Yuan and
Boyuan Yan and
Chongjin Xie On the Performance Investigation of a
Recursive Fast Optical Switch-Based High
Performance Computing Network
Architecture . . . . . . . . . . . . . . 777--790
Jianchun Liu and
Qingmin Zeng and
Hongli Xu and
Yang Xu and
Zhiyuan Wang and
He Huang Adaptive Block-Wise Regularization and
Knowledge Distillation for Enhancing
Federated Learning . . . . . . . . . . . 791--805
Quan Chen and
Song Guo and
Zhipeng Cai and
Jing Li and
Tuo Shi and
Hong Gao Peak AoI Minimization at
Wireless-Powered Network Edge: From the
Perspective of Both Charging and
Transmitting . . . . . . . . . . . . . . 806--821
Yuntian Zhang and
Ning Han and
Tengteng Zhu and
Junjie Zhang and
Minghao Ye and
Songshi Dou and
Zehua Guo Prophet: Traffic Engineering-Centric
Traffic Matrix Prediction . . . . . . . 822--832
Truc Nguyen and
My T. Thai Preserving Privacy and Security in
Federated Learning . . . . . . . . . . . 833--843
Muhammad Saad and
Afsah Anwar and
Srivatsan Ravi and
David Mohaisen Revisiting Nakamoto Consensus in
Asynchronous Networks: a Comprehensive
Analysis of Bitcoin Safety and Chain
Quality . . . . . . . . . . . . . . . . 844--858
Tareq Si Salem and
Gabriele Castellano and
Giovanni Neglia and
Fabio Pianese and
Andrea Araldo Toward Inference Delivery Networks:
Distributing Machine Learning With
Optimality Guarantees . . . . . . . . . 859--873
Guijuan Wang and
Jiguo Yu and
Yifei Zou and
Jianxi Fan and
Wei Cheng A New Measure of Fault-Tolerance for
Network Reliability: Double-Structure
Connectivity . . . . . . . . . . . . . . 874--889
Wenzheng Xu and
Chengxi Wang and
Hongbin Xie and
Weifa Liang and
Haipeng Dai and
Zichuan Xu and
Ziming Wang and
Bing Guo and
Sajal K. Das Reward Maximization for Disaster Zone
Monitoring With Heterogeneous UAVs . . . 890--903
Yunming Liao and
Yang Xu and
Hongli Xu and
Zhiwei Yao and
Lun Wang and
Chunming Qiao Accelerating Federated Learning With
Data and Model Parallelism in Edge
Computing . . . . . . . . . . . . . . . 904--918
Onur Ayan and
Sandra Hirche and
Anthony Ephremides and
Wolfgang Kellerer Optimal Finite Horizon Scheduling of
Wireless Networked Control Systems . . . 927--942
Qianqian Pan and
Jun Wu and
Jianhua Li and
Wu Yang and
Mohsen Guizani Blockchain and Multi-Agent Learning
Empowered Incentive IRS Resource
Scheduling for Intelligent
Reconfigurable Networks . . . . . . . . 943--958
Pedro Reviriego and
Jim Apple and
Alvaro Alonso and
Otmar Ertl and
Niv Dayan Cardinality Estimation Adaptive Cuckoo
Filters (CE-ACF): Approximate Membership
Check and Distinct Query Count for
High-Speed Network Monitoring . . . . . 959--970
Hao Li and
Yihan Dang and
Guangda Sun and
Changhao Wu and
Peng Zhang and
Danfeng Shan and
Tian Pan and
Chengchen Hu Programming Network Stack for Physical
Middleboxes and Virtualized Network
Functions . . . . . . . . . . . . . . . 971--986
Weihe Li and
Paul Patras P-Sketch: a Fast and Accurate Sketch for
Persistent Item Lookup . . . . . . . . . 987--1002
Chenyi Liu and
Vaneet Aggarwal and
Tian Lan and
Nan Geng and
Yuan Yang and
Mingwei Xu and
Qing Li FERN: Leveraging Graph Attention
Networks for Failure Evaluation and
Robust Network Design . . . . . . . . . 1003--1018
Jian Qu and
Xiaobo Ma and
Wenmao Liu and
Hongqing Sang and
Jianfeng Li and
Lei Xue and
Xiapu Luo and
Zhenhua Li and
Li Feng and
Xiaohong Guan On Smartly Scanning of the Internet of
Things . . . . . . . . . . . . . . . . . 1019--1034
Maria Diamanti and
Christos Pelekis and
Eirini Eleni Tsiropoulou and
Symeon Papavassiliou Delay Minimization for Rate-Splitting
Multiple Access-Based Multi-Server MEC
Offloading . . . . . . . . . . . . . . . 1035--1047
Haitham H. Esmat and
Beatriz Lorenzo Self-Learning Multi-Mode Slicing
Mechanism for Dynamic Network
Architectures . . . . . . . . . . . . . 1048--1063
Bai Liu and
Quang Minh Nguyen and
Qingkai Liang and
Eytan Modiano Tracking Drift-Plus-Penalty: Utility
Maximization for Partially Observable
and Controllable Networks . . . . . . . 1064--1079
Soumadeep Das and
Aryan Mohammadi Pasikhani and
Prosanta Gope and
John A. Clark and
Chintan Patel and
Biplab Sikdar AIDPS: Adaptive Intrusion Detection and
Prevention System for Underwater
Acoustic Sensor Networks . . . . . . . . 1080--1095
Ehsan Etezadi and
Carlos Natalino and
Christine Tremblay and
Lena Wosinska and
Marija Furdek Programmable Filterless Optical
Networks: Architecture, Design, and
Resource Allocation . . . . . . . . . . 1096--1109
Mei Wang and
Jing Chen and
Kun He and
Ruozhou Yu and
Ruiying Du and
Zhihao Qian UFinAKA: Fingerprint-Based
Authentication and Key Agreement With
Updatable Blind Credentials . . . . . . 1110--1123
Xiaoxue Yang and
Hao Wang and
Bing Hu and
Chunming Wu ABOI: AWGR-Based Optical Interconnects
for Single-Wavelength and
Multi-Wavelength . . . . . . . . . . . . 1124--1139
Peikun Ni and
Jianming Zhu and
Guoqing Wang Activity-Oriented Production Promotion
Utility Maximization in Metaverse Social
Networks . . . . . . . . . . . . . . . . 1140--1154
Wenli Jiao and
Ju Wang and
Yelu He and
Xiangdong Xi and
Fuwei Wang and
Dingyi Fang and
Xiaojiang Chen Eliminating Design Effort: a
Reconfigurable Sensing Framework for
Chipless, Backscatter Tags . . . . . . . 1155--1170
Yu Li and
Jiaheng Zhang and
Junjie Chen and
Yicong Chen and
Ning Xie and
Hongbin Li Privacy-Preserving Physical-Layer
Authentication Under Cooperative Attacks 1171--1186
Jiani Guo and
Shanshan Song and
Jun Liu and
Hao Chen and
Jun-Hong Cui and
Guangjie Han A Hybrid NOMA-Based MAC Protocol for
Underwater Acoustic Networks . . . . . . 1187--1200
Tooba Faisal and
Damiano Di Francesco Maesa and
Nishanth Sastry and
Simone Mangiante JITRA: Just-In-Time Resource Allocation
Through the Distributed Ledgers for 5G
and Beyond . . . . . . . . . . . . . . . 1201--1211
Juncheng Wang and
Ben Liang and
Min Dong and
Gary Boudreau and
Hatem Abou-Zeid Joint Online Optimization of Model
Training and Analog Aggregation for
Wireless Edge Learning . . . . . . . . . 1212--1228
Sihan Wang and
Tian Xie and
Min-Yue Chen and
Guan-Hua Tu and
Chi-Yu Li and
Xinyu Lei and
Po-Yi Chou and
Fucheng Hsieh and
Yiwen Hu and
Li Xiao and
Chunyi Peng Dissecting Operational Cellular IoT
Service Security: Attacks and Defenses 1229--1244
Qian Li TCP FlexiS: a New Approach to Incipient
Congestion Detection and Control . . . . 1245--1260
Liping Zhang and
Wenshuo Han and
Shukai Chen and
Kim-Kwang Raymond Choo An Efficient and Secure Health Data
Propagation Scheme Using
Steganography-Based Approach for
Electronic Health Networks . . . . . . . 1261--1272
Xuehe Wang and
Shensheng Zheng and
Lingjie Duan Dynamic Pricing for Client Recruitment
in Federated Learning . . . . . . . . . 1273--1286
Yongqiang Liu and
Xike Xie A Probabilistic Sketch for Summarizing
Cold Items of Data Streams . . . . . . . 1287--1302
Xiujun Wang and
Zhi Liu and
Alex X. Liu and
Xiao Zheng and
Hao Zhou and
Ammar Hawbani and
Zhe Dang A Near-Optimal Protocol for Continuous
Tag Recognition in Mobile RFID Systems 1303--1318
Racyus D. G. Pacífico and
Lucas F. S. Duarte and
Luiz F. M. Vieira and
Barath Raghavan and
José A. M. Nacif and
Marcos A. M. Vieira eBPFlow: a Hardware/Software Platform to
Seamlessly Offload Network Functions
Leveraging eBPF . . . . . . . . . . . . 1319--1332
Jihyeon Yun and
Atilla Eryilmaz and
Jun Moon and
Changhee Joo Remote Estimation for Dynamic IoT
Sources Under Sublinear Communication
Costs . . . . . . . . . . . . . . . . . 1333--1345
Tie Qiu and
Xinwei Yang and
Ning Chen and
Songwei Zhang and
Geyong Min and
Dapeng Oliver Wu A Self-Adaptive Robustness Optimization
Method With Evolutionary Multi-Agent for
IoT Topology . . . . . . . . . . . . . . 1346--1361
Lun Wang and
Yang Xu and
Hongli Xu and
Zhida Jiang and
Min Chen and
Wuyang Zhang and
Chen Qian BOSE: Block-Wise Federated Learning in
Heterogeneous Edge Computing . . . . . . 1362--1377
Haifeng Sun and
Qun Huang and
Patrick P. C. Lee and
Wei Bai and
Feng Zhu and
Yungang Bao Distributed Network Telemetry With
Resource Efficiency and Full Accuracy 1857--1872
Guangmeng Zhou and
Qi Li and
Yang Liu and
Yi Zhao and
Qi Tan and
Su Yao and
Ke Xu FedPAGE: Pruning Adaptively Toward
Global Efficiency of Heterogeneous
Federated Learning . . . . . . . . . . . 1873--1887
Han Tian and
Xudong Liao and
Chaoliang Zeng and
Decang Sun and
Junxue Zhang and
Kai Chen Efficient DRL-Based Congestion Control
With Ultra-Low Overhead . . . . . . . . 1888--1903
Xiaobo Ma and
Jian Qu and
Mawei Shi and
Bingyu An and
Jianfeng Li and
Xiapu Luo and
Junjie Zhang and
Zhenhua Li and
Xiaohong Guan Website Fingerprinting on Encrypted
Proxies: a Flow-Context-Aware Approach
and Countermeasures . . . . . . . . . . 1904--1919
Haoyue Tang and
Yin Sun and
Leandros Tassiulas Sampling of the Wiener Process for
Remote Estimation Over a Channel With
Unknown Delay Statistics . . . . . . . . 1920--1935
Xiaolong Zheng and
Dan Xia and
Fu Yu and
Liang Liu and
Huadong Ma Enabling Cross-Technology Communication
From WiFi to LoRa With IEEE 802.11ax . . 1936--1950
Wilson Ayyanthole Nelson and
Sreenivasa Reddy Yeduri and
Ajit Jha and
Abhinav Kumar and
Linga Reddy Cenkeramaddi RL-Based Energy-Efficient Data
Transmission Over Hybrid
BLE/LTE/Wi-Fi/LoRa UAV-Assisted Wireless
Network . . . . . . . . . . . . . . . . 1951--1966
Seyed Mohammadhossein Tabatabaee and
Anne Bouillard and
Jean-Yves Le Boudec Worst-Case Delay Analysis of
Time-Sensitive Networks With Deficit
Round-Robin . . . . . . . . . . . . . . 1967--1982
Junyang Shi and
Aitian Ma and
Xia Cheng and
Mo Sha and
Peng Xi Adapting Wireless Network Configuration
From Simulation to Reality via Deep
Learning-Based Domain Adaptation . . . . 1983--1998
Reshma Prasad and
Albert Sunny QoS-Aware Scheduling in 5G Wireless Base
Stations . . . . . . . . . . . . . . . . 1999--2011
Ruijie Zhao and
Mingwei Zhan and
Xianwen Deng and
Fangqi Li and
Yanhao Wang and
Yijun Wang and
Guan Gui and
Zhi Xue A Novel Self-Supervised Framework Based
on Masked Autoencoder for Traffic
Classification . . . . . . . . . . . . . 2012--2025
Jingyu Xiao and
Xudong Zuo and
Qing Li and
Dan Zhao and
Hanyu Zhao and
Yong Jiang and
Jiyong Sun and
Bin Chen and
Yong Liang and
Jie Li FlexNF: Flexible Network Function
Orchestration for Scalable On-Path
Service Chain Serving . . . . . . . . . 2026--2041
Yifan Yang and
Wei Gong Universal WiFi Backscatter With Ambient
Space-Time Streams . . . . . . . . . . . 2042--2052
Md. Ibrahim Ibne Alam and
Elliot Anshelevich and
Koushik Kar and
Murat Yuksel Pricing for Efficient Traffic Exchange
at IXPs . . . . . . . . . . . . . . . . 2053--2068
Qingkai Meng and
Yiran Zhang and
Shan Zhang and
Zhiyuan Wang and
Tong Zhang and
Hongbin Luo and
Fengyuan Ren Switch-Assistant Loss Recovery for RDMA
Transport Control . . . . . . . . . . . 2069--2084
Xiaopeng Yao and
Yunpeng Zhao and
Ningtuo Gao and
Hongwei Du and
Hejiao Huang Causal Related Rumors Controlling in
Social Networks of Multiple Information 2085--2098
Yan Wang and
Quansheng Guan and
Fei Ji and
Weiqi Chen Impact and Analysis of Space-Time
Coupling on Slotted MAC in UANs . . . . 2099--2111
Zhicheng Luo and
Qianyi Huang and
Xu Chen and
Rui Wang and
Fan Wu and
Guihai Chen and
Qian Zhang Spectrum Sensing Everywhere: Wide-Band
Spectrum Sensing With Low-Cost UWB Nodes 2112--2127
Shuyue Li and
Jing Li and
Chaocan Xiang and
Wenzheng Xu and
Jian Peng and
Ziming Wang and
Weifa Liang and
Xinwei Yao and
Xiaohua Jia and
Sajal K. Das Maximizing Network Throughput in
Heterogeneous UAV Networks . . . . . . . 2128--2142
Tingting Xiao and
Chen Chen and
Mianxiong Dong and
Kaoru Ota and
Lei Liu and
Schahram Dustdar Multi-Agent Reinforcement Learning-Based
Trading Decision-Making in
Platooning-Assisted Vehicular Networks 2143--2158
Zhifeng Hu and
Chong Han and
Xudong Wang Deep Reinforcement Learning Based
Cross-Layer Design in Terahertz Mesh
Backhaul Networks . . . . . . . . . . . 2159--2173
Qianyu Zhang and
Gongming Zhao and
Hongli Xu and
Peng Yang XAgg: Accelerating Heterogeneous
Distributed Training Through XDP-Based
Gradient Aggregation . . . . . . . . . . 2174--2188
Baojun Chen and
Jiawen Zhu and
Shuai Zhang and
Weiqiang Sun and
Weisheng Hu Performances of Traffic Offloading in
Data Center Networks With Steerable
Free-Space Optical Communications . . . 2189--2204
Shouqian Shi and
Xiaoxue Zhang and
Chen Qian Concurrent Entanglement Routing for
Quantum Networks: Model and Designs . . 2205--2220
Peng Sun and
Guocheng Liao and
Xu Chen and
Jianwei Huang A Socially Optimal Data Marketplace With
Differentially Private Federated
Learning . . . . . . . . . . . . . . . . 2221--2236
Muhammad Sarmad Mir and
Borja Genoves Guzman and
Ambuj Varshney and
Domenico Giustiniano LiFi for Low-Power and Long-Range RF
Backscatter . . . . . . . . . . . . . . 2237--2252
Tao Zhang and
Ran Huang and
Jiawei Huang and
Shaojun Zou and
Chang Ruan and
Kai Chen and
Jianxin Wang and
Geyong Min Taming the Aggressiveness of
Heterogeneous TCP Traffic in Data Center
Networks . . . . . . . . . . . . . . . . 2253--2268
Sebastiano Miano and
Alireza Sanaee and
Fulvio Risso and
Gábor Rétvári and
Gianni Antichi Morpheus: a Run Time Compiler and
Optimizer for Software Data Planes . . . 2269--2284
Ningning Hou and
Xianjin Xia and
Yifeng Wang and
Yuanqing Zheng One Shot for All: Quick and Accurate
Data Aggregation for LPWANs . . . . . . 2285--2298
Xin Wang and
Hong Shen and
Hui Tian Scheduling Coflows in Hybrid
Optical-Circuit and Electrical-Packet
Switches With Performance Guarantee . . 2299--2314
Yutao Chen and
Anthony Ephremides Minimizing Age of Incorrect Information
Over a Channel With Random Delay . . . . 2752--2764
Bahman Abolhassani and
John Tadrous and
Atilla Eryilmaz and
Serdar Yüksel Optimal Push and Pull-Based Edge Caching
for Dynamic Content . . . . . . . . . . 2765--2777
Sheng-Hao Chiang and
Chih-Hang Wang and
De-Nian Yang and
Wanjiun Liao and
Wen-Tsuen Chen Online Multicast Traffic Engineering for
Multi-View Videos With View Synthesis in
SDN . . . . . . . . . . . . . . . . . . 2778--2793
Chen Gong and
Zhenzhe Zheng and
Yunfeng Shao and
Bingshuai Li and
Fan Wu and
Guihai Chen ODE: an Online Data Selection Framework
for Federated Learning With Limited
Storage . . . . . . . . . . . . . . . . 2794--2809
Chris Misa and
Ramakrishnan Durairajan and
Reza Rejaie and
Walter Willinger DynATOS+: a Network Telemetry System for
Dynamic Traffic and Query Workloads . . 2810--2825
Guocong Quan and
Atilla Eryilmaz and
Ness B. Shroff Optimal Edge Caching for Individualized
Demand Dynamics . . . . . . . . . . . . 2826--2841
Xiang Chen and
Hongyan Liu and
Qingjiang Xiao and
Qun Huang and
Dong Zhang and
Haifeng Zhou and
Boyang Zhou and
Chunming Wu and
Xuan Liu and
Qiang Yang Hermes: Low-Overhead Inter-Switch
Coordination in Network-Wide Data Plane
Program Deployment . . . . . . . . . . . 2842--2857
Ori Rottenstreich and
Jose Yallouz Edge-Disjoint Tree Allocation for
Multi-Tenant Cloud Security in
Datacenter Topologies . . . . . . . . . 2858--2874
Holger Boche and
Rafael F. Schaefer and
H. Vincent Poor and
Frank H. P. Fitzek On the Need of Neuromorphic Twins to
Detect Denial-of-Service Attacks on
Communication Networks . . . . . . . . . 2875--2887
Junxu Xia and
Lailong Luo and
Bowen Sun and
Geyao Cheng and
Deke Guo Parallelized In-Network Aggregation for
Failure Repair in Erasure-Coded Storage
Systems . . . . . . . . . . . . . . . . 2888--2903
Jiuwu Zhang and
Xiulong Liu and
Sheng Chen and
Xinyu Tong and
Zeyu Deng and
Tao Gu and
Keqiu Li Toward Robust RFID Localization via
Mobile Robot . . . . . . . . . . . . . . 2904--2919
Zimo Liao and
Zhicheng Luo and
Qianyi Huang and
Linfeng Zhang and
Fan Wu and
Qian Zhang and
Guihai Chen Gesture Recognition Using Visible Light
on Mobile Devices . . . . . . . . . . . 2920--2935
Haojun Huang and
Jialin Tian and
Geyong Min and
Hao Yin and
Cheng Zeng and
Yangming Zhao and
Dapeng Oliver Wu Parallel Placement of Virtualized
Network Functions via Federated Deep
Reinforcement Learning . . . . . . . . . 2936--2949
Fabricio Mazzola and
Augusto Setti and
Pedro Marcos and
Marinho Barcellos Analyzing Remote Peering Deployment and
Its Implications for Internet Routing 2950--2959
Jonatha Anselmi Asynchronous Load Balancing and
Auto-Scaling: Mean-Field Limit and
Optimal Design . . . . . . . . . . . . . 2960--2971
Chuanpu Fu and
Qi Li and
Ke Xu Flow Interaction Graph Analysis: Unknown
Encrypted Malicious Traffic Detection 2972--2987
Qi Shao and
Man Hon Cheung and
Jianwei Huang Strategic Pricing and Information
Disclosure in Crowdfunding . . . . . . . 2988--3001
Shunmin Zhu and
Jianyuan Lu and
Biao Lyu and
Tian Pan and
Shize Zhang and
Xiaoqing Sun and
Chenhao Jia and
Xin Cheng and
Daxiang Kang and
Yilong Lv and
Fukun Yang and
Xiaobo Xue and
Xihui Yang and
Zhiliang Wang and
Jiahai Yang Proactive Telemetry in Large-Scale
Multi-Tenant Cloud Overlay Networks . . 3002--3017
Minquan Cheng and
Youlong Wu and
Xianxian Li and
Dianhua Wu Asymptotically Optimal Coded Distributed
Computing via Combinatorial Designs . . 3018--3033
Jiatai Huang and
Leana Golubchik and
Longbo Huang When Lyapunov Drift Based Queue
Scheduling Meets Adversarial Bandit
Learning . . . . . . . . . . . . . . . . 3034--3044
Liang Mi and
Tingting Yuan and
Weijun Wang and
Haipeng Dai and
Lin Sun and
Jiaqi Zheng and
Guihai Chen and
Xiaoming Fu Accelerated Neural Enhancement for Video
Analytics With Video Quality Adaptation 3045--3060
Fei Wang and
Ethan Hugh and
Baochun Li More Than Enough is Too Much: Adaptive
Defenses Against Gradient Leakage in
Production Federated Learning . . . . . 3061--3075
Min-Yue Chen and
Yiwen Hu and
Guan-Hua Tu and
Chi-Yu Li and
Sihan Wang and
Jingwen Shi and
Tian Xie and
Ren-Chieh Hsu and
Li Xiao and
Chunyi Peng and
Zhaowei Tan and
Songwu Lu Taming the Insecurity of Cellular
Emergency Services (9-1-1): From
Vulnerabilities to Secure Designs . . . 3076--3091
Batool Salehi and
Utku Demir and
Debashri Roy and
Suyash Pradhan and
Jennifer Dy and
Stratis Ioannidis and
Kaushik Chowdhury Multiverse at the Edge: Interacting Real
World and Digital Twins for Wireless
Beamforming . . . . . . . . . . . . . . 3092--3110
Yang Liu and
Xi Wang and
Xiaoqi Wang and
Zhen Wang Fast Outbreak Sense and Effective Source
Inference via Minimum Observer Set . . . 3111--3125
Xiaoliang Wang and
Ke Xu and
Yangfei Guo and
Haiyang Wang and
Songtao Fu and
Qi Li and
Bin Wu and
Jianping Wu Toward Practical Inter-Domain Source
Address Validation . . . . . . . . . . . 3126--3141
Rongxin Han and
Jingyu Wang and
Qi Qi and
Dezhi Chen and
Zirui Zhuang and
Haifeng Sun and
Xiaoyuan Fu and
Jianxin Liao and
Song Guo Dynamic Network Slice for Bursty Edge
Traffic . . . . . . . . . . . . . . . . 3142--3157
Nicola Cordeschi and
Floriano De Rango and
Andrea Baiocchi Optimal Back-Off Distribution for
Maximum Weighted Throughput in CSMA . . 3158--3172
Chih-Chun Wang Optimal AoI for Systems With Queueing
Delay in Both Forward and Backward
Directions . . . . . . . . . . . . . . . 3173--3188
Jiani Liu and
Ju Ren and
Yongmin Zhang and
Sheng Yue and
Yaoxue Zhang SESAME: a Resource Expansion and Sharing
Scheme for Multiple Edge Services
Providers . . . . . . . . . . . . . . . 3189--3204