Table of contents for issues of IEEE\slash ACM Transactions on Networking

Last update: Sat Apr 21 06:06:20 MDT 2018                Valid HTML 3.2!

Volume 1, Number 1, February, 1993
Volume 1, Number 2, April, 1993
Volume 1, Number 3, June, 1993
Volume 1, Number 4, August, 1993
Volume 1, Number 5, October, 1993
Volume 1, Number 6, December, 1993
Volume 2, Number 1, February, 1994
Volume 2, Number 2, April, 1994
Volume 2, Number 3, June, 1994
Volume 2, Number 4, August, 1994
Volume 2, Number 5, October, 1994
Volume 2, Number 6, December, 1994
Volume 3, Number 1, February, 1995
Volume 3, Number 2, April, 1995
Volume 3, Number 3, June, 1995
Volume 3, Number 4, August, 1995
Volume 3, Number 5, October, 1995
Volume 3, Number 6, December, 1995
Volume 4, Number 1, February, 1996
Volume 4, Number 2, April, 1996
Volume 4, Number 3, June, 1996
Volume 4, Number 4, August, 1996
Volume 4, Number 5, October, 1996
Volume 4, Number 6, December, 1996
Volume 5, Number 1, February, 1997
Volume 5, Number 2, April, 1997
Volume 5, Number 3, June, 1997
Volume 5, Number 4, August, 1997
Volume 5, Number 5, October, 1997
Volume 5, Number 6, December, 1997
Volume 6, Number 1, February, 1998
Volume 6, Number 2, April, 1998
Volume 6, Number 3, June, 1998
Volume 6, Number 4, August, 1998
Volume 6, Number 5, October, 1998
Volume 6, Number 6, December, 1998
Volume 7, Number 1, February, 1999
Volume 7, Number 2, April, 1999
Volume 7, Number 3, June, 1999
Volume 7, Number 4, August, 1999
Volume 7, Number 5, October, 1999
Volume 7, Number 6, December, 1999
Volume 8, Number 1, February, 2000
Volume 8, Number 2, 2000
Volume 8, Number 3, 2000
Volume 8, Number 4, 2000
Volume 8, Number 5, 2000
Volume 8, Number 6, 2000
Volume 9, Number 1, 2001
Volume 9, Number 2, 2001
Volume 9, Number 3, June, 2001
Volume 9, Number 4, August, 2001
Volume 9, Number 5, October, 2001
Volume 9, Number 6, December, 2001
Volume 10, Number 1, February, 2002
Volume 10, Number 2, April, 2002
Volume 10, Number 3, June, 2002
Volume 10, Number 4, August, 2002
Volume 10, Number 5, October, 2002
Volume 10, Number 6, December, 2002
Volume 11, Number 1, February, 2003
Volume 11, Number 2, April, 2003
Volume 11, Number 3, June, 2003
Volume 11, Number 4, August, 2003
Volume 11, Number 5, October, 2003
Volume 11, Number 6, December, 2003
Volume 12, Number 1, February, 2004
Volume 12, Number 2, April, 2004
Volume 12, Number 3, June, 2004
Volume 12, Number 4, August, 2004
Volume 12, Number 5, October, 2004
Volume 12, Number 6, December, 2004
Volume 13, Number 1, February, 2005
Volume 13, Number 2, April, 2005
Volume 13, Number 3, June, 2005
Volume 13, Number 4, August, 2005
Volume 13, Number 5, October, 2005
Volume 13, Number 6, December, 2005
Volume 14, Number 1, February, 2006
Volume 14, Number 2, April, 2006
Volume 14, Number 3, 2006
Volume 14, Number SI, June, 2006
Volume 14, Number 4, August, 2006
Volume 14, Number 5, October, 2006
Volume 14, Number 6, December, 2006
Volume 15, Number 1, February, 2007
Volume 15, Number 2, April, 2007
Volume 15, Number 3, June, 2007
Volume 15, Number 4, August, 2007
Volume 15, Number 5, October, 2007
Volume 15, Number 6, December, 2007
Volume 16, Number 1, February, 2008
Volume 16, Number 2, April, 2008
Volume 16, Number 3, June, 2008
Volume 16, Number 4, August, 2008
Volume 16, Number 5, October, 2008
Volume 16, Number 6, December, 2008
Volume 17, Number 1, February, 2009
Volume 17, Number 2, April, 2009
Volume 17, Number 3, June, 2009
Volume 17, Number 4, August, 2009
Volume 17, Number 5, October, 2009
Volume 17, Number 6, December, 2009
Volume 18, Number 1, February, 2010
Volume 18, Number 2, April, 2010
Volume 18, Number 3, June, 2010
Volume 18, Number 4, August, 2010
Volume 18, Number 5, October, 2010
Volume 18, Number 6, December, 2010
Volume 19, Number 1, February, 2011
Volume 19, Number 2, April, 2011
Volume 19, Number 3, June, 2011
Volume 19, Number 4, August, 2011
Volume 19, Number 5, October, 2011
Volume 19, Number 6, December, 2011
Volume 20, Number 1, February, 2012
Volume 20, Number 2, April, 2012
Volume 20, Number 3, June, 2012
Volume 20, Number 4, August, 2012
Volume 20, Number 5, October, 2012
Volume 20, Number 6, December, 2012
Volume 21, Number 1, February, 2013
Volume 21, Number 2, April, 2013
Volume 21, Number 3, June, 2013
Volume 21, Number 4, August, 2013
Volume 21, Number 5, October, 2013
Volume 21, Number 6, December, 2013
Volume 22, Number 1, February, 2014
Volume 22, Number 2, April, 2014
Volume 22, Number 3, June, 2014
Volume 22, Number 4, August, 2014
Volume 22, Number 5, October, 2014
Volume 22, Number 6, December, 2014
Volume 23, Number 1, February, 2015
Volume 23, Number 2, April, 2015
Volume 23, Number 3, June, 2015
Volume 23, Number 4, August, 2015
Volume 23, Number 5, October, 2015
Volume 24, Number 1, February, 2016
Volume 24, Number 2, April, 2016
Volume 24, Number 3, June, 2016
Volume 24, Number 4, August, 2016
Volume 24, Number 5, October, 2016
Volume 24, Number 6, December, 2016
Volume 25, Number 1, February, 2017
Volume 25, Number 2, April, 2017
Volume 25, Number 3, June, 2017
Volume 25, Number 4, August, 2017
Volume 25, Number 5, October, 2017
Volume 25, Number 6, December, 2017
Volume 26, Number 1, February, 2018
Volume 26, Number 2, April, 2018


IEEE\slash ACM Transactions on Networking
Volume 1, Number 1, February, 1993

             Mark B. Abbott and   
              Larry L. Peterson   A language-based approach to protocol
                                  implementation . . . . . . . . . . . . . 4--19
           P. Venkat Rangan and   
             Harrick M. Vin and   
            Srinivas Ramanathan   Communication architectures and
                                  algorithms for media mixing in
                                  multimedia conferences . . . . . . . . . 20--30
               V. Ramaswami and   
               Jonathan L. Wang   Analysis of the link error monitoring
                                  protocols in the common channel
                                  signaling network  . . . . . . . . . . . 31--47
                 Clark Wang and   
                Mischa Schwartz   Fault detection with multiple observers  48--55
             Deborah Estrin and   
          Martha Steenstrup and   
                    Gene Tsudik   A protocol for route establishment and
                                  packet forwarding across multidomain
                                  Internets  . . . . . . . . . . . . . . . 56--70
            Mark W. Garrett and   
                Martin Vetterli   Joint source/channel coding of
                                  statistically multiplexed real-time
                                  services on packet networks  . . . . . . 71--80
             Pierre Humblet and   
              Amit Bhargava and   
             Michael G. Hluchyj   Ballot theorems applied to the transient
                                  analysis of nD/D/1 queues  . . . . . . . 81--95
                Oran Sharon and   
                  Adrian Segall   A simple scheme for slot reuse without
                                  latency for a dual bus configuration . . 96--104
            Shun-Ping Chung and   
               Arik Kashper and   
                  Keith W. Ross   Computing approximate blocking
                                  probabilities for large loss networks
                                  with state-dependent routing . . . . . . 105--115
          Raymond E. Miller and   
                    Sanjoy Paul   On the generation of minimal-length
                                  conformance tests for communication
                                  protocols  . . . . . . . . . . . . . . . 116--129
      J. J. Garcia-Lunes-Aceves   Loop-free routing using diffusing
                                  computations . . . . . . . . . . . . . . 130--141
              David X. Chen and   
                    Jon W. Mark   SCOQ: a fast packet switch with shared
                                  concentration and output queueing  . . . 142--151

IEEE\slash ACM Transactions on Networking
Volume 1, Number 2, April, 1993

               Wen De Zhong and   
             Jaidev Kaniyil and   
                     Y. Onozato   A copy network with shared buffers for
                                  large-scale multicast ATM switching  . . 157--165
     Subramanian Ramanathan and   
                 Errol L. Lloyd   Scheduling algorithms for multihop radio
                                  networks . . . . . . . . . . . . . . . . 166--177
         C. Murray Woodside and   
                 R. Greg Franks   Alternative software architectures for
                                  parallel protocol execution with
                                  synchronous IPC  . . . . . . . . . . . . 178--186
                 Ariel Orda and   
                Raphael Rom and   
                     Moshe Sidi   Minimum delay routing in stochastic
                                  networks . . . . . . . . . . . . . . . . 187--198
      Christos Papadopoulos and   
          Gurudatta M. Parulkar   Experimental evaluation of SUNOS IPC and
                                  TCP/IP protocol implementation . . . . . 199--216
           David M. Kristol and   
                  David Lee and   
          Arun N. Netravali and   
                Krishan Sabnani   A polynomial algorithm for gateway
                                  generation from formal specifications    217--229
               Qinglin Wang and   
                Victor S. Frost   Efficient estimation of cell blocking
                                  probability for ATM systems  . . . . . . 230--235
               Kin K. Leung and   
           Raymond W. Yeung and   
               Bhaskar Sengupta   A credit manager for traffic regulation
                                  in high-speed networks: a queueing
                                  analysis . . . . . . . . . . . . . . . . 236--245
        Srinivas Ramanathan and   
               P. Venkat Rangan   Adaptive feedback techniques for
                                  synchronized multimedia retrieval over
                                  integrated networks  . . . . . . . . . . 246--260
         Richard J. Gibbens and   
             Frank P. Kelly and   
           Stephen R. E. Turner   Dynamic routing in multiparented
                                  networks . . . . . . . . . . . . . . . . 261--270

IEEE\slash ACM Transactions on Networking
Volume 1, Number 3, June, 1993

             Mehran Bagheri and   
             Dennis T. Kong and   
            Wayne S. Holden and   
       Fernando C. Irizarry and   
               Derek D. Mahoney   An STS-N byte-interleaving
                                  multiplexer/scrambler and
                                  demultiplexer/descrambler architecture
                                  and its experimental OC-48
                                  implementation . . . . . . . . . . . . . 282--285
    Vachaspathi P. Kompella and   
         Joseph C. Pasquale and   
              George C. Polyzos   Multicast routing for multimedia
                                  communication  . . . . . . . . . . . . . 286--292
      Michael Devetsikiotis and   
              J. Keith Townsend   Statistical optimization of dynamic
                                  importance sampling parameters for
                                  efficient simulation of communication
                                  networks . . . . . . . . . . . . . . . . 293--305
               Ilan Kessler and   
                 Arvind Krishna   On the cost of fairness in ring networks 306--313
          Achille Pattavina and   
                 Giacomo Bruzzi   Analysis of input and output queueing
                                  for nonblocking ATM switches . . . . . . 314--328
           Anwar I. Elwalid and   
                  Debasis Mitra   Effective bandwidth of general Markovian
                                  traffic sources and admission control of
                                  high speed networks  . . . . . . . . . . 329--343
            Abhay K. Parekh and   
             Robert G. Gallager   A generalized processor sharing approach
                                  to flow control in integrated services
                                  networks: the single-node case . . . . . 344--357
                 Hasan Ural and   
                      Keqin Zhu   Optimal length test sequence generation
                                  using distinguishing sequences . . . . . 358--371
                Opher Yaron and   
                     Moshe Sidi   Performance and stability of
                                  communication networks via robust
                                  exponential bounds . . . . . . . . . . . 372--385
               Hosame Abu-Amara   A fast topology maintenance algorithm
                                  for high-bandwidth networks  . . . . . . 386--394

IEEE\slash ACM Transactions on Networking
Volume 1, Number 4, August, 1993

                Sally Floyd and   
                   Van Jacobson   Random early detection gateways for
                                  congestion avoidance . . . . . . . . . . 397--413
               Luping Liang and   
          Gerald W. Neufeld and   
              Samuel T. Chanson   A name model for nested group
                                  communication  . . . . . . . . . . . . . 414--423
             George Kesidis and   
               Jean Walrand and   
              Cheng-Shang Chang   Effective bandwidths for multiclass
                                  Markov fluids and other ATM sources  . . 424--428
            Craig Partridge and   
                   Stephen Pink   A faster UDP . . . . . . . . . . . . . . 429--440
           Gerard R. Pieris and   
                Galen H. Sasaki   A linear lightwave Benes network . . . . 441--445
                Paul Skelly and   
            Mischa Schwartz and   
                   Sudhir Dixit   A histogram-based model for video
                                  traffic behavior in an ATM multiplexer   446--459
        André Girard and   
                   Bernard Liau   Dimensioning of adaptively routed
                                  networks . . . . . . . . . . . . . . . . 460--468
               Israel Cidon and   
             Inder S. Gopal and   
                  Adrian Segall   Connection establishment in high-speed
                                  networks . . . . . . . . . . . . . . . . 469--481
           Giuseppe Bianchi and   
             Jonathan S. Turner   Improved queueing analysis of shared
                                  buffer switching networks  . . . . . . . 482--490
           Michael P. Rumsewicz   Analysis of the effects of SS7 message
                                  discard schemes on call completion rates
                                  during overload  . . . . . . . . . . . . 491--502

IEEE\slash ACM Transactions on Networking
Volume 1, Number 5, October, 1993

          Mohammad Ghanbari and   
              Charles J. Hughes   Packing coded video signals into ATM
                                  cells  . . . . . . . . . . . . . . . . . 505--509
                 Ariel Orda and   
                Raphael Rom and   
                  Nahum Shimkin   Competitive routing in multiuser
                                  communication networks . . . . . . . . . 510--521
                  San-qi Li and   
                 Chia-Lin Hwang   Queue response to input correlation
                                  functions: discrete spectral analysis    522--533
           M. Ajmone Marsan and   
              Andrea Bianco and   
            Emilio Leonardi and   
                     Fabio Neri   Topologies for wavelength-routing
                                  all-optical networks . . . . . . . . . . 534--546
              Steven H. Low and   
              Pravin P. Varaiya   A new approach to service provisioning
                                  in ATM networks  . . . . . . . . . . . . 547--553
   Chandramohan A. Thekkath and   
              Thu D. Nguyen and   
                 Evelyn Moy and   
             Edward D. Lazowska   Implementing network protocols at user
                                  level  . . . . . . . . . . . . . . . . . 554--565
                Paolo Coppo and   
          Matteo D'Ambrosio and   
                 Riccardo Melen   Optimal cost/performance design of ATM
                                  switches . . . . . . . . . . . . . . . . 566--575
             Randall Landry and   
            Ioannis Stavrakakis   Queueing study of a $3$-priority policy
                                  with distinct service strategies . . . . 576--589
         Deepinder P. Sidhu and   
            Howard Motteler and   
             Raghu Vallurupalli   On testing hierarchies for protocols . . 590--599
             Mark B. Abbott and   
              Larry L. Peterson   Increasing network throughput by
                                  integrating protocol layers  . . . . . . 600--610

IEEE\slash ACM Transactions on Networking
Volume 1, Number 6, December, 1993

                 Ron Cocchi and   
              Scott Shenker and   
             Deborah Estrin and   
                    Lixia Zhang   Pricing in computer networks:
                                  motivation, formulation, and example . . 614--627
            Andrea Baiocchi and   
  Nicola Bléfari-Melazzi   An error-controlled approximate analysis
                                  of a stochastic fluid flow model applied
                                  to an ATM multiplexer with heterogeneous
                                  On-Off sources . . . . . . . . . . . . . 628--637
                  Xing Chen and   
              Jeremiah F. Hayes   Access control in multicast packet
                                  switching  . . . . . . . . . . . . . . . 638--649
          Matthias Kaiserswerth   The Parallel Protocol Engine . . . . . . 650--663
          Erik A. van Doorn and   
             Frans J. M. Panken   Blocking probabilities in a loss system
                                  with arrivals in geometrically
                                  distributed batches and heterogeneous
                                  service requirements . . . . . . . . . . 664--667
                       Limin Hu   Distributed code assignments for CDMA
                                  Packet Radio Network . . . . . . . . . . 668--677
                  San-qi Li and   
                 Chia-Lin Hwang   Queue response to input correlation
                                  functions: continuous spectral analysis  678--692
           Lotfi Benmohamed and   
              Semyon M. Meerkov   Feedback control of congestion in packet
                                  switching networks: the case of a single
                                  congested node . . . . . . . . . . . . . 693--708
              Duan-Shin Lee and   
               Bhaskar Sengupta   Queueing analysis of a threshold based
                                  priority scheme for ATM networks . . . . 709--717
        Leonidas Georgiadis and   
         Roch Guérin and   
                   Israel Cidon   Throughput properties of fair policies
                                  in ring networks . . . . . . . . . . . . 718--728
                Frank Y. S. Lin   Link set sizing for networks supporting
                                  SMDS . . . . . . . . . . . . . . . . . . 729--739
         Thomas F. La Porta and   
                Mischa Schwartz   Performance analysis of MSP:
                                  feature-rich high-speed transport
                                  protocol . . . . . . . . . . . . . . . . 740--753


IEEE\slash ACM Transactions on Networking
Volume 2, Number 1, February, 1994

             Will E. Leland and   
             Murad S. Taqqu and   
           Walter Willinger and   
               Daniel V. Wilson   On the self-similar nature of Ethernet
                                  traffic (extended version) . . . . . . . 1--15
                  A. J. McAuley   Weighted sum codes for error detection
                                  and their comparison with existing codes 16--22
            Imrich Chlamtac and   
    András Faragó   Making transmission schedules immune to
                                  topology changes in multi-hop packet
                                  radio networks . . . . . . . . . . . . . 23--29
               Zsehong Tsai and   
               Wen-der Wang and   
            Chien-Hwa Chiou and   
               Jin-Fu Chang and   
                Lung-Sing Liang   Performance analysis of two echo control
                                  designs in ATM networks  . . . . . . . . 30--39
                    Tsong-Ho Wu   A passive protected self-healing mesh
                                  network architecture and applications    40--52
             Hong-Dah Sheng and   
                      San-Qi Li   Spectral analysis of packet loss rate at
                                  a statistical multiplexer for multimedia
                                  services . . . . . . . . . . . . . . . . 53--65
                 Gerard Tel and   
             Ephraim Korach and   
                    Shmuel Zaks   Synchronizing ABD networks . . . . . . . 66--69
         Kumar N. Sivarajan and   
                Rajiv Ramaswami   Lightwave networks based on de Bruijn
                                  graphs . . . . . . . . . . . . . . . . . 70--79
            Jane M. Simmons and   
             Robert G. Gallager   Design of error detection scheme for
                                  class C service in ATM . . . . . . . . . 80--88
                Oran Sharon and   
                  Adrian Segall   On the efficiency of slot reuse in the
                                  Dual Bus configuration . . . . . . . . . 89--100

IEEE\slash ACM Transactions on Networking
Volume 2, Number 2, April, 1994

           Gerard R. Pieris and   
                Galen H. Sasaki   Scheduling transmissions in WDM
                                  broadcast-and-select networks  . . . . . 105--110
              Julio Escobar and   
            Craig Partridge and   
                  Debra Deutsch   Flow synchronization protocol  . . . . . 111--121
                Sally Floyd and   
                   Van Jacobson   The synchronization of periodic routing
                                  messages . . . . . . . . . . . . . . . . 122--136
            Abhay K. Parekh and   
            Robert G. Gallagher   A generalized processor sharing approach
                                  to flow control in integrated services
                                  networks: the multiple node case . . . . 137--150
        Marco Ajmone Marsan and   
              Andrea Bianco and   
            Luigi Ciminiera and   
             Riccardo Sisto and   
              Adriano Valenzano   A LOTOS extension for the performance
                                  analysis of distributed systems  . . . . 151--165
             Chung-Ju Chang and   
              Tian-Tsair Su and   
              Yueh-Yiing Chiang   Analysis of a cutoff priority cellular
                                  radio system with finite queueing and
                                  reneging/dropping  . . . . . . . . . . . 166--175
         David M. Lucantoni and   
            Marcel F. Neuts and   
                 Amy R. Reibman   Methods for performance evaluation of
                                  VBR video traffic models . . . . . . . . 176--180
         Daniel S. Omundsen and   
              A. Roger Kaye and   
                Samy A. Mahmoud   A pipelined, multiprocessor architecture
                                  for a connectionless server for
                                  broadband ISDN . . . . . . . . . . . . . 181--192
             George W. Hart and   
               Samir G. Kelekar   Automated repair of complex systems by
                                  fault compensation . . . . . . . . . . . 193--205
                  Seung Ho Hong   Approximate analysis of timer-controlled
                                  priority scheme in the single-service
                                  token-passing systems  . . . . . . . . . 206--215

IEEE\slash ACM Transactions on Networking
Volume 2, Number 3, June, 1994

                  Aura Ganz and   
                    Xudong Wang   Efficient algorithm for virtual topology
                                  design in multihop lightwave networks    217--225
                Inder Gopal and   
             Roch Guérin   Network transparency: the plaNET
                                  approach . . . . . . . . . . . . . . . . 226--239
               Israel Cidon and   
         Roch Guérin and   
                   Asad Khamisy   On protective buffer policies  . . . . . 240--246
            Piera Barcaccia and   
         Maurizio A. Bonuccelli   Polynomial time optimal algorithms for
                                  time slot assignment of variable
                                  bandwidth systems  . . . . . . . . . . . 247--251
   Dragomir D. Dimitrijevic and   
             Basil Maglaris and   
             Robert R. Boorstyn   Routing in multidomain networks  . . . . 252--262
                   Reuven Cohen   ``Session swapping'': a new approach for
                                  optimal bandwidth sharing of ring
                                  circuit switched channels  . . . . . . . 263--268
                Oran Sharon and   
                  Adrian Segall   Schemes for slot reuse in CRMA . . . . . 269--278
                Terence D. Todd   The token grid network . . . . . . . . . 279--287
                Jae W. Byun and   
                    Tony T. Lee   The design and analysis of an ATM
                                  multicast switch with adaptive traffic
                                  controller . . . . . . . . . . . . . . . 288--298
    Emmanouel A. Varvarigos and   
           Dimitri P. Bertsekas   Performance of hypercube routing schemes
                                  with or without buffering  . . . . . . . 299--311

IEEE\slash ACM Transactions on Networking
Volume 2, Number 4, August, 1994

                    Vern Paxson   Empirically derived analytic models of
                                  wide-area TCP connections  . . . . . . . 316--336
                   Allen R. and   
                J. r. Bonde and   
                    Sumit Ghosh   A comparative study of fuzzy versus
                                  ``fixed'' thresholds for robust queue
                                  management in cell-switching networks    337--344
               Philip P. To and   
           Tak-Shing P. Yum and   
                 Yiu-Wing Leung   Multistar implementation of expandable
                                  shufflenets  . . . . . . . . . . . . . . 345--351
         Martina Zitterbart and   
           Ahmed N. Tantawy and   
          Dimitrios N. Serpanos   A high performance transparent bridge    352--362
                Jon M. Peha and   
                Fouad A. Tobagi   Analyzing the fault tolerance of
                                  double-loop networks . . . . . . . . . . 363--373
         Leandros Tassiulas and   
             Yao Chung Hung and   
            Shivendra S. Panwar   Optimal buffer control during congestion
                                  in an ATM network node . . . . . . . . . 374--386
        Catherine Rosenberg and   
               Bruno Laguë   A heuristic framework for source
                                  policing in ATM networks . . . . . . . . 387--397
           Stefano Gianatti and   
              Achille Pattavina   Performance analysis of ATM Banyan
                                  networks with shared queueing --- part
                                  I: random offered traffic  . . . . . . . 398--410
          Achille Pattavina and   
               Stefano Gianatti   Performance analysis of ATM Banyan
                                  networks with shared queueing --- part
                                  II: correlated/unbalanced offered
                                  traffic  . . . . . . . . . . . . . . . . 411--424

IEEE\slash ACM Transactions on Networking
Volume 2, Number 5, October, 1994

        Michael F. Schwartz and   
                      Calton Pu   Applying an information gathering
                                  architecture to Netfind: a white pages
                                  tool for a changing and growing Internet 426--439
               Paul D. Amer and   
         Christophe Chassot and   
         Thomas J. Connolly and   
                Michel Diaz and   
                 Phillip Conrad   Partial-order transport service for
                                  multimedia and other applications  . . . 440--456
          Raymond E. Miller and   
                    Sanjoy Paul   Structural analysis of protocol
                                  specifications and generation of maximal
                                  fault coverage conformance test
                                  sequences  . . . . . . . . . . . . . . . 457--470
         Richard O. LaMaire and   
          Dimitrios N. Serpanos   Two-dimensional round-robin schedulers
                                  for packet switches with multiple input
                                  queues . . . . . . . . . . . . . . . . . 471--482
           Gilbert M. Lundy and   
               H. Alphan Tipici   Specification and analysis of the SNR
                                  high-speed transport protocol  . . . . . 483--496
             Tsern-Huei Lee and   
                   Jin-Jye Chou   Diagnosis of single faults in bitonic
                                  sorters  . . . . . . . . . . . . . . . . 497--507
          Mohamed Abdelaziz and   
            Ioannis Stavrakakis   Some optimal traffic regulation schemes
                                  for ATM networks: a Markov decision
                                  approach . . . . . . . . . . . . . . . . 508--519
        Dimitris Logothetis and   
              Kishor S. Trivedi   Reliability analysis of the double
                                  counter-rotating ring with concentrator
                                  attachments  . . . . . . . . . . . . . . 520--532
           James V. Luciani and   
               C. Y. Roger Chen   An analytical model for partially
                                  blocking finite-buffered switching
                                  networks . . . . . . . . . . . . . . . . 533--540
               Reuven Cohen and   
                     Yoram Ofek   Self-termination mechanism for label
                                  swapping routing . . . . . . . . . . . . 541--545

IEEE\slash ACM Transactions on Networking
Volume 2, Number 6, December, 1994

             Yiu-Wing Leung and   
                  Tak-Shing Yum   A modular multirate video distribution
                                  system: design and dimensioning  . . . . 549--557
              Debasis Mitra and   
               John A. Morrison   Erlang capacity and uniform
                                  approximations for shared unbuffered
                                  resources  . . . . . . . . . . . . . . . 558--570
                   Hyong S. Kim   Design and performance of Multinet
                                  switch: a multistage ATM switch
                                  architecture with partially shared
                                  buffers  . . . . . . . . . . . . . . . . 571--580
            Imrich Chlamtac and   
András Faragó and   
                      Tao Zhang   Optimizing the system of virtual paths   581--587
           Chun-Chong Huang and   
            Alberto Leon-Garcia   Separation principle of dynamic
                                  transmission and enqueueing priorities
                                  for real- and nonreal-time traffic in
                                  ATM multiplexers . . . . . . . . . . . . 588--601
                  Jacob Sharony   The universality of multidimensional
                                  switching networks . . . . . . . . . . . 602--612


IEEE\slash ACM Transactions on Networking
Volume 3, Number 1, February, 1995

       Michael P. Rumsewicz and   
                Donald E. Smith   A comparison of SS7 congestion control
                                  options during mass call-in situations   1--9
                  San-Qi Li and   
                 Song Chong and   
                 Chia-Lin Hwang   Link capacity allocation and network
                                  control by filtered input rate in
                                  high-speed networks  . . . . . . . . . . 10--25
              Wei-Tsong Lee and   
                 Ling-Yang Kung   Binary addressing and routing schemes in
                                  the Manhattan street network . . . . . . 26--30
                   Ray Bird and   
                Inder Gopal and   
              Amir Herzberg and   
                Phil Janson and   
                Shay Kutten and   
                Refik Molva and   
                      Moti Yung   The KryptoKnight family of light-weight
                                  protocols for authentication and key
                                  distribution . . . . . . . . . . . . . . 31--41
                   Judah Levine   An algorithm to synchronize the time of
                                  a computer to universal time . . . . . . 42--50
           Thomas Gutekunst and   
               Daniel Bauer and   
            Germano Caronni and   
          Bernhard Plattner and   
                          Hasan   A distributed and policy-free
                                  general-purpose shared window system . . 51--62
                 P. C. Wong and   
                    M. S. Yeung   Design and analysis of a novel fast
                                  packet switch: pipeline Banyan . . . . . 63--69
              Jeong Gyu Lee and   
                  Byeong Gi Lee   A new distribution network based on
                                  controlled switching elements and its
                                  applications . . . . . . . . . . . . . . 70--81
                   Zhen Liu and   
                    Don Towsley   Burst reduction properties of
                                  rate-control throttles: downstream queue
                                  behavior . . . . . . . . . . . . . . . . 82--90
           Christopher Ward and   
             Cheong H. Choi and   
                 Thomas F. Hain   A data link control protocol for LEO
                                  satellite networks providing a reliable
                                  datagram service . . . . . . . . . . . . 91--103

IEEE\slash ACM Transactions on Networking
Volume 3, Number 2, April, 1995

                    Paul Barker   An analysis of user input to an X.500
                                  white pages directory service  . . . . . 112--125
           H. Jonathan Chao and   
               Byeong-Seog Choe   Design and analysis of a large-scale
                                  multicast output buffered ATM switch . . 126--138
               Hyong W. Lee and   
                    Jon W. Mark   Capacity allocation in statistical
                                  multiplexing of ATM sources  . . . . . . 139--151
              Wen-Huei Chen and   
                     Hasan Ural   Synchronizable test sequences based on
                                  multiple UIO sequences . . . . . . . . . 152--157
            David A. Levine and   
                Ian F. Akyildiz   PROTON: a media access control protocol
                                  for optical networks with star topology  158--168
                 Yoram Ofek and   
                      Moti Yung   METANET: principles of an arbitrary
                                  topology LAN . . . . . . . . . . . . . . 169--180
                  P. S. Min and   
                   H. Saidi and   
                    M. V. Hegde   A nonblocking architecture for broadband
                                  multichannel switching . . . . . . . . . 181--198
               Myung J. Lee and   
                   David S. Ahn   Cell loss analysis and design trade-offs
                                  of nonblocking ATM switches with
                                  nonuniform traffic . . . . . . . . . . . 199--210
          George N. Rouskas and   
               Mostafa H. Ammar   Analysis and optimization of
                                  transmission schedules for single-hop
                                  WDM networks . . . . . . . . . . . . . . 211--221
                 Peter Farka\us   Comments on ``Weighted sum codes for
                                  error detection and their comparison
                                  with existing codes''  . . . . . . . . . 222--223

IEEE\slash ACM Transactions on Networking
Volume 3, Number 3, June, 1995

                Vern Paxson and   
                    Sally Floyd   Wide area traffic: the failure of
                                  Poisson modeling . . . . . . . . . . . . 226--244
                 David L. Mills   Improved algorithms for synchronizing
                                  computer network clocks  . . . . . . . . 245--254
           A. Udaya Shankar and   
                      David Lee   Minimum-latency transport protocols with
                                  modulo-$N$ . . . . . . . . . . . . . . . 255--268
           Rajesh K. Pankaj and   
             Robert G. Gallager   Wavelength requirements of all-optical
                                  networks . . . . . . . . . . . . . . . . 269--280
            Zhensheng Zhang and   
            Anthony S. Acampora   A heuristic wavelength assignment
                                  algorithm for multihop WDM networks with
                                  wavelength routing and wavelength re-use 281--288
                   H. Saidi and   
                  P. S. Min and   
                    M. V. Hegde   A new structural property of statistical
                                  data forks . . . . . . . . . . . . . . . 289--298
                 Xi-Ren Cao and   
                    Don Towsley   A performance model for ATM switches
                                  with general packet length distributions 299--309
                 David McMillan   Delay analysis of a cellular mobile
                                  priority queueing system . . . . . . . . 310--319
               Reuven Cohen and   
                 Yoram Ofek and   
                  Adrian Segall   A new label-based source routing for
                                  multi-ring networks  . . . . . . . . . . 320--328
             Amy R. Reibman and   
               Arthur W. Berger   Traffic descriptors for VBR video
                                  teleconferencing over ATM networks . . . 329--339
            Moncef Hamdaoui and   
        Parameswaran Ramanathan   Selection of timed token protocol
                                  parameters to guarantee message
                                  deadlines  . . . . . . . . . . . . . . . 340--351
               Chin-Tau Lea and   
                 Anwar Alyatama   Bandwidth quantization and states
                                  reduction in the broadband ISDN  . . . . 352--360

IEEE\slash ACM Transactions on Networking
Volume 3, Number 4, August, 1995

                Sally Floyd and   
                   Van Jacobson   Link-sharing and resource management
                                  models for packet networks . . . . . . . 365--386
             Ellen Witte Zegura   Evaluating blocking probability in
                                  generalized connectors . . . . . . . . . 387--398
        Norival R. Figueira and   
                Joseph Pasquale   An upper bound on delay for the
                                  VirtualClock service discipline  . . . . 399--408
          Kjersti Moldeklev and   
                Per Gunningberg   How a large ATM MTU causes deadlocks in
                                  TCP data transfers . . . . . . . . . . . 409--422
      Takis Konstantopoulos and   
              Venkat Anantharam   Optimal flow control schemes that
                                  regulate the burstiness of traffic . . . 423--432
             Guang-Liang Li and   
                Patrick W. Dowd   An analysis of network performance
                                  degradation induced by workload
                                  fluctuations . . . . . . . . . . . . . . 433--440
           Alan A. Bertossi and   
         Maurizio A. Bonuccelli   Code assignment for hidden terminal
                                  interference avoidance in multihop
                                  packet radio networks  . . . . . . . . . 441--449
             Kyeong Soo Kim and   
                  Byeong Gi Lee   Three-level traffic shaper and its
                                  application to source clock frequency
                                  recovery for VBR services in ATM
                                  networks . . . . . . . . . . . . . . . . 450--458
               Krishna Bala and   
            Thomas E. Stern and   
          David Simchi-Levi and   
                    Kavita Bala   Routing in a linear lightwave network    459--469
                Jason Iness and   
           Subrata Banerjee and   
            Biswanath Mukherjee   GEMNET: a generalized,
                                  shuffle-exchange-based, regular,
                                  scalable, modular, multihop, WDM
                                  lightwave network  . . . . . . . . . . . 470--476
                Feiling Jia and   
        Biswanath Mukherjee and   
                    Jason Iness   Scheduling variable-length messages in a
                                  single-hop multichannel local lightwave
                                  network  . . . . . . . . . . . . . . . . 477--488

IEEE\slash ACM Transactions on Networking
Volume 3, Number 5, October, 1995

            Rajiv Ramaswami and   
             Kumar N. Sivarajan   Routing and wavelength assignment in
                                  all-optical networks . . . . . . . . . . 489--500
                 Amit Gupta and   
               Domenico Ferrari   Resource partitioning for real-time
                                  communication  . . . . . . . . . . . . . 501--508
           Joseph Bannister and   
         Flaminio Borgonovo and   
               Luigi Fratta and   
                    Mario Gerla   A performance model of deflection
                                  routing in multibuffer networks with
                                  nonuniform traffic . . . . . . . . . . . 509--520
              Arif Merchant and   
               Bhaskar Sengupta   Assignment of cells to switches in PCS
                                  networks . . . . . . . . . . . . . . . . 521--526
           Krishnan Padmanabhan   An efficient architecture for
                                  fault-tolerant ATM switches  . . . . . . 527--537
                Donald E. Smith   Ensuring robust call throughput and
                                  fairness for SCP overload controls . . . 538--548
               Ming H. Chan and   
                John P. Princen   Prioritized statistical multiplexing of
                                  PCM sources  . . . . . . . . . . . . . . 549--559
  Edmundo de Souza e. Silva and   
            H. Richard Gail and   
               Richard R. Muntz   Polling systems with server timeouts and
                                  their application to token passing
                                  networks . . . . . . . . . . . . . . . . 560--575
         Leandros Tassiulas and   
                    Jinoo Joung   Performance measures and scheduling
                                  policies in ring networks  . . . . . . . 576--584
         Gagan L. Choudhury and   
               Kin K. Leung and   
                     Ward Whitt   An inversion algorithm to compute
                                  blocking probabilities in loss networks
                                  with state-dependent rates . . . . . . . 585--601
               Sem C. Borst and   
              Onno J. Boxma and   
                    Hanoch Levy   The use of service limits for efficient
                                  operation of multistation single-medium
                                  communication systems  . . . . . . . . . 602--612
             Whay Chiou Lee and   
              Pierre A. Humblet   Space-time characteristics of ALOHA
                                  protocols in high-speed bidirectional
                                  bus networks . . . . . . . . . . . . . . 613--622

IEEE\slash ACM Transactions on Networking
Volume 3, Number 6, December, 1995

             Ren-Hung Hwang and   
            James F. Kurose and   
                    Don Towsley   On-call processing delay in high speed
                                  networks . . . . . . . . . . . . . . . . 628--639
             David C. Feldmeier   Fast software implementation of error
                                  detection codes  . . . . . . . . . . . . 640--651
           H. Jonathan Chao and   
                    Necdet Uzun   An ATM queue manager handling multiple
                                  delay and loss priorities  . . . . . . . 652--659
               Guo-Liang Wu and   
                    Jon W. Mark   A buffer allocation scheme for ATM
                                  networks: complete sharing based on
                                  virtual partition  . . . . . . . . . . . 660--670
             Hemant Kanakia and   
           Partho P. Mishra and   
                 Amy R. Reibman   An adaptive congestion control scheme
                                  for real time packet video transport . . 671--682
            Geoffrey G. Xie and   
                   Simon S. Lam   Delay guarantee of virtual clock server  683--689
                 Jianxu Shi and   
                John P. Fonseka   Hierarchical self-healing rings  . . . . 690--697
            Upamanyu Madhow and   
           Michael L. Honig and   
              Kenneth Steiglitz   Optimization of wireless resources for
                                  personal communications mobility
                                  tracking . . . . . . . . . . . . . . . . 698--707
           C. Y. Roger Chen and   
           Shuo-Hsien Hsiao and   
          Abdulaziz S. Almazyad   A new model for the performance
                                  evaluation of synchronous circuit
                                  switched multistage interconnection
                                  networks . . . . . . . . . . . . . . . . 708--715
               Dipak Ghosal and   
             T. V. Lakshman and   
                   Yennun Huang   Parallel architectures for processing
                                  high speed network signaling protocols   716--728
               Sijing Zhang and   
                     Alan Burns   An optimal synchronous bandwidth
                                  allocation scheme for guaranteeing
                                  synchronous message deadlines with the
                                  timed-token MAC protocol . . . . . . . . 729--741
            Dong Guen Jeong and   
              Chong-Ho Choi and   
                  Wha Sook Jeon   Design and performance evaluation of a
                                  new medium access control protocol for
                                  local wireless data communications . . . 742--752
              Irene Katzela and   
                Mischa Schwartz   Schemes for fault identification in
                                  communication networks . . . . . . . . . 753--764
         Gregory P. Pollini and   
    Kathleen S. Meier-Hellstern   Efficient routing of information between
                                  interconnected cellular mobile switching
                                  centers  . . . . . . . . . . . . . . . . 765--774
              Meir Herzberg and   
             Stephen J. Bye and   
                  Anthony Utano   The hop-limit approach for
                                  spare-capacity assignment in survivable
                                  networks . . . . . . . . . . . . . . . . 775--784
               Ikhlaq Sidhu and   
                   Scott Jordan   Multiplexing gains in bit stream
                                  multiplexors . . . . . . . . . . . . . . 785--797
            Donald E. Smith and   
               H. Jonathan Chao   Sizing a packet reassembly buffer at a
                                  host computer in an ATM network  . . . . 798--808
                       D. Medhi   Multi-hour, multi-traffic class network
                                  design for virtual path-based
                                  dynamically reconfigurable wide-area ATM
                                  networks . . . . . . . . . . . . . . . . 809--818
               Scott J. Shenker   Making greed work in networks: a
                                  game-theoretic analysis of switch
                                  service disciplines  . . . . . . . . . . 819--831
          Matteo D'Ambrosio and   
                 Riccardo Melen   Evaluating the limit behavior of the ATM
                                  traffic within a network . . . . . . . . 832--841
                Izhak Rubin and   
           James Chien-Hsing Wu   Analysis of an M/G/1/N queue with
                                  vacations and its iterative application
                                  to FDDI timed-token rings  . . . . . . . 842--856
                Paul S. Min and   
         Manjunath V. Hegde and   
              Hossein Saidi and   
                   Alex Chandra   Nonblocking copy networks in
                                  multi-channel switching  . . . . . . . . 857--871
           C. Y. Roger Chen and   
         Georges A. Makhoul and   
          Dikran S. Meliksetian   A queueing analysis of the performance
                                  of DQDB  . . . . . . . . . . . . . . . . 872--881


IEEE\slash ACM Transactions on Networking
Volume 4, Number 1, February, 1996

            Anindo Banerjea and   
           Domenico Ferrari and   
               Bruce A. Mah and   
                 Mark Moran and   
            Dinesh C. Verma and   
                      Hui Zhang   The Tenet real-time protocol suite:
                                  design, implementation, and experiences  1--10
                 R. L. Cruz and   
                Jung-Tsung Tsai   COD: alternative architectures for high
                                  speed packet switching . . . . . . . . . 11--21
          Kazutaka Murakami and   
                   Hyong S. Kim   Virtual path routing for survivable ATM
                                  networks . . . . . . . . . . . . . . . . 22--39
           Daniel P. Heyman and   
                 T. V. Lakshman   Source models for VBR broadcast-video
                                  traffic  . . . . . . . . . . . . . . . . 40--48
               Anthony Hung and   
                 George Kesidis   Bandwidth scheduling for wide-area ATM
                                  networks using virtual finishing times   49--54
                Stefan Leue and   
           Philippe A. Oechslin   On parallelizing and optimizing the
                                  implementation of communication
                                  protocols  . . . . . . . . . . . . . . . 55--70
                 Dan Picker and   
          Ronald D. Fellman and   
                   Paul M. Chau   An extension to the SCI flow control
                                  protocol for increased network
                                  efficiency . . . . . . . . . . . . . . . 71--85
        Willibald Doeringer and   
        Günter Karjoth and   
                  Mehdi Nassehi   Routing on longest-matching prefixes . . 86--97
           Daniel Chonghwan Lee   Worst-case fraction of CBR teletraffic
                                  unpunctual due to statistical
                                  multiplexing . . . . . . . . . . . . . . 98--105
             David M. Koppelman   Congested Banyan network analysis using
                                  congested-queue states and
                                  neighboring-queue effects  . . . . . . . 106--111
                    Zvi Rosberg   Cell multiplexing in ATM networks  . . . 112--122
            Zbigniew Dziong and   
                 Lorne G. Mason   Fair-efficient call admission control
                                  policies for broadband networks --- a
                                  game theoretic framework . . . . . . . . 123--136

IEEE\slash ACM Transactions on Networking
Volume 4, Number 2, April, 1996

    Girish P. Chandranmenon and   
                George Varghese   Trading packet headers for packet
                                  processing . . . . . . . . . . . . . . . 141--152
            Stephen Deering and   
          Deborah L. Estrin and   
             Dino Farinacci and   
               Van Jacobson and   
             Ching-Gung Liu and   
                     Liming Wei   The PIM architecture for wide-area
                                  multicast routing  . . . . . . . . . . . 153--162
                  Hua Jiang and   
           Stephen S. Rappaport   Prioritized channel borrowing without
                                  locking: a channel sharing strategy for
                                  cellular communications  . . . . . . . . 163--172
       Panagiotis N. Zarros and   
               Myung J. Lee and   
               Tarek N. Saadawi   Interparticipant synchronization in
                                  real-time multimedia conferencing using
                                  feedback . . . . . . . . . . . . . . . . 173--180
                 Fred Bauer and   
                   Anujan Varma   Distributed algorithms for multicast
                                  path setup in data networks  . . . . . . 181--191
                   Hong Liu and   
              Raymond E. Miller   Generalized fair reachability analysis
                                  for cyclic protocols . . . . . . . . . . 192--204
         Leandros Tassiulas and   
            Leonidas Georgiadis   Any work-conserving policy stabilizes
                                  the ring with spatial re-use . . . . . . 205--208
            Ashok Erramilli and   
            Onuttom Narayan and   
               Walter Willinger   Experimental queueing analysis with
                                  long-range dependent packet traffic  . . 209--223
       Partho Pratim Mishra and   
             Hemant Kanakia and   
             Satish K. Tripathi   On hop-by-hop rate-based congestion
                                  control  . . . . . . . . . . . . . . . . 224--239
                 Hongbo Zho and   
                Victor S. Frost   In-service monitoring for cell loss
                                  quality of service violations in ATM
                                  networks . . . . . . . . . . . . . . . . 240--248
         Dominique Ga\"\iti and   
                    Guy Pujolle   Performance management issues in ATM
                                  networks: traffic and congestion control 249--257
           Lillykutty Jacob and   
                   Anurag Kumar   Delay performance of some scheduling
                                  strategies in an input queuing ATM
                                  switch with multiclass bursty traffic    258--271
      Andrea E. F. Clementi and   
                Miriam Di Ianni   On the hardness of approximating optimum
                                  schedule problems in store and forward
                                  networks . . . . . . . . . . . . . . . . 272--280
      Fotios K. Liotopoulos and   
               Suresh Chalasani   Semi-rearrangeably nonblocking operation
                                  of Clos networks in the multirate
                                  environment  . . . . . . . . . . . . . . 281--291
               Eitan Altman and   
                  Daniel Kofman   Bounds for performance measures of token
                                  rings  . . . . . . . . . . . . . . . . . 292--299

IEEE\slash ACM Transactions on Networking
Volume 4, Number 3, June, 1996

           Daniel P. Heyman and   
                 T. V. Lakshman   What are the implications of long-range
                                  dependence for VBR-video traffic
                                  engineering? . . . . . . . . . . . . . . 301--317
              Torsten Braun and   
                Christophe Diot   Performance evaluation and cache
                                  analysis of an ILP protocol
                                  implementation . . . . . . . . . . . . . 318--330
              Mete Kabatepe and   
             Kenneth S. Vastola   The fair distributed queue (FDQ)
                                  protocol for high-speed
                                  metropolitan-area networks . . . . . . . 331--339
           Thierry Turletti and   
              Christian Huitema   Videoconferencing on the Internet  . . . 340--351
            Dallas E. Wrege and   
         Edward W. Knightly and   
                  Hui Zhang and   
            Jörg Liebeherr   Deterministic delay bounds for VBR video
                                  in packet-switching networks:
                                  fundamental limits and practical
                                  trade-offs . . . . . . . . . . . . . . . 352--362
               Reuven Cohen and   
             Baiju V. Patel and   
              Frank Schaffa and   
          Marc Willebeek-LeMair   The sink tree paradigm: connectionless
                                  traffic support on ATM LAN's . . . . . . 363--374
               M. Shreedhar and   
                George Varghese   Efficient fair queueing using deficit
                                  round-robin  . . . . . . . . . . . . . . 375--385
               Guo-Liang Wu and   
                    Jon W. Mark   Computational methods for performance
                                  evaluation of a statistical multiplexer
                                  supporting bursty traffic  . . . . . . . 386--397
             Leandros Tassiulas   Push forward link-level scheduling for
                                  network-wide performance . . . . . . . . 398--406
  Georgios I. Papadimitriou and   
           Dimitris G. Maritsas   Learning automata-based receiver
                                  conflict avoidance algorithms for WDM
                                  broadcast-and-select star networks . . . 407--412
              Sassan Pejhan and   
            Mischa Schwartz and   
           Dimitris Anastassiou   Error control using retransmission
                                  schemes in multicast transport protocols
                                  for real-time media  . . . . . . . . . . 413--427
              Manjari Asawa and   
                 Wayne E. Stark   Optimal scheduling of handoffs in
                                  cellular networks  . . . . . . . . . . . 428--441
               Yitzhak Birk and   
                     Noam Bloch   The effects of destructive interference
                                  and wasted transmissions on the
                                  uniform-traffic capacity of
                                  non-bus-oriented single-hop
                                  interconnections . . . . . . . . . . . . 442--448
           Vincenzo Catania and   
            Giuseppe Ficili and   
             Sergio Palazzo and   
                  Daniela Panno   A comparative analysis of fuzzy versus
                                  conventional policing mechanisms for ATM
                                  networks . . . . . . . . . . . . . . . . 449--459
            Ray-Guang Cheng and   
                 Chung-Ju Chang   Design of a fuzzy traffic controller for
                                  ATM networks . . . . . . . . . . . . . . 460--469
              Jacek \'Swiderski   Approximate performance analysis of
                                  real-time traffic over heavily loaded
                                  networks with timed token protocols  . . 470--478

IEEE\slash ACM Transactions on Networking
Volume 4, Number 4, August, 1996

        Leonidas Georgiadis and   
         Roch Guérin and   
                Vinod Peris and   
             Kumar N. Sivarajan   Efficient network QoS provisioning based
                                  on per node traffic shaping  . . . . . . 482--501
                   R. Ahuja and   
                  S. Keshav and   
                       H. Saran   Design, implementation, and performance
                                  measurement of a native-mode ATM
                                  transport layer (extended version) . . . 502--515
            James D. Salehi and   
            James F. Kurose and   
                    Don Towsley   The effectiveness of affinity-based
                                  scheduling in multiprocessor network
                                  protocol processing (extended version)   516--530
              Debasis Mitra and   
           John A. Morrison and   
             K. G. Ramakrishnan   ATM network design and optimization: a
                                  multirate loss network framework . . . . 531--543
         Suresh Subramaniam and   
           Murat Azizo\uglu and   
                 Arun K. Somani   All-optical networks with sparse
                                  wavelength conversion  . . . . . . . . . 544--557
                  S. Ramanathan   Multicast tree generation in networks
                                  with asymmetric links  . . . . . . . . . 558--568
                Anna Charny and   
         K. K. Ramakrishnan and   
                  Anthony Lauck   Time scale analysis scalability issues
                                  for explicit rate allocation in ATM
                                  networks . . . . . . . . . . . . . . . . 569--581
              Israel Zibman and   
                 Carl Woolf and   
             Peter O'Reilly and   
           Larry Strickland and   
               David Willis and   
                    John Visser   An architectural approach to minimizing
                                  feature interactions in
                                  telecommunications . . . . . . . . . . . 582--596
              William S. Marcus   An architecture for QoS analysis and
                                  experimentation  . . . . . . . . . . . . 597--603
             Peter J. Smith and   
                  Mansoor Shafi   The impact of G.826 on the performance
                                  of transport systems . . . . . . . . . . 604--614
      Pratyush Moghé and   
                    Izhak Rubin   Enhanced call: a paradigm for
                                  applications with dynamic
                                  client-membership and client-level
                                  binding in ATM networks  . . . . . . . . 615--628
            Ian F. Akyildiz and   
            Joseph S. M. Ho and   
                    Yi-Bing Lin   Movement-based location update and
                                  selective paging for PCS networks  . . . 629--638
              Eytan Modiano and   
             Anthony Ephremides   Efficient algorithms for performing
                                  packet broadcasts in a mesh network  . . 639--648
                Izhak Rubin and   
                     Ho-Ting Wu   Performance analysis and design of CQBT
                                  algorithm for a ring network with
                                  spatial reuse  . . . . . . . . . . . . . 649--659
András L. Oláh and   
     Sonia M. Heemstra de Groot   Comments on ``Minimum-latency transport
                                  protocols with modulo-$N$''  . . . . . . 660--666

IEEE\slash ACM Transactions on Networking
Volume 4, Number 5, October, 1996

               Fengmin Gong and   
          Gurudatta M. Parulkar   An application-oriented error control
                                  scheme for high-speed networks . . . . . 669--683
        Biswanath Mukherjee and   
         Dhritiman Banerjee and   
              S. Ramamurthy and   
             Amarnath Mukherjee   Some principles for designing a
                                  wide-area WDM optical network  . . . . . 684--696
               Simon S. Lam and   
                 Simon Chow and   
                David K. Y. Yau   A lossless smoothing algorithm for
                                  compressed video . . . . . . . . . . . . 697--708
            Joseph S. M. Ho and   
                Ian F. Akyildiz   Local anchor scheme for reducing
                                  signaling costs in personal
                                  communications networks  . . . . . . . . 709--725
             Alberto Bononi and   
                Paul R. Prucnal   Analytical evaluation of improved access
                                  techniques in deflection routing
                                  networks . . . . . . . . . . . . . . . . 726--730
         Kenneth J. Schultz and   
                 P. Glenn Gulak   Multicast contention resolution with
                                  single-cycle windowing using content
                                  addressable FIFO's . . . . . . . . . . . 731--742
               Jong Suk Ahn and   
                Peter B. Danzig   Packet network simulation: speedup and
                                  accuracy versus timing granularity . . . 743--757
             Tsern-Huei Lee and   
               Kuen-Chu Lai and   
                Shii-Tyng Duann   Design of a real-time call admission
                                  controller for ATM networks  . . . . . . 758--765
              Reuven Elbaum and   
                     Moshe Sidi   Topological design of local-area
                                  networks using genetic algorithms  . . . 766--778
         Bhagirath Narahari and   
               Sunil Shende and   
                    Rahul Simha   Efficient algorithms for erasure node
                                  placement on slotted dual bus networks   779--784
             Anjali Agarwal and   
              J. William Atwood   A unified approach to fault-tolerance in
                                  communication protocols based on
                                  recovery procedures  . . . . . . . . . . 785--795
               Cesar Vargas and   
         Manjunath V. Hegde and   
       Morteza Naraghi-Pour and   
                    Paul S. Min   Shadow prices for LLR and ALBA . . . . . 796--807

IEEE\slash ACM Transactions on Networking
Volume 4, Number 6, December, 1996

              Steven H. Low and   
      Nicholas F. Maxemchuk and   
                    Sanjoy Paul   Anonymous credit cards and their
                                  collusion analysis . . . . . . . . . . . 809--816
               Jonathan Kay and   
                Joseph Pasquale   Profiling and reducing processing
                                  overheads in TCP/IP  . . . . . . . . . . 817--828
            Carey L. Williamson   Dynamic bandwidth allocation using
                                  loss-load curves . . . . . . . . . . . . 829--839
         Thomas F. La Porta and   
      Malathi Veeraraghavan and   
             Richard W. Buskens   Comparison of signaling loads for PCS
                                  systems  . . . . . . . . . . . . . . . . 840--856
       Symeon Papavassiliou and   
             Leandros Tassiulas   Joint optimal channel base station and
                                  power assignment for wireless access . . 857--872
              Ornan Gerstel and   
               Israel Cidon and   
                    Shmuel Zaks   The layout of virtual paths in ATM
                                  networks . . . . . . . . . . . . . . . . 873--884
        Jörg Liebeherr and   
            Dallas E. Wrege and   
               Domenico Ferrari   Exact admission control for networks
                                  with a bounded delay service . . . . . . 885--901
           Hosame Abu-Amara and   
              Brian A. Coan and   
               Shlomi Dolev and   
            Arkady Kanevsky and   
              Jennifer L. Welch   Self-stabilizing topology maintenance
                                  protocols for high-speed networks  . . . 902--912
               Hongsik Choi and   
             Hyeong-Ah Choi and   
               Murat Azizo\uglu   Efficient scheduling of transmissions in
                                  optical broadcast networks . . . . . . . 913--920
            Sung-hark Chung and   
                 Hu-gon Kim and   
             Yong-seok Yoon and   
                  Dong-wan Tcha   Cost-minimizing construction of a
                                  unidirectional SHR with diverse
                                  protection . . . . . . . . . . . . . . . 921--928
                 Ahmed E. Kamal   Performance modeling of partial packet
                                  discarding using the end-of-packet
                                  indicator in AAL type 5  . . . . . . . . 929--940
             Sridhar Ramesh and   
        Catherine Rosenberg and   
                   Anurag Kumar   Revenue maximization in ATM networks
                                  using the CLP capability and buffer
                                  priority management  . . . . . . . . . . 941--950
              Olaf Henniger and   
             Michel Barbeau and   
         Behçet Sarikaya   Specification and testing of the
                                  behavior of network management agents
                                  using SDL-92 . . . . . . . . . . . . . . 951--962


IEEE\slash ACM Transactions on Networking
Volume 5, Number 1, February, 1997

            David A. Levine and   
            Ian F. Akyildiz and   
             Mahmoud Naghshineh   A resource estimation and call admission
                                  algorithm for wireless multimedia
                                  networks using the shadow cluster
                                  concept  . . . . . . . . . . . . . . . . 1--12
                Chih-Lin I. and   
         Gregory P. Pollini and   
              Richard D. Gitlin   PCS mobility management using the
                                  reverse virtual call setup algorithm . . 13--24
                    Yi-Bing Lin   Reducing location update cost in a PCS
                                  network  . . . . . . . . . . . . . . . . 25--33
              Dong-wan Tcha and   
             Yong-joo Chung and   
                  Taek-jin Choi   A new lower bound for the frequency
                                  assignment problem . . . . . . . . . . . 34--39
        Charles R. Kalmanek and   
          Srinivasan Keshav and   
        William T. Marshall and   
           Samuel P. Morgan and   
         Robert C. Restrick III   Xunet 2: lessons from an early wide-area
                                  ATM testbed  . . . . . . . . . . . . . . 40--55
                Sugih Jamin and   
            Peter B. Danzig and   
           Scott J. Shenker and   
                    Lixia Zhang   A measurement-based admission control
                                  algorithm for integrated service packet
                                  networks . . . . . . . . . . . . . . . . 56--70
           Walter Willinger and   
             Murad S. Taqqu and   
             Robert Sherman and   
               Daniel V. Wilson   Self-similarity through
                                  high-variability: statistical analysis
                                  of Ethernet LAN traffic at the source
                                  level  . . . . . . . . . . . . . . . . . 71--86
                  Soung C. Liew   On the stability of shuffle-exchange and
                                  bidirectional shuffle-exchange
                                  deflection networks  . . . . . . . . . . 87--94
                  San-qi Li and   
                 Chia-lin Hwang   On the convergence of traffic
                                  measurement and queueing analysis: a
                                  statistical-matching and queueing (SMAQ)
                                  tool . . . . . . . . . . . . . . . . . . 95--110
                 Yoram Ofek and   
            Khosrow Sohraby and   
                     Ho-Ting Wu   Integration of synchronous and
                                  asynchronous traffic on the MetaRing and
                                  its performance study  . . . . . . . . . 111--121
             Wassim Matragi and   
            Khosrow Sohraby and   
            Chatschik Bisdikian   Jitter calculus in ATM networks:
                                  multiple nodes . . . . . . . . . . . . . 122--133
            Zbigniew Dziong and   
                 Marek Juda and   
                 Lorne G. Mason   A framework for bandwidth management in
                                  ATM networks --- aggregate equivalent
                                  bandwidth estimation approach  . . . . . 134--147
   J. J. Garcia-Luna-Aceves and   
                   Shree Murthy   A path-finding algorithm for loop-free
                                  routing  . . . . . . . . . . . . . . . . 148--160
          Yannis A. Korilis and   
             Aurel A. Lazar and   
                     Ariel Orda   Achieving network optima using
                                  Stackelberg routing strategies . . . . . 161--173

IEEE\slash ACM Transactions on Networking
Volume 5, Number 2, April, 1997

            Terence D. Todd and   
                 Ellen L. Hahne   Multi-access mesh (multimesh) networks   181--189
               Israel Cidon and   
        Leonidas Georgiadis and   
         Roch Guérin and   
                  Yuval Shavitt   Improved fairness algorithms for rings
                                  with spatial reuse . . . . . . . . . . . 190--204
               Simon S. Lam and   
                Geoffrey G. Xie   Group priority scheduling  . . . . . . . 205--218
         Edward W. Knightly and   
                      Hui Zhang   D-BIND: an accurate traffic model for
                                  providing QoS guarantees to VBR traffic  219--231
        Norival R. Figueira and   
                Joseph Pasquale   A schedulability condition for
                                  deadline-ordered service disciplines . . 232--244
               John M. Spinelli   Self-stabilizing sliding window ARQ
                                  protocols  . . . . . . . . . . . . . . . 245--254
           Michael Andersin and   
                Jens Zander and   
                    Zvi Rosberg   Soft and safe admission control in
                                  cellular networks  . . . . . . . . . . . 255--265
        Albert G. Greenberg and   
                     R. Srikant   Computational techniques for accurate
                                  performance evaluation of multirate,
                                  multihop communication networks  . . . . 266--277
            Hiroyuki Ohsaki and   
             Naoki Wakamiya and   
            Masayuki Murata and   
                 Hideo Miyahara   Performance of an input/output
                                  buffered-type ATM LAN switch with
                                  back-pressure function . . . . . . . . . 278--290
             Raffaele Bolla and   
                  Franco Davoli   Control of multirate synchronous streams
                                  in hybrid TDM access networks  . . . . . 291--304
              Joel E. Cohen and   
                 Clark Jeffries   Congestion resulting from increased
                                  capacity in single-server queueing
                                  networks . . . . . . . . . . . . . . . . 305--310
      Marc Willebeek-LeMair and   
             Perwez Shahabuddin   Approximating dependability measures of
                                  computer networks: an FDDI case study    311--327

IEEE\slash ACM Transactions on Networking
Volume 5, Number 3, June, 1997

               Fabrizio Sestini   Recursive copy generation for multicast
                                  ATM switching  . . . . . . . . . . . . . 329--335
             T. V. Lakshman and   
                Upamanyu Madhow   The performance of TCP/IP for networks
                                  with high bandwidth-delay products and
                                  random loss  . . . . . . . . . . . . . . 336--350
Jean-François P. Labourdette   Performance impact of partial
                                  reconfiguration on multihop lightwave
                                  networks . . . . . . . . . . . . . . . . 351--358
          George N. Rouskas and   
                Vijay Sivaraman   Packet scheduling in broadcast WDM
                                  networks with arbitrary transceiver
                                  tuning latencies . . . . . . . . . . . . 359--370
          Bhargav R. Bellur and   
                Galen H. Sasaki   A SAT-based network access scheme for
                                  fairness in high speed networks  . . . . 371--381
            Wing-cheong Lau and   
                      San-qi Li   Statistical multiplexing and buffer
                                  sharing in multimedia high-speed
                                  networks: a frequency-domain perspective 382--396
             Boris Tsybakov and   
           Nicoals D. Georganas   On self-similar traffic in ATM queues:
                                  definitions, overflow probability bound,
                                  and cell delay distribution  . . . . . . 397--409
                    Oran Sharon   A proof for lack of starvation in DQDB
                                  with and without slot reuse  . . . . . . 410--420
       George M. Stamatelos and   
       Vassilios N. Koukoulidis   Reservation-based bandwidth allocation
                                  in a radio ATM network . . . . . . . . . 420--428
                  San-qi Li and   
              James D. Pruneski   The linearity of low frequency traffic
                                  flow: an intrinsic I/O property in
                                  queueing systems . . . . . . . . . . . . 429--443

IEEE\slash ACM Transactions on Networking
Volume 5, Number 4, August, 1997

             Bobby Krupczak and   
         Kenneth L. Calvert and   
               Mostafa H. Ammar   Increasing the portability and
                                  re-usability of protocol code  . . . . . 445--459
         Deborah A. Wallach and   
           Dawson R. Engler and   
              M. Frans Kaashoek   ASHs: application-specific handlers for
                                  high-performance messaging . . . . . . . 460--474
            David K. Y. Yau and   
                   Simon S. Lam   Adaptive rate-controlled scheduling for
                                  multimedia applications  . . . . . . . . 475--488
         Thomas F. La Porta and   
            Kuo-Wei Herman Chen   A direct signaling system for flexible
                                  access and deployment of
                                  telecommunication services . . . . . . . 489--501
           Duke Tantiprasut and   
                  John Neil and   
                  Craig Farrell   ASN.1 protocol specification for use
                                  with arbitrary encoding schemes  . . . . 502--513
        Claude Castelluccia and   
              Walid Dabbous and   
                  Sean O'Malley   Generating efficient protocol code from
                                  an abstract specification  . . . . . . . 514--524
András L. Oláh and   
     Sonia M. Heemstra de Groot   Alternative specification and
                                  verification of a periodic state
                                  exchange protocol  . . . . . . . . . . . 525--529
          Bülent Yener and   
         Spyridon Matsoukas and   
                     Yoram Ofek   Iterative approach to optimizing
                                  convergence routing priorities . . . . . 530--542
             Randall Landry and   
            Ioannis Stavrakakis   Study of delay jitter with and without
                                  peak rate enforcement  . . . . . . . . . 543--553
               Daniel P. Heyman   The GBAR source model for VBR
                                  videoconferences . . . . . . . . . . . . 554--560
                Pawan Goyal and   
                 Harrick M. Vin   Generalized guaranteed rate scheduling
                                  algorithms: a framework  . . . . . . . . 561--571
             Brahim Bensaou and   
          Shirley T. C. Lam and   
                Hon-Wai Chu and   
              Danny H. K. Tsang   Estimation of the cell loss ratio in ATM
                                  networks with a fuzzy system and
                                  application to measurement-based call
                                  admission control  . . . . . . . . . . . 572--584
               Kshirasagar Naik   Efficient computation of unique
                                  input/output sequences in finite-state
                                  machines . . . . . . . . . . . . . . . . 585--599
        Willibald Doeringer and   
        Günter Karjoth and   
                  Mehdi Nassehi   Corrections to ``Routing on
                                  longest-matching prefixes''  . . . . . . 600--600

IEEE\slash ACM Transactions on Networking
Volume 5, Number 5, October, 1997

                    Vern Paxson   End-to-end routing behavior in the
                                  Internet . . . . . . . . . . . . . . . . 601--615
             John Heidemann and   
             Katia Obraczka and   
                      Joe Touch   Modeling the performance of HTTP over
                                  several transport protocols  . . . . . . 616--630
           Martin F. Arlitt and   
            Carey L. Williamson   Internet Web servers: workload
                                  characterization and performance
                                  implications . . . . . . . . . . . . . . 631--645
            Joseph S. M. Ho and   
                Ian F. Akyildiz   Dynamic hierarchical database
                                  architecture for location management in
                                  PCS networks . . . . . . . . . . . . . . 646--660
              Jorge A. Cobb and   
               Mohamed G. Gouda   Flow theory  . . . . . . . . . . . . . . 661--674
          Jon C. R. Bennett and   
                      Hui Zhang   Hierarchical packet fair queueing
                                  algorithms . . . . . . . . . . . . . . . 675--689
                Pawan Goyal and   
             Harrick M. Vin and   
                  Haichen Cheng   Start-time fair queueing: a scheduling
                                  algorithm for integrated services packet
                                  switching networks . . . . . . . . . . . 690--704
    Emmanouel A. Varvarigos and   
                  Vishal Sharma   The ready-to-go virtual circuit
                                  protocol: a loss-free protocol for
                                  multigigabit networks using FIFO buffers 705--718
      Srini B. Tridandapani and   
        Biswanath Mukherjee and   
               Geir Hallingstad   Channel sharing in multi-hop WDM
                                  lightwave networks: do we need more
                                  channels?  . . . . . . . . . . . . . . . 719--727
       Abhijit K. Choudhury and   
                 Ellen L. Hahne   A new buffer management scheme for
                                  hierarchical shared memory switches  . . 728--738

IEEE\slash ACM Transactions on Networking
Volume 5, Number 6, December, 1997

      Matthias Grossglauser and   
          Srinivasan Keshav and   
                David N. C. Tse   RCBR: a simple and efficient service for
                                  multiple time-scale traffic  . . . . . . 741--755
          Hari Balakrishnan and   
     Venkata N. Padmanabhan and   
          Srinivasan Seshan and   
                  Randy H. Katz   A comparison of mechanisms for improving
                                  TCP performance over wireless links  . . 756--769
            Ellen W. Zegura and   
         Kenneth L. Calvert and   
             Michael J. Donahoo   A quantitative comparison of graph-based
                                  models for Internet topology . . . . . . 770--783
                Sally Floyd and   
               Van Jacobson and   
             Ching-Gung Liu and   
             Steven McCanne and   
                    Lixia Zhang   A reliable multicast framework for
                                  light-weight sessions and application
                                  level framing  . . . . . . . . . . . . . 784--803
            Imrich Chlamtac and   
András Faragó and   
                 Hongbiao Zhang   Time-spread multiple-access (TSMA)
                                  protocols for multihop mobile radio
                                  networks . . . . . . . . . . . . . . . . 804--812
             Timothy Weller and   
                    Bruce Hajek   Scheduling nonuniform traffic in a
                                  packet-switching system with small
                                  propagation delay  . . . . . . . . . . . 813--823
            George Varghese and   
                  Anthony Lauck   Hashed and hierarchical timing wheels:
                                  efficient data structures for
                                  implementing a timer facility  . . . . . 824--834
           Mark E. Crovella and   
                 Azer Bestavros   Self-similarity in World Wide Web
                                  traffic: evidence and possible causes    835--846
                Shai Herzog and   
              Scott Shenker and   
                 Deborah Estrin   Sharing the ``cost'' of multicast trees:
                                  an axiomatic analysis  . . . . . . . . . 847--860
             Aurel A. Lazar and   
                 Ariel Orda and   
        Dimitrios E. Pendarakis   Virtual path bandwidth allocation in
                                  multiuser networks . . . . . . . . . . . 861--871
               John O. Limb and   
                    Dolors Sala   A protocol for efficient transfer of
                                  data over hybrid fiber/coax systems  . . 872--881
           Giuseppe Bianchi and   
                 Riccardo Melen   The role of local storage in supporting
                                  video retrieval services on ATM networks 882--892
               Yuguang Fang and   
            Imrich Chlamtac and   
                    Yi-Bing Lin   Modeling PCS networks under general call
                                  holding time and cell residence time
                                  distributions  . . . . . . . . . . . . . 893--906
     Partha P. Bhattacharya and   
        Leonidas Georgiadis and   
                 Arvind Krishna   Distributed channel allocation for PCN
                                  with variable rate traffic . . . . . . . 907--923
           Ramaswamy Murali and   
                Brian L. Hughes   Random access with large propagation
                                  delay  . . . . . . . . . . . . . . . . . 924--935
            Rajiv Ramaswami and   
                  Adrian Segall   Distributed network control for optical
                                  networks . . . . . . . . . . . . . . . . 936--943
                   D. Medhi and   
                   Sujit Guptan   Network dimensioning and performance of
                                  multiservice, multirate loss networks
                                  with dynamic routing . . . . . . . . . . 944--957
             Alfio Lombardo and   
              Giovanni Schembra   An analytical paradigm to compare
                                  routing strategies in an ATM multimedia
                                  environment  . . . . . . . . . . . . . . 958--969
              Rauf Izmailov and   
              Duan-Shin Lee and   
               Bhaskar Sengupta   Design and analysis of a congestion-free
                                  overlay on a high-speed network  . . . . 970--980
            M. H. MacGregor and   
                Wayne D. Grover   Distributed partial-express routing of
                                  broad-band transport network demands . . 981--988
          Bülent Yener and   
                 Yoram Ofek and   
                      Moti Yung   Combinatorial design of congestion-free
                                  networks . . . . . . . . . . . . . . . . 989--1000


IEEE\slash ACM Transactions on Networking
Volume 6, Number 1, February, 1998

            David G. Thaler and   
          Chinya V. Ravishankar   Using name-based mappings to increase
                                  hit rates  . . . . . . . . . . . . . . . 1--14
               Reuven Cohen and   
            Srinivas Ramanathan   TCP for high performance in hybrid fiber
                                  coaxial broad-band access networks . . . 15--29
            Geoffrey G. Xie and   
                   Simon S. Lam   Real-time block transfer under a
                                  link-sharing hierarchy . . . . . . . . . 30--41
              Soung C. Liew and   
              Derek Chi-yin Tse   A control-theoretic approach to adapting
                                  VBR compressed video for transport over
                                  a CBR communications channel . . . . . . 42--55
            Sudhir S. Dixit and   
                   Sharad Kumar   Traffic descriptor mapping and traffic
                                  control for frame relay over ATM network 56--70
         Bruce S. Northcote and   
                Donald E. Smith   Service control point overload rules to
                                  protect intelligent network services . . 71--81
               Andre Girard and   
          Brunilde Sansó   Multicommodity flow models, failure
                                  propagation, and reliable loss network
                                  design . . . . . . . . . . . . . . . . . 82--93
               K. Ravindran and   
                 Ting-Jian Gong   Cost analysis of multicast transport
                                  architectures in multiservice networks   94--109

IEEE\slash ACM Transactions on Networking
Volume 6, Number 2, April, 1998

               Peter Newman and   
              Greg Minshall and   
                 Thomas L. Lyon   IP switching --- ATM under IP  . . . . . 117--129
       Abhijit K. Choudhury and   
                 Ellen L. Hahne   Dynamic queue length thresholds for
                                  shared-memory packet switches  . . . . . 130--140
         Aleksandr Privalov and   
                Khosrow Sohraby   Per-stream jitter analysis in CBR ATM
                                  multiplexors . . . . . . . . . . . . . . 141--149
            Cathy A. Fulton and   
                      San-qi Li   Delay jitter first-order and
                                  second-order statistical functions of
                                  general traffic on high-speed multimedia
                                  networks . . . . . . . . . . . . . . . . 150--163
        Dimitrios Stiliadis and   
                   Anujan Varma   Rate-proportional servers: a design
                                  methodology for fair queueing algorithms 164--174
        Dimitrios Stiliadis and   
                   Anujan Varma   Efficient fair queueing algorithms for
                                  packet-switched networks . . . . . . . . 175--185
              Ezhan Karasan and   
                 Ender Ayanoglu   Effects of wavelength routing and
                                  selection algorithms on wavelength
                                  conversion gain in WDM optical networks  186--196
              Ahmed Mokhtar and   
               Murat Azizo\uglu   Adaptive wavelength routing in
                                  all-optical networks . . . . . . . . . . 197--206
          Kazutaka Murakami and   
                   Hyong S. Kim   Optimal capacity and flow assignment for
                                  self-healing ATM networks based on line
                                  and end-to-end restoration . . . . . . . 207--221
         Nikolaos Anerousis and   
                 Aurel A. Lazar   Virtual path control for ATM networks
                                  with call level quality of service
                                  guarantees . . . . . . . . . . . . . . . 222--236

IEEE\slash ACM Transactions on Networking
Volume 6, Number 3, June, 1998

            Craig Partridge and   
           Philip P. Carvey and   
                 Ed Burgess and   
          Isidro Castineyra and   
                 Tom Clarke and   
                Lise Graham and   
           Michael Hathaway and   
                Phil Herman and   
                 Allen King and   
              Steve Kohalmi and   
                   Tracy Ma and   
               John Mcallen and   
              Trevor Mendez and   
         Walter C. Milliken and   
           Ronald Pettyjohn and   
                John Rokosz and   
              Joshua Seeger and   
            Michael Sollins and   
               Steve Storch and   
             Benjamin Tober and   
              Gregory D. Troxel   A 50-Gb/s IP router  . . . . . . . . . . 237--248
        Ramachandran Ramjee and   
         Thomas F. La Porta and   
                 Jim Kurose and   
                    Don Towsley   Performance evaluation of connection
                                  rerouting schemes for ATM-based wireless
                                  networks . . . . . . . . . . . . . . . . 249--261
         Mats Björkman and   
                Per Gunningberg   Performance modeling of multiprocessor
                                  implementations of protocols . . . . . . 262--273
              Jorge A. Cobb and   
           Mohamed G. Gouda and   
                  Amal El-Nahas   Time-shift scheduling --- fair
                                  scheduling of flows in high-speed
                                  networks . . . . . . . . . . . . . . . . 274--285
               Ehud Aharoni and   
                   Reuven Cohen   Restricted dynamic Steiner trees for
                                  scalable multicast in datagram networks  286--297
                  Ji-Her Ju and   
                Victor O. K. Li   An optimal topology-transparent
                                  scheduling method in multihop packet
                                  radio networks . . . . . . . . . . . . . 298--306
              Soung C. Liew and   
               Ming-Hung Ng and   
                  Cathy W. Chan   Blocking and nonblocking multirate Clos
                                  switching networks . . . . . . . . . . . 307--318
        Kwan Lawrence Yeung and   
            Tak-Shing Peter Yum   Node placement optimization in
                                  ShuffleNets  . . . . . . . . . . . . . . 319--324
         Rainer R. Iraschko and   
            M. H. MacGregor and   
                Wayne D. Grover   Optimal capacity placement for path
                                  restoration in STM or ATM
                                  mesh-survivable networks . . . . . . . . 325--336
             B. Neelakantan and   
                 S. V. Raghavan   Scientific foundations to the multilevel
                                  method . . . . . . . . . . . . . . . . . 337--346

IEEE\slash ACM Transactions on Networking
Volume 6, Number 4, August, 1998

     Jörg Nonnenmacher and   
          Ernst W. Biersack and   
                    Don Towsley   Parity-based loss recovery for reliable
                                  multicast transmission . . . . . . . . . 349--361
             David D. Clark and   
                    Wenjia Fang   Explicit allocation of best-effort
                                  packet delivery service  . . . . . . . . 362--373
          R. Gopalakrishnan and   
          Gurudatta M. Parulkar   Efficient user-space protocol
                                  implementations with QoS guarantees
                                  using real-time upcalls  . . . . . . . . 374--388
                Philipp Hoschka   Compact and efficient presentation
                                  conversion code  . . . . . . . . . . . . 389--396
            James D. Salehi and   
               Shi-Li Zhang and   
                 Jim Kurose and   
                    Don Towsley   Supporting stored video: reducing rate
                                  variability and end-to-end resource
                                  requirements through optimal smoothing   397--410
             Ness B. Shroff and   
                Mischa Schwartz   Improved loss calculations at an ATM
                                  multiplexer  . . . . . . . . . . . . . . 411--421
            Imrich Chlamtac and   
             Hongbiao Zhang and   
András Faragó and   
               Andrea Fumagalli   A deterministic approach to the
                                  end-to-end analysis of packet flows in
                                  connection-oriented networks . . . . . . 422--431
          Ornan Ori Gerstel and   
               Israel Cidon and   
                    Shmuel Zaks   Efficient support for client/server
                                  applications over heterogeneous ATM
                                  network  . . . . . . . . . . . . . . . . 432--446
           Arthur W. Berger and   
                     Ward Whitt   Effective bandwidths with priorities . . 447--460
              Mehrdad Parsa and   
                   Qing Zhu and   
       J. J. Garcia-Luna-Aceves   An iterative algorithm for
                                  delay-constrained minimum-cost
                                  multicasting . . . . . . . . . . . . . . 461--474
               Nen-Fu Huang and   
                   Huey-Ing Liu   A study of isochronous channel reuse in
                                  DQDB metropolitan area networks  . . . . 475--484
                   Anurag Kumar   Comparative performance analysis of
                                  versions of TCP in a local network with
                                  a lossy link . . . . . . . . . . . . . . 485--498
             Tsern-Huei Lee and   
                   Kuen-Chu Lai   Characterization of delay-sensitive
                                  traffic  . . . . . . . . . . . . . . . . 499--504

IEEE\slash ACM Transactions on Networking
Volume 6, Number 5, October, 1998

                 David L. Mills   Adaptive hybrid clock discipline
                                  algorithm for the network time protocol  505--514
             Craig Labovitz and   
            G. Robert Malan and   
                Farnam Jahanian   Internet routing instability . . . . . . 515--528
             Jonathan Stone and   
          Michael Greenwald and   
            Craig Partridge and   
                   James Hughes   Performance of checksums and CRC's over
                                  real data  . . . . . . . . . . . . . . . 529--543
                    Hao Che and   
                  San-qi Li and   
                     Arthur Lin   Adaptive resource management for
                                  flow-based IP/ATM hybrid switching
                                  systems  . . . . . . . . . . . . . . . . 544--557
              Victor Firoiu and   
                 Jim Kurose and   
                    Don Towsley   Efficient admission control of piecewise
                                  linear traffic envelopes at EDF
                                  schedulers . . . . . . . . . . . . . . . 558--570
           Shivakant Mishra and   
                         Lei Wu   An evaluation of flow control in group
                                  communication  . . . . . . . . . . . . . 571--587
                Bruce Hajek and   
                      Linhai He   On variations of queue response for
                                  inputs with the same mean and
                                  autocorrelation function . . . . . . . . 588--598
        Lampros Kalampoukas and   
                   Anujan Varma   Analysis of source policy and its
                                  effects on TCP in rate-controlled ATM
                                  networks . . . . . . . . . . . . . . . . 599--610
        Dimitrios Stiliadis and   
                   Anujan Varma   Latency-rate servers: a general model
                                  for analysis of traffic scheduling
                                  algorithms . . . . . . . . . . . . . . . 611--624
             Kohei Shiomoto and   
           Shinichiro Chaki and   
                Naoaki Yamanaka   A simple bandwidth management strategy
                                  based on measurements of instantaneous
                                  virtual path utilization in ATM networks 625--634
       Abdelnaser Mohammad Adas   Using adaptive linear prediction to
                                  support real-time VBR video under RCBR
                                  network service model  . . . . . . . . . 635--644
                      Peter Kim   Deterministic service guarantees in IEEE
                                  802.12 networks --- part I: the
                                  single-hub case  . . . . . . . . . . . . 645--658
                Jinwoo Choe and   
                 Ness B. Shroff   A central-limit-theorem-based approach
                                  for analyzing queue behavior in
                                  high-speed networks  . . . . . . . . . . 659--671

IEEE\slash ACM Transactions on Networking
Volume 6, Number 6, December, 1998

              Anja Feldmann and   
           Jennifer Rexford and   
    Ramón Cáceres   Efficient policies for carrying Web
                                  traffic over flow-switched networks  . . 673--685
             Ching-Gung Liu and   
             Deborah Estrin and   
              Scott Shenker and   
                    Lixia Zhang   Local error recovery in SRM: comparison
                                  of two approaches  . . . . . . . . . . . 686--699
            David K. Y. Yau and   
                   Simon S. Lam   Migrating sockets --- end system support
                                  for networking with quality of service
                                  guarantees . . . . . . . . . . . . . . . 700--716
             N. G. Duffield and   
         K. K. Ramakrishnan and   
                 Amy R. Reibman   SAVE: an algorithm for smoothed adaptive
                                  video over explicit rate networks  . . . 717--728
        Lampros Kalampoukas and   
               Anujan Varma and   
             K. K. Ramakrishnan   Two-way TCP traffic over rate controlled
                                  channels: effects and analysis . . . . . 729--743
            Rajiv Ramaswami and   
                   Galen Sasaki   Multiwavelength optical networks with
                                  limited wavelength conversion  . . . . . 744--754
           Byrav Ramamurthy and   
                Jason Iness and   
            Biswanath Mukherjee   Optimizing amplifier placements in a
                                  multiwavelength optical LAN/MAN: the
                                  unequally powered wavelengths case . . . 755--767
             Dean H. Lorenz and   
                     Ariel Orda   QoS routing in networks with uncertain
                                  parameters . . . . . . . . . . . . . . . 768--778
              Debanjan Saha and   
            Sarit Mukherjee and   
             Satish K. Tripathi   Carry-over round robin: a simple cell
                                  scheduling mechanism for ATM networks    779--796
         Lalita A. Kulkarni and   
                      San-qi Li   Performance analysis of a rate-based
                                  feedback control scheme  . . . . . . . . 797--810
              Brian L. Mark and   
      Gopalakrishnan Ramamurthy   Real-time estimation and dynamic
                                  renegotiation of UPC parameters for
                                  arbitrary traffic sources in ATM
                                  networks . . . . . . . . . . . . . . . . 811--827
                    Xiaohua Jia   A distributed algorithm of delay-bounded
                                  multicast routing for multimedia
                                  applications in wide area networks . . . 828--837
             Seok-Kyu Kweon and   
                   Kang G. Shin   Providing deterministic delay guarantees
                                  in ATM networks  . . . . . . . . . . . . 838--850
                 Anna Ha\'c and   
                         Bo Liu   Database and location management schemes
                                  for mobile communications  . . . . . . . 851--865


IEEE\slash ACM Transactions on Networking
Volume 7, Number 1, February, 1999

            Imrich Chlamtac and   
       Viktória Elek and   
           Andrea Fumagalli and   
             Csaba Szabó   Scalable WDM access network architecture
                                  based on photonic slot routing . . . . . 1--9
        Albert G. Greenberg and   
                 R. Srikant and   
                     Ward Whitt   Resource sharing for book-ahead and
                                  instantaneous-request calls  . . . . . . 10--22
          Richard F. Hobson and   
                     P. S. Wong   A parallel embedded-processor
                                  architecture for ATM reassembly  . . . . 23--37
                   Junyi Li and   
             Ness B. Shroff and   
              Edwin K. P. Chong   Channel carrying: a novel handoff scheme
                                  for mobile cellular networks . . . . . . 38--50
            Imrich Chlamtac and   
            Chiara Petrioli and   
                     Jason Redi   Energy-conserving access protocols for
                                  identification networks  . . . . . . . . 51--59
                    Ge Nong and   
          Jogesh K. Muppala and   
                   Mounir Hamdi   Analysis of nonblocking ATM switches
                                  with multiple input queues . . . . . . . 60--74
          Jeffrey M. Capone and   
            Ioannis Stavrakakis   Delivering QoS requirements to traffic
                                  with diverse delay tolerances in a TDMA
                                  environment  . . . . . . . . . . . . . . 75--87
             Leandros Tassiulas   Cut-through switching, pipelining, and
                                  scheduling for network evacuation  . . . 88--97
                Yijun Xiong and   
                 Lorne G. Mason   Restoration strategies and spare
                                  capacity requirements in self-healing
                                  ATM networks . . . . . . . . . . . . . . 98--110
            Ray-Guang Cheng and   
             Chung-Ju Chang and   
                    Li-Fong Lin   A QoS-Provisioning neural fuzzy
                                  connection admission controller for
                                  multimedia high-speed networks . . . . . 111--121
             Alifo Lombardo and   
           Giacomo Morabito and   
              Giovanni Schembra   A discrete-time paradigm to evaluate
                                  skew performance in a multimedia ATM
                                  multiplexer  . . . . . . . . . . . . . . 122--139

IEEE\slash ACM Transactions on Networking
Volume 7, Number 2, April, 1999

            Ian F. Akyildiz and   
            David A. Levine and   
                     Inwhee Joe   A slotted CDMA protocol with BER
                                  scheduling for wireless multimedia
                                  networks . . . . . . . . . . . . . . . . 146--158
            Stuart Cheshire and   
                     Mary Baker   Consistent overhead Byte stuffing  . . . 159--172
              Wu-chang Feng and   
           Dilip D. Kandlur and   
              Debanjan Saha and   
                   Kang G. Shin   Understanding and improving TCP
                                  performance over networks with minimum
                                  rate guarantees  . . . . . . . . . . . . 173--187
                   Nick McKeown   The iSLIP scheduling algorithm for
                                  input-queued switches  . . . . . . . . . 188--201
           Jennifer Rexford and   
                    Don Towsley   Smoothing variable-bit-rate video in an
                                  Internetwork . . . . . . . . . . . . . . 202--215
               Yonghwan Kim and   
                      San-qi Li   Performance analysis of data packet
                                  discarding in ATM networks . . . . . . . 216--227
            Zygmunt J. Haas and   
                      Ben Liang   Ad hoc mobility management with uniform
                                  quorum systems . . . . . . . . . . . . . 228--240
              Chunming Qiao and   
                    Yousong Mei   Off-line permutation embedding and
                                  scheduling in multiplexed optical
                                  networks with regular topologies . . . . 241--250
  Mirjana Zafirovic-Vukotic and   
   Ignatius G. M. M. Niemegeers   Waiting time estimates in symmetric
                                  ATM-oriented rings with the destination
                                  release of used slots  . . . . . . . . . 251--261
                 Ajei Gopal and   
                Inder Gopal and   
                    Shay Kutten   Fast broadcast in high-speed networks    262--275

IEEE\slash ACM Transactions on Networking
Volume 7, Number 3, June, 1999

                    Vern Paxson   End-to-end Internet packet dynamics  . . 277--292
      Matthias Grossglauser and   
                David N. C. Tse   A framework for robust measurement-based
                                  admission control  . . . . . . . . . . . 293--309
             Rajeev Agrawal and   
               Rene L. Cruz and   
              Clayton Okino and   
                Rajendran Rajan   Performance bonds for flow control
                                  protocols  . . . . . . . . . . . . . . . 310--323
             Butler Lampson and   
    Venkatachary Srinivasan and   
                George Varghese   IP lookups using multiway and
                                  multicolumn search . . . . . . . . . . . 324--334
    Emmanouel A. Varvarigos and   
               Jonathan P. Lang   A virtual circuit deflection protocol    335--349
     Roche A. Guérin and   
                     Ariel Orda   QoS routing in networks with inaccurate
                                  information: theory and algorithms . . . 350--364
                     Ariel Orda   Routing with end-to-end QoS guarantees
                                  in broadband networks  . . . . . . . . . 365--374
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Scalable feedback for large groups . . . 375--386
             Pietro Manzoni and   
            Paolo Cremonesi and   
               Giuseppe Serazzi   Workload models of VBR video traffic and
                                  their use in resource allocation
                                  policies . . . . . . . . . . . . . . . . 387--397
            Kavitha Chandra and   
                 Amy R. Reibman   Modeling one- and two-layer variable bit
                                  rate video . . . . . . . . . . . . . . . 398--413
               Rajesh K. Pankaj   Wavelength requirements for multicasting
                                  in all-optical networks  . . . . . . . . 414--424
                  Eytan Modiano   Random algorithms for scheduling
                                  multicast traffic in WDM
                                  broadcast-and-select networks  . . . . . 425--434
                Xijun Zhang and   
                  Chunming Qiao   On scheduling all-to-all personalized
                                  connections and cost-effective designs
                                  in WDM rings . . . . . . . . . . . . . . 435--445
               Abel Dasylva and   
                     R. Srikant   Optimal WDM schedules for optical star
                                  networks . . . . . . . . . . . . . . . . 446--456

IEEE\slash ACM Transactions on Networking
Volume 7, Number 4, August, 1999

                Sally Floyd and   
                     Kevin Fall   Promoting the use of end-to-end
                                  congestion control in the Internet . . . 458--472
                  Songwu Lu and   
         Vaduvur Bharghavan and   
                     R. Srikant   Fair scheduling in wireless packet
                                  networks . . . . . . . . . . . . . . . . 473--489
        Francesco Lo Presti and   
               Zhi-Li Zhang and   
                 Jim Kurose and   
                    Don Towsley   Source time scale and optimal
                                  buffer/bandwidth tradeoff for
                                  heterogeneous regulated traffic in a
                                  network node . . . . . . . . . . . . . . 490--501
             Chung Kei Wong and   
                   Simon S. Lam   Digital signatures for flows and
                                  multicasts . . . . . . . . . . . . . . . 502--513
            Sriram Raghavan and   
               G. Manimaran and   
             C. Siva Ram Murthy   A rearrangeable algorithm for the
                                  construction delay-constrained dynamic
                                  multicast trees  . . . . . . . . . . . . 514--529
                 Keith Kong and   
                   Dipak Ghosal   Mitigating server-side congestion in the
                                  Internet through pseudoserving . . . . . 530--544
                 Gaoxi Xiao and   
                 Yiu-Wing Leung   Algorithms for allocating wavelength
                                  converters in all-optical networks . . . 545--557
                Wayne D. Grover   High availability path design in
                                  ring-based optimal networks  . . . . . . 558--574
             Supriya Sharma and   
                Yannis Viniotis   Optimal buffer management policies for
                                  shared-buffer ATM switches . . . . . . . 575--587
              Jae-Hyun Park and   
               Hyunsoo Yoon and   
                  Heung-Kyu Lee   The deflection self-routing Banyan
                                  network: a large-scale ATM switch using
                                  the fully adaptive self-routing and its
                                  performance analyses . . . . . . . . . . 588--604

IEEE\slash ACM Transactions on Networking
Volume 7, Number 5, October, 1999

          Hemant M. Chaskar and   
             T. V. Lakshman and   
                      U. Madhow   TCP over wireless with link level error
                                  control: analysis and design methodology 605--615
              Sunghyun Choi and   
                   Kang G. Shin   An uplink CDMA system architecture with
                                  diverse QoS guarantees for heterogeneous
                                  traffic  . . . . . . . . . . . . . . . . 616--628
      Matthias Grossglauser and   
         Jean-Chrysostome Bolot   On the relevance of long-range
                                  dependence in network traffic  . . . . . 629--640
       Muriel Médard and   
             Steven G. Finn and   
               Richard A. Barry   Redundant trees for preplanned recovery
                                  in arbitrary vertex-redundant or
                                  edge-redundant graphs  . . . . . . . . . 641--652
                Anindo Banerjea   Fault recovery for guaranteed
                                  performance communications connections   653--668
        Hanrijanto Sariowan and   
               Rene L. Cruz and   
              George C. Polyzos   SCED: a generalized scheduling policy
                                  for guaranteeing quality-of-service  . . 669--684
              Wu-Chang Feng and   
               Dilip D. Kandlur   Adaptive packet marking for maintaining
                                  end-to-end throughput in a
                                  differentiated-services Internet . . . . 685--697
               G. Manimaran and   
    Hariharan Shankar Rahul and   
             C. Siva Ram Murthy   A new distributed route selection
                                  approach for channel establishment in
                                  real-time networks . . . . . . . . . . . 698--709
             T. V. Lakshman and   
               P. P. Mishra and   
             K. K. Ramakrishnan   Transporting compressed video over ATM
                                  networks with explicit-rate feedback
                                  control  . . . . . . . . . . . . . . . . 710--723
       Mayez A. Al-Mouhamed and   
       Mohammed Kaleemuddin and   
                   Habib Yousef   Evaluation of pipelined dilated banyan
                                  switch architectures for ATM networks    724--740
         Aleksandar Kolarov and   
                  G. Ramamurthy   A control-theoretic approach to the
                                  design of an explicit rate controller
                                  for ABR service  . . . . . . . . . . . . 741--753
         Suresh Subramaniam and   
           Murat Azizo\uglu and   
                 Arun K. Somani   On optimal converter placement in
                                  wavelength-routed networks . . . . . . . 754--766
             Murat Alanyali and   
                 Ender Ayanoglu   Provisioning algorithms for WDM optical
                                  networks . . . . . . . . . . . . . . . . 767--778
                    Ling Li and   
                 Arun K. Somani   Dynamic wavelength routing using
                                  congestion and neighborhood information  779--786

IEEE\slash ACM Transactions on Networking
Volume 7, Number 6, December, 1999

          Jon C. R. Bennett and   
            Craig Partridge and   
              Nicholas Shectman   Packet reordering is not pathological
                                  network behavior . . . . . . . . . . . . 789--798
            Stefano Basagni and   
            Imrich Chlamtac and   
                 Danilo Bruschi   A mobility-transparent deterministic
                                  broadcast mechanism for ad hoc networks  799--807
                 Zohar Naor and   
                    Hanoch Levy   LATS: a load-adaptive threshold scheme
                                  for tracking mobile users  . . . . . . . 808--817
                   Junyi Li and   
             Ness B. Shroff and   
                    K. P. Chong   A reduced-power channel reuse scheme for
                                  wireless packet cellular networks  . . . 818--832
                Ori Gerstel and   
               Galen Sasaki and   
                Shay Kutten and   
                Rajiv Ramaswami   Worst-case analysis of dynamic
                                  wavelength allocation in optical
                                  networks . . . . . . . . . . . . . . . . 833--846
                Demet Aksoy and   
               Michael Franklin   $R \times W$: a scheduling approach for
                                  large-scale on-demand data broadcast . . 846--860
              Steven H. Low and   
               David E. Lapsley   Optimization flow control, I: basic
                                  algorithm and convergence  . . . . . . . 861--874
                Lavy Libman and   
                     Ariel Orda   The designer's perspective to atomic
                                  noncooperative networks  . . . . . . . . 875--884
               Israel Cidon and   
                Raphael Rom and   
                  Yuval Shavitt   Analysis of multi-path routing . . . . . 885--896
                Wei K. Tsai and   
            John K. Antonio and   
                 Garng M. Huang   Complexity of gradient projection method
                                  for optimal routing in data networks . . 897--905
             Eyal Felstaine and   
                   Reuven Cohen   On the distribution of routing
                                  computation in hierarchical ATM networks 906--916
              Maan A. Kousa and   
          Ahmed K. Elhakeem and   
                       Hui Yang   Performance of ATM networks under hybrid
                                  ARQ/FEC error control scheme . . . . . . 917--925
                Hanoch Levy and   
           Tzippi Mendelson and   
                 Moshe Sidi and   
               Joseph Keren-Zvi   Sizing exit buffers in ATM networks: an
                                  intriguing coexistence of instability
                                  and tiny cell loss rates . . . . . . . . 926--936


IEEE\slash ACM Transactions on Networking
Volume 8, Number 1, February, 2000

               Dan Decasper and   
               Zubin Dittia and   
              Guru Parulkar and   
              Bernhard Plattner   Router plugins: a software architecture
                                  for next-generation routers  . . . . . . 2--15
             Chung Kei Wong and   
              Mohamed Gouda and   
                   Simon S. Lam   Secure group communications using key
                                  graphs . . . . . . . . . . . . . . . . . 16--30
                Mario Baldi and   
                 Yoram Ofek and   
              Bülent Yener   Adaptive group multicast with
                                  time-driven priority . . . . . . . . . . 31--43
              Sunghyun Choi and   
                   Kang G. Shin   A unified wireless LAN architecture for
                                  real-time and non-real-time
                                  communication services . . . . . . . . . 44--59
               Steve Iatrou and   
            Ioannis Stavrakakis   A dynamic regulation and scheduling
                                  scheme for real-time traffic management  60--70
                Nasir Ghani and   
                    Jon W. Mark   Enhanced distributed explicit rate
                                  allocation for ABR services in ATM
                                  networks . . . . . . . . . . . . . . . . 71--86
     Shivkumar Kalyanaraman and   
                   Raj Jain and   
                Sonia Fahmy and   
                Rohit Goyal and   
                Bobby Vandalore   The ERICA switch algorithm for ABR
                                  traffic management in ATM networks . . . 87--98
              Ching-Fong Su and   
             Gustavo De Veciana   Statistical multiplexing and
                                  mix-dependent alternative routing in
                                  multiservice VP networks . . . . . . . . 99--108
             Sung Hyuk Byun and   
                  Dan Keun Sung   The UniMIN switch architecture for
                                  large-scale ATM switches . . . . . . . . 109--120

IEEE\slash ACM Transactions on Networking
Volume 8, Number 2, 2000

            Jitendra Padhye and   
              Victor Firoiu and   
          Donald F. Towsley and   
                James F. Kurose   Modeling TCP Reno performance: a simple
                                  model and its empirical validation . . . 133--145
          Oliver Spatscheck and   
    Jòrgen S. Hansen and   
            John H. Hartman and   
              Larry L. Peterson   Optimizing TCP forwarder performance . . 146--157
                Luigi Rizzo and   
               Lorenzo Vicisano   Replacement policies for a proxy cache   158--170
    Ioannis Ch. Paschalidis and   
             John N. Tsitsiklis   Congestion-dependent pricing of network
                                  services . . . . . . . . . . . . . . . . 171--184
                 Ion Stoica and   
                  Hui Zhang and   
                T. S. Eugene Ng   A hierarchical fair service curve
                                  algorithm for link-sharing, real-time,
                                  and priority services  . . . . . . . . . 185--199
             Mark D. Corner and   
        Jörg Liebeherr and   
                Nada Golmie and   
        Chatschik Bisdikian and   
                    David H. Su   A priority scheme for the IEEE 802.14
                                  MAC protocol for hybrid fiber-coax
                                  networks . . . . . . . . . . . . . . . . 200--211
            Subir K. Biswas and   
                  Rauf Izmailov   Design of a fair bandwidth allocation
                                  policy for VBR traffic in ATM networks   212--212
           Martin S. Lacher and   
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Performance comparison of centralized
                                  versus distributed error recovery for
                                  reliable multicast . . . . . . . . . . . 224--224
          Douglas S. Reeves and   
              Hussein F. Salama   A distributed algorithm for
                                  delay-constrained unicast routing  . . . 239--250
                Adrian Grah and   
                Terence D. Todd   Packet-switched local area networks
                                  using wavelength-selective station
                                  couplers . . . . . . . . . . . . . . . . 251--264
             Jean-Marc Berthaud   Time synchronization over networks using
                                  convex closures  . . . . . . . . . . . . 265--277

IEEE\slash ACM Transactions on Networking
Volume 8, Number 3, 2000

                     Li Fan and   
                    Pei Cao and   
            Jussara Almeida and   
               Andrei Z. Broder   Summary cache: a scalable wide-area Web
                                  cache sharing protocol . . . . . . . . . 281--293
         Sneha Kumar Kasera and   
Gísli Hjálmtýsson and   
          Donald F. Towsley and   
                James F. Kurose   Scalable reliable multicast using
                                  multiple multicast channels  . . . . . . 294--310
                Shiwen Chen and   
     Oktay Günlük and   
              Bülent Yener   The multicast packing problem  . . . . . 311--318
                     Jie Li and   
               Hisao Kameda and   
                       Keqin Li   Optimal dynamic mobility management for
                                  PCS networks . . . . . . . . . . . . . . 319--327
        Anthony S. Acampora and   
      Srikanth V. Krishnamurthy   A new adaptive MAC layer protocol for
                                  broadband packet wireless networks in
                                  harsh fading and interference
                                  environments . . . . . . . . . . . . . . 328--336
             Jeong Geun Kim and   
                Marwan M. Krunz   Bandwidth allocation in wireless
                                  networks with guaranteed packet-loss
                                  performance  . . . . . . . . . . . . . . 337--349
              Ching-Fong Su and   
         Gustavo De Veciana and   
                   Jean Walrand   Explicit rate flow control for ABR
                                  services in ATM networks . . . . . . . . 350--361
                Alain Mayer and   
                 Yoram Ofek and   
                      Moti Yung   Local and congestion-driven fairness
                                  algorithm in arbitrary topology networks 362--372
                  Steven H. Low   Equilibrium bandwidth and buffer
                                  allocations for elastic traffics . . . . 373--383
            Olivier Crochat and   
        Jean-Yves Le Boudec and   
                  Ornan Gerstel   Protection interoperability for WDM
                                  optical networks . . . . . . . . . . . . 384--395
              Biplab Sikdar and   
                   D. Manjunath   Queueing analysis of scheduling policies
                                  in copy networks of space-based
                                  multicast packet switches  . . . . . . . 396--406
            Rajgopal Kannan and   
                  Sibabrata Ray   MSXmin: a modular multicast ATM packet
                                  switch with low delay and hardware
                                  complexity . . . . . . . . . . . . . . . 407--418
            Eric W. M. Wong and   
            Andy K. M. Chan and   
            Tak-Shing Peter Yum   Analysis of rerouting in
                                  circuit-switched networks  . . . . . . . 419--427

IEEE\slash ACM Transactions on Networking
Volume 8, Number 4, 2000

               Zhi-Li Zhang and   
                Yuewei Wang and   
             David H. C. Du and   
                     Dongli Shu   Video staging: a proxy-server-based
                                  approach to end-to-end video delivery
                                  over wide-area networks  . . . . . . . . 429--442
             Michel Abdalla and   
              Yuval Shavitt and   
                   Avishai Wool   Key management for restricted multicast
                                  using broadcast encryption . . . . . . . 443--454
            Ellen W. Zegura and   
           Mostafa H. Ammar and   
               Zongming Fei and   
           Samrat Bhattacharjee   Application-layer anycasting: a server
                                  selection architecture and use in a
                                  replicated Web service . . . . . . . . . 455--466
            Matthew Roughan and   
              Darryl Veitch and   
                   Patrice Abry   Real-time estimation of the parameters
                                  of long-range dependence . . . . . . . . 467--478
                Mario Baldi and   
                     Yoram Ofek   End-to-end delay analysis of
                                  videoconferencing over packet-switched
                                  networks . . . . . . . . . . . . . . . . 479--492
                  Ilias Iliadis   Optimal PNNI complex node
                                  representations for restrictive costs
                                  and minimal path computation time  . . . 493--506
José M. Barceló and   
  Jorge García-Vidal and   
                    Olga Casals   Worst-case traffic in a tree network of
                                  ATM multiplexers . . . . . . . . . . . . 507--516
             Wen-Tsuen Chen and   
              Chun-Fu Huang and   
             Yi-Luang Chang and   
                  Wu-Yuin Hwang   An efficient cell-scheduling algorithm
                                  for multicast ATM switching systems  . . 517--525
             Dongsoo S. Kim and   
                    Ding-Zhu Du   Performance of split routing algorithm
                                  for three-stage multicast networks . . . 526--534
             Frank K. Hwang and   
              Sheng-Chyang Liaw   On nonblocking multicast three-stage
                                  Clos networks  . . . . . . . . . . . . . 535--539

IEEE\slash ACM Transactions on Networking
Volume 8, Number 5, 2000

             T. V. Lakshman and   
            Upamanyu Madhow and   
                 Bernhard Suter   TCP/IP performance with random loss and
                                  bidirectional congestion . . . . . . . . 541--555
               Jeonghoon Mo and   
                   Jean Walrand   Fair end-to-end window-based congestion
                                  control  . . . . . . . . . . . . . . . . 556--567
                P. Krishnan and   
                  Danny Raz and   
                  Yuval Shavitt   The cache location problem . . . . . . . 568--582
            Nicholas Bambos and   
               Shou C. Chen and   
              Gregory J. Pottie   Channel access algorithms with active
                                  link protection for wireless
                                  communication networks with power
                                  control  . . . . . . . . . . . . . . . . 583--597
         Dhritiman Banerjee and   
            Biswanath Mukherjee   Wavelength-routed optical networks:
                                  linear formulation, resource budgeting
                                  tradeoffs, and a reconfiguration study   598--607
                Xijun Zhang and   
                  Chunming Qiao   An effective and comprehensive approach
                                  for traffic grooming and wavelength
                                  assignment in SONET/WDM rings  . . . . . 608--617
              Ornan Gerstel and   
            Rajiv Ramaswami and   
                Galen H. Sasaki   Cost-effective traffic grooming in WDM
                                  rings  . . . . . . . . . . . . . . . . . 618--630
               Jason P. Jue and   
            Biswanath Mukherjee   Multiconfiguration multihop protocols: a
                                  new class of protocols for
                                  packet-switched WDM optical networks . . 631--642
           Arthur W. Berger and   
                   Yaakov Kogan   Dimensioning bandwidth for elastic
                                  traffic in high-speed data networks  . . 643--654
            Subir K. Biswas and   
              Rauf Izmailov and   
               Bhaskar Sengupta   Connection splitting: an efficient way
                                  of reducing call blocking in ATM . . . . 655--666
        Ha\"\ikel Ya\"\iche and   
           Ravi R. Mazumdar and   
            Catherine Rosenberg   A game theoretic framework for bandwidth
                                  allocation and pricing in broadband
                                  networks . . . . . . . . . . . . . . . . 667--678
           Chi-Chung Cheung and   
          Danny H. K. Tsang and   
                   Sanjay Gupta   Dynamic multicast routing based on mean
                                  number of new calls accepted before
                                  blocking for single rate loss networks   679--688

IEEE\slash ACM Transactions on Networking
Volume 8, Number 6, 2000

        Jean-Yves Le Boudec and   
             Olivier Verscheure   Optimal smoothing for guaranteed service 689--696
           Rose Qingyang Hu and   
                  David W. Petr   A predictive self-tuning fuzzy-logic
                                  feedback rate controller . . . . . . . . 697--709
               Michael Frey and   
               Son Nguyen-Quang   A gamma-based framework for modeling
                                  variable-rate MPEG video sources: the
                                  GOP GBAR model . . . . . . . . . . . . . 710--719
           Brett J. Vickers and   
   Célio Albuquerque and   
                   Tatsuya Suda   Source-adaptive multilayered multicast
                                  algorithms for real-time video
                                  distribution . . . . . . . . . . . . . . 720--733
       Paolo Narváez and   
              Kai-Yeung Siu and   
                  Hong-Yi Tzeng   New dynamic algorithms for shortest path
                                  tree computation . . . . . . . . . . . . 734--746
                 Yuhong Zhu and   
          George N. Rouskas and   
                Harry G. Perros   A path decomposition approach for
                                  computing blocking probabilities in
                                  wavelength-routing networks  . . . . . . 747--762
                  Eric Noel and   
                  K. Wendy Tang   Performance modeling of multihop network
                                  subject to uniform and nonuniform
                                  geometric traffic  . . . . . . . . . . . 763--774
               Reuven Cohen and   
                Gideon Kaempfer   On the cost of virtual private networks  775--784
          Frederico Cal\`\i and   
                Marco Conti and   
                 Enrico Gregori   Dynamic tuning of the IEEE 802.11
                                  protocol to achieve a theoretical
                                  throughput limit . . . . . . . . . . . . 785--799
           Milosh Ivanovich and   
             Moshe Zukerman and   
                 Fraser Cameron   A study of deadlock models for a
                                  multiservice medium access protocol
                                  employing a Slotted Aloha signalling
                                  channel  . . . . . . . . . . . . . . . . 800--811


IEEE\slash ACM Transactions on Networking
Volume 9, Number 1, 2001

         Gustavo De Veciana and   
      Takis Konstantopoulos and   
                    Tae-Jin Lee   Stability and performance analysis of
                                  networks supporting elastic services . . 2--14
       Santosh Paul Abraham and   
                   Anurag Kumar   A new approach for asynchronous
                                  distributed rate control of elastic
                                  sessions in integrated packet networks   15--30
                 Ikjun Yeom and   
          A. L. Narasimha Reddy   Modeling TCP behavior in a
                                  differentiated services network  . . . . 31--46
              Thierry Chich and   
          Pierre Fraigniaud and   
                  Johanne Cohen   Unslotted deflection routing: a
                                  practical and efficient protocol for
                                  multihop optical networks  . . . . . . . 47--59
                Guangzhi Li and   
                    Rahul Simha   On the wavelength assignment problem in
                                  multifiber WDM star and ring networks    60--68
                Faisal Shad and   
            Terence D. Todd and   
                Vytas Kezys and   
                     John Litva   Dynamic slot allocation (DSA) in indoor
                                  SDMA/TDMA using smart antenna
                                  basestation  . . . . . . . . . . . . . . 69--81
            Baruch Awerbuch and   
                  Yuval Shavitt   Topology aggregation for directed graphs 82--90
                Mario Gerla and   
            Emilio Leonardi and   
                 Fabio Neri and   
               Prasasth Palnati   Routing in the bidirectional shufflenet  91--103
            Emilio Leonardi and   
               Marco Mellia and   
                 Fabio Neri and   
            Marco Ajmone Marsan   On the stability of input-queued
                                  switches with speed-up . . . . . . . . . 104--118

IEEE\slash ACM Transactions on Networking
Volume 9, Number 2, 2001

             S.-H Gary Chan and   
                   Fouad Tobagi   Distributed servers architecture for
                                  networked video services . . . . . . . . 125--136
                Eylem Ekici and   
            Ian F. Akyildiz and   
              Michael D. Bender   A distributed routing algorithm for
                                  datagram traffic in LEO satellite
                                  networks . . . . . . . . . . . . . . . . 137--147
  Srikanth V. Krishnamurthy and   
        Anthony S. Acampora and   
                  Michele Zorzi   Polling-based media access protocols for
                                  use with smart adaptive array antennas   148--161
               Anees Shaikh and   
           Jennifer Rexford and   
                   Kang G. Shin   Evaluating the impact of stale link
                                  state on quality-of-service routing  . . 162--176
            Katsuyoshi Iida and   
             Tetsuya Takine and   
            Hideki Sunahara and   
                       Yuji Oie   Delay analysis for CBR traffic under
                                  static-priority scheduling . . . . . . . 177--185
     Rajesh M. Krishnaswamy and   
             Kumar N. Sivarajan   Design of logical topologies: a linear
                                  formulation for wavelength-routed
                                  optical networks with no wavelength
                                  changers . . . . . . . . . . . . . . . . 186--198
                 Jingyu Qiu and   
             Edward W. Knightly   Measurement-based admission control with
                                  aggregate traffic envelopes  . . . . . . 199--210
                Shahrokh Valaee   A recursive estimator of worst-case
                                  burstiness . . . . . . . . . . . . . . . 211--222

IEEE\slash ACM Transactions on Networking
Volume 9, Number 3, June, 2001

              Stefan Savage and   
            David Wetherall and   
                Anna Karlin and   
                   Tom Anderson   Network support for IP traceback . . . . 226--237
               Paul Barford and   
                  Mark Crovella   Critical path analysis of TCP
                                  transactions . . . . . . . . . . . . . . 238--248
        Mikkel Christiansen and   
               Kevin Jeffay and   
                  David Ott and   
              F. Donelson Smith   Tuning RED for Web traffic . . . . . . . 249--264
              Anja Feldmann and   
           Albert Greenberg and   
               Carsten Lund and   
              Nick Reingold and   
           Jennifer Rexford and   
                      Fred True   Deriving traffic demands for operational
                                  IP networks: methodology and experience  265--280
             N. G. Duffield and   
          Matthias Grossglauser   Trajectory sampling for direct traffic
                                  observation  . . . . . . . . . . . . . . 280--292
             Craig Labovitz and   
                 Abha Ahuja and   
               Abhijit Bose and   
                Farnam Jahanian   Delayed Internet routing convergence . . 293--306
            Ian F. Akyildiz and   
           Giacomo Morabito and   
                 Sergio Palazzo   TCP-Peach: a new congestion control
                                  scheme for satellite IP networks . . . . 307--321
                 Song Chong and   
                 Sangho Lee and   
                    Sungho Kang   A simple, scalable, and stable explicit
                                  rate allocation algorithm for MAX-MIN
                                  flow control with minimum rate guarantee 322--335
         Vincent W. S. Wong and   
              Mark E. Lewis and   
             Victor C. M. Leung   Stochastic control of path optimization
                                  for inter-switch handoffs in wireless
                                  ATM networks . . . . . . . . . . . . . . 336--350
                   J. Siwko and   
                       I. Rubin   Connection admission control for
                                  capacity-varying networks with
                                  stochastic capacity change times . . . . 351--360
                Hairong Sun and   
                 Xinyu Zang and   
              Kishor S. Trivedi   Performance of broadcast and unknown
                                  server (BUS) in ATM LAN emulation  . . . 361--372
                Verus Pronk and   
                      Jan Korst   Comments on ``Carry-over Round Robin: A
                                  Simple Cell Scheduling Mechanism for ATM
                                  networks'' . . . . . . . . . . . . . . . 373--373

IEEE\slash ACM Transactions on Networking
Volume 9, Number 4, August, 2001

          Sanjay Shakkottai and   
               Anurag Kumar and   
              Aditya Karnik and   
                   Ajit Anvekar   TCP performance over end-to-end rate
                                  control and stochastic available
                                  capacity . . . . . . . . . . . . . . . . 377--391
                Sally Floyd and   
                    Vern Paxson   Difficulties in simulating the Internet  392--403
            Pablo Rodriguez and   
          Christian Spanner and   
              Ernst W. Biersack   Analysis of Web caching architectures:
                                  hierarchical and distributed caching . . 404--418
            Ian F. Akyildiz and   
                 Inwhee Joe and   
               Henry Driver and   
                   Yung-Lung Ho   An adaptive FEC scheme for data traffic
                                  in wireless ATM networks . . . . . . . . 419--426
            Zygmunt J. Haas and   
               Marc R. Pearlman   The performance of query control schemes
                                  for the zone routing protocol  . . . . . 427--438
                Oran Sharon and   
                   Eitan Altman   An efficient polling MAC for wireless
                                  LANs . . . . . . . . . . . . . . . . . . 439--451
              Zhi-Ren Chang and   
                I-Chung Lee and   
          Cheng-Shang Chang and   
              Chien-Hsin Li and   
                     Ben-Li Sui   A novel scheme using the information of
                                  departure processes for delay guarantees
                                  of distributed VBR traffic . . . . . . . 452--463
              Arnaud Legout and   
     Jörg Nonnenmacher and   
              Ernst W. Biersack   Bandwidth-allocation policies for
                                  unicast and multicast flows  . . . . . . 464--478
          Shalabh Bhatnagar and   
              Michael C. Fu and   
           Steven I. Marcus and   
                 Pedram J. Fard   Optimal structured feedback policies for
                                  ABR flow control using two-timescale
                                  SPSA . . . . . . . . . . . . . . . . . . 479--491
             Yishay Mansour and   
               Boaz Patt-Shamir   Jitter control in QoS networks . . . . . 492--502
           Jonathan P. Lang and   
              Vishal Sharma and   
        Emmanouel A. Varvarigos   An analysis of oblivious and adaptive
                                  routing in optical networks with
                                  wavelength translation . . . . . . . . . 503--517
               Xiaojun Shen and   
                   Fan Yang and   
                         Yi Pan   Equivalent permutation capabilities
                                  between time-division optical omega
                                  networks and non-optical extra-stage
                                  omega networks . . . . . . . . . . . . . 518--524

IEEE\slash ACM Transactions on Networking
Volume 9, Number 5, October, 2001

               Paul Francis and   
                Sugih Jamin and   
                  Cheng Jin and   
                  Yixin Jin and   
                  Danny Raz and   
              Yuval Shavitt and   
                    Lixia Zhang   IDMaps: a global Internet host distance
                                  estimation service . . . . . . . . . . . 525--540
     Maurizio A. Bonuccelli and   
               M. Claudia Cl\`o   Scheduling of real-time messages in
                                  optical broadcast-and-select networks    541--552
                   G. Mohan and   
         C. Siva Ram Murthy and   
                 Arun K. Somani   Efficient algorithms for routing
                                  dependable connections in WDM optical
                                  networks . . . . . . . . . . . . . . . . 553--566
              Ayan Banerjee and   
            Ronald A. Iltis and   
        Emmanouel A. Varvarigos   Performance evaluation for a
                                  quasi-synchronous packet radio network
                                  (QSPNET) . . . . . . . . . . . . . . . . 567--577
                   Qiong Li and   
                 David L. Mills   Jitter-based delay-boundary prediction
                                  of wide-area networks  . . . . . . . . . 578--590
             Brahim Bensaou and   
          Danny H. K. Tsang and   
                 King Tung Chan   Credit-based fair queueing (CBFQ): a
                                  simple service-scheduling algorithm for
                                  packet-switched networks . . . . . . . . 591--604
           Vahid Tabatabaee and   
        Leonidas Georgiadis and   
             Leandros Tassiulas   QoS provisioning and tracking fluid
                                  policies in input queueing switches  . . 605--617
              Cory C. Beard and   
                Victor S. Frost   Prioritized resource allocation for
                                  stressed networks  . . . . . . . . . . . 618--633
                   Sheng Ma and   
                     Chuanyi Ji   Modeling heterogeneous network traffic
                                  in wavelet domain  . . . . . . . . . . . 634--649
    Manolis G. H. Katevenis and   
          Iakovos Mavroidis and   
        Georgios Sapountzis and   
            Eva Kalyvianaki and   
          Ioannis Mavroidis and   
           Georgios Glykopoulos   Wormhole IP over (connectionless) ATM    650--661
                  Yiu Kwok Tham   A unified algorithmic framework for
                                  variable-rate TDM switching assignments  662--668
     Efstratios Thomopoulos and   
            Louise E. Moser and   
         Peter M. Melliar-Smith   Latency analysis of the totem
                                  single-ring protocol . . . . . . . . . . 669--680

IEEE\slash ACM Transactions on Networking
Volume 9, Number 6, December, 2001

                  Lixin Gao and   
               Jennifer Rexford   Stable Internet routing without global
                                  coordination . . . . . . . . . . . . . . 681--692
                Yehuda Afek and   
          Anat Bremler-Barr and   
               Sariel Har-Peled   Routing with a clue  . . . . . . . . . . 693--705
       Paolo Narváez and   
              Kai-Yeung Siu and   
                  Hong-Yi Tzeng   New dynamic SPT algorithm based on a
                                  ball-and-string model  . . . . . . . . . 706--718
           Piet Van Mieghem and   
        Gerard Hooghiemstra and   
          Remco van der Hofstad   On the efficiency of multicast . . . . . 719--732
                      Lixin Gao   On inferring autonomous system
                                  relationships in the Internet  . . . . . 733--745
                 Weilian Su and   
                Ian F. Akyildiz   The jitter time-stamp approach for clock
                                  recovery of real-time variable bit-rate
                                  traffic  . . . . . . . . . . . . . . . . 746--754
                 Han S. Kim and   
                 Ness B. Shroff   Loss probability calculations and
                                  asymptotic analysis for finite buffer
                                  multiplexers . . . . . . . . . . . . . . 755--768
          Hannu Rummukainen and   
                  Jorma Virtamo   Polynomial cost approximations in Markov
                                  decision theory based call admission
                                  control  . . . . . . . . . . . . . . . . 769--779
         R. Radhakrishna Pillai   A distributed overload control algorithm
                                  for delay-bounded call setup . . . . . . 780--789
                Mingbo Xiao and   
             Ness B. Shroff and   
              Edwin K. P. Chong   Distributed admission control for
                                  power-controlled cellular wireless
                                  systems  . . . . . . . . . . . . . . . . 790--800
        Matthew K. H. Leung and   
             John C. S. Lui and   
                David K. Y. Yau   Adaptive proportional delay
                                  differentiated services:
                                  characterization and performance
                                  evaluation . . . . . . . . . . . . . . . 801--817
              Ramesh Johari and   
             David Kim Hong Tan   End-to-end congestion control for the
                                  Internet: delays and stability . . . . . 818--832
               James Begole and   
           Randall B. Smith and   
           Craig A. Struble and   
            Clifford A. Shaffer   Resource sharing for replicated
                                  synchronous groupware  . . . . . . . . . 833--843


IEEE\slash ACM Transactions on Networking
Volume 10, Number 1, February, 2002

               Mostafa H. Ammar   Editorial  . . . . . . . . . . . . . . . 1--1
                Erich Nahum and   
           Tsipora Barzilai and   
               Dilip D. Kandlur   Performance issues in WWW servers  . . . 2--11
      Constantinos Dovrolis and   
        Dimitrios Stiliadis and   
        Parameswaran Ramanathan   Proportional differentiated services:
                                  delay differentiation and packet
                                  scheduling . . . . . . . . . . . . . . . 12--26
           Martin Reisslein and   
              Keith W. Ross and   
             Srinivas Rajagopal   A framework for guaranteeing statistical
                                  QoS  . . . . . . . . . . . . . . . . . . 27--42
              Jorge Arturo Cobb   Preserving quality of service guarantees
                                  in spite of flow aggregation . . . . . . 43--53
                Shuqian Yan and   
         Michalis Faloutsos and   
                Anindo Banerjea   QoS-aware multicast routing for the
                                  Internet: the design and evaluation of
                                  QoSMIC . . . . . . . . . . . . . . . . . 54--66
                   Xi Zhang and   
               Kang G. Shin and   
              Debanjan Saha and   
               Dilip D. Kandlur   Scalable flow control for multicast ABR
                                  services in ATM networks . . . . . . . . 67--85
              Rung-Hung Gau and   
            Zygmunt J. Haas and   
         Bhaskar Krishnamachari   On multicast flow control for
                                  heterogeneous receivers  . . . . . . . . 86--101
             Dean H. Lorenz and   
                     Ariel Orda   Optimal partition of QoS requirements on
                                  unicast paths and multicast trees  . . . 102--114
                Aref Meddeb and   
        André Girard and   
            Catherine Rosenberg   The impact of point-to-multipoint
                                  traffic concentration on multirate
                                  networks design  . . . . . . . . . . . . 115--124
               Guoqiang Mao and   
                Daryoush Habibi   Loss performance analysis for
                                  heterogeneous \sc ON-OFF sources with
                                  application to connection admission
                                  control  . . . . . . . . . . . . . . . . 125--138
      Srivatsan Varadarajan and   
                Hung Q. Ngo and   
             Jaideep Srivastava   Error spreading: a perception-driven
                                  approach to handling error in continuous
                                  media streaming  . . . . . . . . . . . . 139--152
       Muriel Médard and   
           Richard A. Barry and   
             Steven G. Finn and   
                   Wenbo He and   
              Steven S. Lumetta   Generalized loop-back recovery in
                                  optical mesh networks  . . . . . . . . . 153--164

IEEE\slash ACM Transactions on Networking
Volume 10, Number 2, April, 2002

             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   The impact of multicast layering on
                                  network fairness . . . . . . . . . . . . 169--182
                Eylem Ekici and   
            Ian F. Akyildiz and   
              Michael D. Bender   A multicast routing algorithm for LEO
                                  satellite IP networks  . . . . . . . . . 183--192
              Mark A. Smith and   
             K. K. Ramakrishnan   Formal specification and verification of
                                  safety and performance of TCP selective
                                  acknowledgment . . . . . . . . . . . . . 193--207
                 Xi-Ren Cao and   
              Hong-Xia Shen and   
             Rodolfo Milito and   
                  Patrica Wirth   Internet pricing with a game theoretical
                                  approach: concepts and examples  . . . . 208--216
     Costas A. Courcoubetis and   
            Antonis Dimakis and   
            George D. Stamoulis   Traffic equivalence and substitution in
                                  a multiplexer with applications to
                                  dynamic available capacity estimation    217--231
         Timothy G. Griffin and   
          F. Bruce Shepherd and   
                 Gordon Wilfong   The stable paths problem and interdomain
                                  routing  . . . . . . . . . . . . . . . . 232--243
                       Xin Yuan   Heuristic algorithms for
                                  multiconstrained quality-of-service
                                  routing  . . . . . . . . . . . . . . . . 244--256
                      Si Wu and   
         K. Y. Michael Wong and   
                          Bo Li   A dynamic call admission policy with
                                  precision QoS guarantee using stochastic
                                  control for mobile wireless networks . . 257--271
              Richard J. La and   
              Venkat Anantharam   Utility-based rate control in the
                                  Internet for elastic traffic . . . . . . 272--286
         Aleksandra Smiljani\'c   Flexible bandwidth allocation in
                                  high-capacity packet switches  . . . . . 287--293

IEEE\slash ACM Transactions on Networking
Volume 10, Number 3, June, 2002

             Suchitra Raman and   
          Hari Balakrishnan and   
              Murari Srinivasan   ITP: an Image Transport Protocol for the
                                  Internet . . . . . . . . . . . . . . . . 297--307
           Mohamed G. Gouda and   
    E. N. (Mootaz) Elnozahy and   
            Chin-Tser Huang and   
               Tommy M. McGuire   Hop integrity in computer networks . . . 308--319
   Laurent Massoulié and   
                  James Roberts   Bandwidth sharing: objectives and
                                  algorithms . . . . . . . . . . . . . . . 320--328
            Jean-Yves Le Boudec   Some properties of variable length
                                  packet shapers . . . . . . . . . . . . . 329--337
        Lampros Kalampoukas and   
               Anujan Varma and   
             K. K. Ramakrishnan   Explicit window adaptation: a method to
                                  enhance TCP performance  . . . . . . . . 338--350
            Ramu Ramamurthy and   
            Biswanath Mukherjee   Fixed-alternate routing and wavelength
                                  conversion in wavelength-routed optical
                                  networks . . . . . . . . . . . . . . . . 351--367
             Ellen L. Hahne and   
           Abhijit K. Choudhury   Dynamic queue length thresholds for
                                  multiple loss priorities . . . . . . . . 368--380
             Dan Rubenstein and   
                 Jim Kurose and   
                    Don Towsley   Detecting shared congestion of flows via
                                  end-to-end measurement . . . . . . . . . 381--395
        Ramachandran Ramjee and   
            Kannan Varadhan and   
            Luca Salgarelli and   
            Sandra R. Thuel and   
             Shie-Yuan Wang and   
                Thomas La Porta   HAWAII: a domain-based approach for
                                  supporting mobility in wide-area
                                  wireless networks  . . . . . . . . . . . 396--410
            Ian F. Akyildiz and   
                Eylem Ekici and   
              Michael D. Bender   MLSR: a novel routing algorithm for
                                  multilayered satellite IP networks . . . 411--424
    Ioannis Ch. Paschalidis and   
                       Yong Liu   Pricing in multiservice loss networks:
                                  static pricing, asymptotic optimality,
                                  and demand substitution effects  . . . . 425--438

IEEE\slash ACM Transactions on Networking
Volume 10, Number 4, August, 2002

       Konstantinos Psounis and   
               Balaji Prabhakar   Efficient randomized web-cache
                                  replacement schemes using samples from
                                  past eviction times  . . . . . . . . . . 441--455
            Pablo Rodriguez and   
              Ernst W. Biersack   Dynamic parallel access to replicated
                                  content in the Internet  . . . . . . . . 455--465
               Jack Brassil and   
            Henning Schulzrinne   Structuring Internet media streams with
                                  cueing protocols . . . . . . . . . . . . 466--476
      Matthias Grossglauser and   
                David N. C. Tse   Mobility increases the capacity of ad
                                  hoc wireless networks  . . . . . . . . . 477--486
       Elif Uysal-Biyikoglu and   
           Balaji Prabhakar and   
                 Abbas El Gamal   Energy-efficient packet transmission
                                  over a wireless link . . . . . . . . . . 487--499
        Augustin Chaintreau and   
   François Baccelli and   
                Christophe Diot   Impact of TCP-like congestion control on
                                  the throughput of multicast groups . . . 500--512
              Wu-chang Feng and   
               Kang G. Shin and   
           Dilip D. Kandlur and   
                  Debanjan Saha   The \sc BLUE active queue management
                                  algorithms . . . . . . . . . . . . . . . 513--528
          Jon C. R. Bennett and   
                Kent Benson and   
                Anna Charny and   
        William F. Courtney and   
            Jean-Yves Le Boudec   Delay jitter bounds and packet scale
                                  rate guarantee for expedited forwarding  529--540
João Luís Sobrinho   Algebra and algorithms for QoS path
                                  computation and hop-by-hop routing in
                                  the Internet . . . . . . . . . . . . . . 541--550
                Lavy Libman and   
                     Ariel Orda   Optimal retrial and timeout strategies
                                  for accessing network resources  . . . . 551--564
                 Amit Kumar and   
             Rajeev Rastogi and   
           Avi Silberschatz and   
                   Bulent Yener   Algorithms for provisioning virtual
                                  private networks in the hose model . . . 565--578
             Yann d'Halluin and   
           Peter A. Forsyth and   
              Kenneth R. Vetzal   Managing capacity for telecommunications
                                  networks under uncertainty . . . . . . . 579--587

IEEE\slash ACM Transactions on Networking
Volume 10, Number 5, October, 2002

               Jaeyeon Jung and   
                   Emil Sit and   
          Hari Balakrishnan and   
                  Robert Morris   DNS performance and the effectiveness of
                                  caching  . . . . . . . . . . . . . . . . 589--603
           Michael Mitzenmacher   Compressed bloom filters . . . . . . . . 604--612
         Roch Guérin and   
                     Ariel Orda   Computing shortest paths for any number
                                  of hops  . . . . . . . . . . . . . . . . 613--620
        Ran Libeskind-Hadas and   
                    Rami Melhem   Multicast routing and wavelength
                                  assignment in multihop optical networks  621--629
               Zoe Antoniou and   
            Ioannis Stavrakakis   An efficient deadline-credit-based
                                  transport scheme for prerecorded
                                  semisoft continuous media applications   630--643
           Franco Blanchini and   
            Renato Lo Cigno and   
                  Roberto Tempo   Robust rate control for integrated
                                  services packet networks . . . . . . . . 644--652
              Saad Mneimneh and   
              Vishal Sharma and   
                  Kai-Yeung Siu   Switching using parallel input-output
                                  queued switches with no speedup  . . . . 653--665
        Marco Ajmone Marsan and   
              Andrea Bianco and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                     Fabio Neri   Packet-mode scheduling in input-queued
                                  cell-based switches  . . . . . . . . . . 666--678
             N. G. Duffield and   
                Pawan Goyal and   
           Albert Greenberg and   
              Partho Mishra and   
         K. K. Ramakrishnan and   
       Jacobus E. van der Merwe   Resource management with hoses:
                                  point-to-cloud services for virtual
                                  private networks . . . . . . . . . . . . 679--692
                  Young Lee and   
                  James M. Tien   Static and dynamic approaches to
                                  modeling end-to-end routing in
                                  circuit-switched networks  . . . . . . . 693--705

IEEE\slash ACM Transactions on Networking
Volume 10, Number 6, December, 2002

            Colleen Shannon and   
                David Moore and   
                   K. C. Claffy   Beyond folklore: observations on
                                  fragmented traffic . . . . . . . . . . . 709--720
            Alex C. Snoeren and   
            Craig Partridge and   
            Luis A. Sanchez and   
         Christine E. Jones and   
        Fabrice Tchakountio and   
           Beverly Schwartz and   
            Stephen T. Kent and   
             W. Timothy Strayer   Single-packet IP traceback . . . . . . . 721--734
      Evangelos P. Markatos and   
 Dionisios N. Pnevmatikatos and   
         Michail D. Flouris and   
        Manolis G. H. Katevenis   Web-conscious storage management for Web
                                  proxies  . . . . . . . . . . . . . . . . 735--748
             Yigal Bejerano and   
               Israel Cidon and   
            Joseph (Seffi) Naor   Efficient handoff rerouting algorithms:
                                  a competitive on-line algorithmic
                                  approach . . . . . . . . . . . . . . . . 749--760
        Francesco Lo Presti and   
             N. G. Duffield and   
               Joe Horowitz and   
                    Don Towsley   Multicast-based inference of
                                  network-internal delay distributions . . 761--775
                Chengzhi Li and   
             Edward W. Knightly   Coordinated multihop scheduling: a
                                  framework for end-to-end services  . . . 776--789
         Srihari Nelakuditi and   
               Zhi Li Zhang and   
              Rose P. Tsang and   
                 David H. C. Du   Adaptive proportional routing: a
                                  localized QoS routing approach . . . . . 790--804
          Cheng Shang Chang and   
               Rene L. Cruz and   
        Jean Yves Le Boudec and   
                 Patrick Thiran   A min,+ system theory for constrained
                                  traffic regulation and dynamic service
                                  guarantees . . . . . . . . . . . . . . . 805--817
        Leonidas Georgiadis and   
           Panos Georgatsos and   
        Konstantinos Floros and   
            Stelios Sartzetakis   Lexicographically optimal balanced
                                  networks . . . . . . . . . . . . . . . . 818--829
                   Eiji Oki and   
               Zhigang Jing and   
        Roberto Rojas-Cessa and   
               H. Jonathan Chao   Concurrent round-robin-based dispatching
                                  schemes for Clos-network switches  . . . 830--844


IEEE\slash ACM Transactions on Networking
Volume 11, Number 1, February, 2003

                  Mostafa Ammar   Editorial  . . . . . . . . . . . . . . . 1--1
   Chalermek Intanagonwiwat and   
            Ramesh Govindan and   
             Deborah Estrin and   
             John Heidemann and   
                    Fabio Silva   Directed diffusion for wireless sensor
                                  networking . . . . . . . . . . . . . . . 2--16
                 Ion Stoica and   
              Robert Morris and   
         David Liben-Nowell and   
            David R. Karger and   
          M. Frans Kaashoek and   
                Frank Dabek and   
              Hari Balakrishnan   Chord: a scalable peer-to-peer lookup
                                  protocol for Internet applications . . . 17--32
                 Ion Stoica and   
              Scott Shenker and   
                      Hui Zhang   \em Core-stateless fair queueing: a
                                  scalable architecture to approximate
                                  fair bandwidth allocations in high-speed
                                  networks . . . . . . . . . . . . . . . . 33--46
             Alfio Lombardo and   
              Giovanni Schembra   Performance evaluation of an
                                  adaptive-rate MPEG encoder matching
                                  intserv traffic constraints  . . . . . . 47--65
               Neil J. Keon and   
                G. Anandalingam   Optimal pricing for multiple services in
                                  telecommunications networks offering
                                  quality-of-service guarantees  . . . . . 66--80
      Krishna Phani Gummadi and   
  Madhavarapu Jnana Pradeep and   
             C. Siva Ram Murthy   An efficient primary-segmented backup
                                  scheme for dependable real-time
                                  communication in multihop networks . . . 81--94
                   Jiafu He and   
                Khosrow Sohraby   An extended combinatorial analysis
                                  framework for discrete-time queueing
                                  systems with general sources . . . . . . 95--110
              R. Srinivasan and   
                 Arun K. Somani   On achieving fairness and efficiency in
                                  high-speed shared medium access  . . . . 111--124
                  Qing Zhao and   
                      Lang Tong   A multiqueue service room MAC protocol
                                  for wireless networks with multipacket
                                  reception  . . . . . . . . . . . . . . . 125--137
           Michael J. Neely and   
              Eytan Modiano and   
               Charles E. Rohrs   Power allocation and routing in
                                  multibeam satellites with time-varying
                                  channels . . . . . . . . . . . . . . . . 138--152
         Robert C. Chalmers and   
              Kevin C. Almeroth   On the topology of multicast trees . . . 153--165
            Joshua Auerbach and   
                Madan Gopal and   
                Marc Kaplan and   
                    Shay Kutten   Multicast group membership management    166--175

IEEE\slash ACM Transactions on Networking
Volume 11, Number 2, April, 2003

             Rajeev Rastogi and   
             Yuri Breitbart and   
          Minos Garofalakis and   
                     Amit Kumar   Optimal configuration of OSPF aggregates 181--194
            Anirban Mahanti and   
             Derek L. Eager and   
             Mary K. Vernon and   
       David J. Sundaram-Stukel   Scalable on-demand media streaming with
                                  packet loss recovery . . . . . . . . . . 195--209
                Mingbo Xiao and   
             Ness B. Shroff and   
              Edwin K. P. Chong   A utility-based power-control scheme in
                                  wireless cellular systems  . . . . . . . 210--221
               Do Young Eun and   
                 Ness B. Shroff   A measurement-analytic approach for QoS
                                  estimation in a network based on the
                                  dominant time scale  . . . . . . . . . . 222--235
Aysegül Gençata and   
            Biswanath Mukherjee   Virtual-topology adaptation for WDM mesh
                                  networks under dynamic traffic . . . . . 236--247
                   Hui Zang and   
                  Canhui Ou and   
            Biswanath Mukherjee   Path-protection routing and wavelength
                                  assignment (RWA) in WDM mesh networks
                                  under duct-layer constraints . . . . . . 248--258
         Asuman E. Ozdaglar and   
           Dimitri P. Bertsekas   Routing and wavelength assignment in
                                  optical networks . . . . . . . . . . . . 259--272
                   Kayi Lee and   
                  Kai-Yeung Siu   On the reconfigurability of single-hub
                                  WDM ring networks  . . . . . . . . . . . 273--284
                Hongyue Zhu and   
                   Hui Zang and   
                  Keyao Zhu and   
            Biswanath Mukherjee   A novel generic graph model for traffic
                                  grooming in heterogeneous WDM mesh
                                  networks . . . . . . . . . . . . . . . . 285--299
             Michael Dahlin and   
Bharat Baddepudi V. Chandra and   
                    Lei Gao and   
                    Amol Nayate   End-to-end WAN service availability  . . 300--313
                Sundar Iyer and   
                Nick W. McKeown   Analysis of the parallel packet switch
                                  architecture . . . . . . . . . . . . . . 314--324
               Man Chi Chan and   
                    Tony T. Lee   Statistical performance guarantees in
                                  large-scale cross-path packet switch . . 325--337
              Andrzej Karbowski   Comments on ``Optimization flow control,
                                  I: Basic algorithm and convergence'' . . 338--339

IEEE\slash ACM Transactions on Networking
Volume 11, Number 3, June, 2003

                Shudong Jin and   
                  Liang Guo and   
              Ibrahim Matta and   
                 Azer Bestavros   A spectrum of TCP-friendly window-based
                                  congestion control algorithms  . . . . . 341--355
                 Jim Martin and   
               Arne Nilsson and   
                    Injong Rhee   Delay-based congestion avoidance for TCP 356--369
               Farooq Anjum and   
             Leandros Tassiulas   Comparative study of various TCP
                                  versions over a wireless link with
                                  correlated losses  . . . . . . . . . . . 370--383
             Turgay Korkmaz and   
                   Marwan Krunz   Bandwidth-delay constrained path
                                  selection under inaccurate state
                                  information  . . . . . . . . . . . . . . 384--398
            Murali Kodialam and   
                 T. V. Lakshman   Dynamic routing of restorable
                                  bandwidth-guaranteed tunnels using
                                  aggregated network resource usage
                                  information  . . . . . . . . . . . . . . 399--410
          David Starobinski and   
             Mark Karpovsky and   
               Lev A. Zakrevski   Application of network calculus to
                                  general topologies using
                                  turn-prohibition . . . . . . . . . . . . 411--421
                 Huirong Fu and   
             Edward W. Knightly   A simple model of real-time flow
                                  aggregation  . . . . . . . . . . . . . . 422--435
                   Xi Zhang and   
                   Kang G. Shin   Delay analysis of
                                  feedback-synchronization signaling for
                                  multicast flow control . . . . . . . . . 436--450
                Mario Baldi and   
                     Yoram Ofek   A comparison of ring and tree embedding
                                  for real-time group multicast  . . . . . 451--464
        Marco Ajmone Marsan and   
              Andrea Bianco and   
             Paolo Giaccone and   
            Emilio Leonardi and   
                     Fabio Neri   Multicast traffic in input-queued
                                  switches: optimal scheduling and maximum
                                  throughput . . . . . . . . . . . . . . . 465--477
                Hakyong Kim and   
                     Kiseon Kim   Performance analysis of the multiple
                                  input-queued packet switch with the
                                  restricted rule  . . . . . . . . . . . . 478--487
                Alvin C. Fu and   
              Eytan Modiano and   
             John N. Tsitsiklis   Optimal energy allocation and admission
                                  control for communications satellites    488--500
           Andrea Fumagalli and   
           Isabella Cerutti and   
                    Marco Tacca   Optimal design of survivable mesh
                                  networks based on line switched WDM
                                  self-healing rings . . . . . . . . . . . 501--512

IEEE\slash ACM Transactions on Networking
Volume 11, Number 4, August, 2003

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 513--513
            Georgos Siganos and   
         Michalis Faloutsos and   
           Petros Faloutsos and   
             Christos Faloutsos   Power laws and the AS-level Internet
                                  topology . . . . . . . . . . . . . . . . 514--524
                  Steven H. Low   A duality model of TCP and queue
                                  management algorithms  . . . . . . . . . 525--536
                Manish Jain and   
          Constantinos Dovrolis   End-to-end available bandwidth:
                                  measurement methodology, dynamics, and
                                  relation with TCP throughput . . . . . . 537--549
      Matthias Grossglauser and   
                David N. C. Tse   A time-scale decomposition approach to
                                  measurement-based admission control  . . 550--563
            Dmitri Loguinov and   
                   Hayder Radha   End-to-end rate-based congestion
                                  control: convergence properties and
                                  scalability analysis . . . . . . . . . . 564--577
                 Ariel Orda and   
            Alexander Sprintson   Precomputation schemes for QoS routing   578--591
          Hemant M. Chaskar and   
                Upamanyu Madhow   Fair scheduling with tunable latency: a
                                  round-robin approach . . . . . . . . . . 592--601
             John N. Daigle and   
Marcos Nascimento Magalhães   Analysis of packet networks having
                                  contention-based reservation with
                                  application to GPRS  . . . . . . . . . . 602--615
        Roberto Rojas-Cessa and   
                   Eiji Oki and   
               H. Jonathan Chao   Concurrent fault detection for a
                                  multiple-plane packet switch . . . . . . 616--627
         Mihail L. Sichitiu and   
             Peter H. Bauer and   
               Kamal Premaratne   The effect of uncertain time-variant
                                  delays in ATM networks with explicit
                                  rate feedback: a control theoretic
                                  approach . . . . . . . . . . . . . . . . 628--637
            Uttam K. Sarkar and   
   Subramanian Ramakrishnan and   
                   Dilip Sarkar   Modeling full-length video using
                                  Markov-modulated Gamma-based framework   638--649
               Sartaj Sahni and   
                    Kun Suk Kim   Efficient construction of multibit tries
                                  for IP lookup  . . . . . . . . . . . . . 650--662
           Mohamed G. Gouda and   
                Marco Schneider   Maximizable routing metrics  . . . . . . 663--675
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Online multicast routing with bandwidth
                                  guarantees: a new approach using
                                  multicast network flow . . . . . . . . . 676--686

IEEE\slash ACM Transactions on Networking
Volume 11, Number 5, October, 2003

         Srisankar Kunniyur and   
                     R. Srikant   End-to-end congestion control schemes:
                                  utility functions, random losses and ECN
                                  marks  . . . . . . . . . . . . . . . . . 689--702
                   Song Cen and   
           Pamela C. Cosman and   
            Geoffrey M. Voelker   End-to-end differentiation of congestion
                                  and wireless losses  . . . . . . . . . . 703--717
                  Ben Liang and   
                Zygmunt J. Haas   Predictive distance-based mobility
                                  management for multidimensional PCS
                                  networks . . . . . . . . . . . . . . . . 718--732
                  Peter Marbach   Priority service and max-min fairness    733--746
      Athina P. Markopoulou and   
            Fouad A. Tobagi and   
               Mansour J. Karam   Assessing the quality of voice
                                  communications over Internet backbones   747--760
                Guangzhi Li and   
               Dongmei Wang and   
           Charles Kalmanek and   
              Robert Doverspike   Efficient distributed restoration path
                                  selection for shared mesh restoration    761--771
                Koushik Kar and   
            Murali Kodialam and   
                 T. V. Lakshman   Routing restorable bandwidth guaranteed
                                  connections using maximum $2$-route
                                  flows  . . . . . . . . . . . . . . . . . 772--781
               Ralf Koetter and   
           Muriel Médard   An algebraic approach to network coding  782--795
           Mariusz A. Fecko and   
          M. Ümit Uyar and   
               Ali Y. Duale and   
                   Paul D. Amer   A technique to generate feasible tests
                                  for communications systems with multiple
                                  timers . . . . . . . . . . . . . . . . . 796--809
        Jean-Yves Le Boudec and   
                    Anna Charny   Packet scale rate guarantee for non-FIFO
                                  nodes  . . . . . . . . . . . . . . . . . 810--820
                  Sem Borst and   
             Michel Mandjes and   
             Miranda van Uitert   Generalized processor sharing with
                                  light-tailed and heavy-tailed input  . . 821--834
               Brian Towles and   
               William J. Dally   Guaranteed scheduling for switches with
                                  configuration overhead . . . . . . . . . 835--847
            Matthew Andrews and   
                     Lisa Zhang   Achieving stability in networks of
                                  input-queued switches  . . . . . . . . . 848--857
              Saad Mneimneh and   
                  Kai-Yeung Siu   On achieving throughput in an
                                  input-queued switch  . . . . . . . . . . 858--867

IEEE\slash ACM Transactions on Networking
Volume 11, Number 6, December, 2003

                   Ellen Zegura   Editorial  . . . . . . . . . . . . . . . 869--869
               Zhenhai Duan and   
               Zhi-Li Zhang and   
               Yiwei Thomas Hou   Service overlay networks: SLAs, QoS, and
                                  bandwidth provisioning . . . . . . . . . 870--883
                  Lixin Gao and   
               Zhi-Li Zhang and   
                    Don Towsley   Proxy-assisted techniques for delivering
                                  continuous multimedia streams  . . . . . 884--894
     Supratik Bhattacharyya and   
            James F. Kurose and   
                Don Towsley and   
               Ramesh Nagarajan   Efficient rate-controlled bulk data
                                  transfer using multiple multicast groups 895--907
             X. Brian Zhang and   
               Simon S. Lam and   
             Dong-Young Lee and   
                Y. Richard Yang   Protocol design for scalable and
                                  reliable group rekeying  . . . . . . . . 908--922
                 Mark Karol and   
    S. Jamaloddin Golestani and   
                      David Lee   Prevention of deadlocks and livelocks in
                                  lossless backpressured packet networks   923--934
          Tapan Kumar Nayak and   
             Kumar N. Sivarajan   Dimensioning optical networks under
                                  traffic growth models  . . . . . . . . . 935--947
           Daniel P. Heyman and   
                David Lucantoni   Modeling multiple IP traffic streams
                                  with rate limits . . . . . . . . . . . . 948--958
              Biplab Sikdar and   
     Shivkumar Kalyanaraman and   
             Kenneth S. Vastola   Analytic models for the latency and
                                  steady-state throughput of TCP Tahoe,
                                  Reno, and SACK . . . . . . . . . . . . . 959--971
          Sanjay Shakkottai and   
                 R. Srikant and   
                   Sean P. Meyn   Bounds on the throughput of congestion
                                  controllers in the presence of feedback
                                  delay  . . . . . . . . . . . . . . . . . 972--981
             Xiaohong Jiang and   
                  Hong Shen and   
Md. Mamun-ur-Rashid Khandker and   
               Susumu Horiguchi   Blocking behaviors of crosstalk-free
                                  optical Banyan networks on vertical
                                  stacking . . . . . . . . . . . . . . . . 982--993
             Peng-Yong Kong and   
            Kee-Chaing Chua and   
                 Brahim Bensaou   A novel scheduling scheme to share
                                  dropping ratio while guaranteeing a
                                  delay bound in a multiCode-CDMA network  994--1006


IEEE\slash ACM Transactions on Networking
Volume 12, Number 1, February, 2004

                   Ellen Zegura   Editorial  . . . . . . . . . . . . . . . 1--1
                Neil Spring and   
              Ratul Mahajan and   
            David Wetherall and   
                Thomas Anderson   Measuring ISP topologies with rocketfuel 2--16
              King-Shan Lui and   
            Klara Nahrstedt and   
                   Shigang Chen   Routing with topology aggregation in
                                  delay-bandwidth sensitive networks . . . 17--29
                 Daniel Zappala   Alternate path routing for multicast . . 30--43
                Ahmed Helmy and   
              Sandeep Gupta and   
                 Deborah Estrin   The STRESS method for boundary-point
                                  performance analysis of end-to-end
                                  multicast timer-suppression mechanisms   44--58
               Admela Jukan and   
                  Gerald Franzl   Path selection methods with multiple
                                  constraints in service-guaranteed WDM
                                  networks . . . . . . . . . . . . . . . . 59--72
                 Pin-Han Ho and   
             Hussein T. Mouftah   Reconfiguration of spare capacity for
                                  MPLS-based recovery in the Internet
                                  backbone networks  . . . . . . . . . . . 73--84
          Violeta Gambiroza and   
                  Ping Yuan and   
              Laura Balzano and   
                 Yonghe Liu and   
              Steve Sheafor and   
                Edward Knightly   Design, analysis, and implementation of
                                  DVSR: a fair high-performance protocol
                                  for packet rings . . . . . . . . . . . . 85--102
                    Xudong Wang   Wide-band TD-CDMA MAC with minimum-power
                                  allocation and rate- and BER-scheduling
                                  for wireless multimedia networks . . . . 103--116
              Rung-Hung Gau and   
                Zygmunt J. Haas   Concurrent search of mobile users in
                                  cellular networks  . . . . . . . . . . . 117--130
                     Wei Li and   
                     Xiuli Chao   Modeling and performance evaluation of a
                                  cellular mobile network  . . . . . . . . 131--145
                   Zuji Mao and   
            Christos Douligeris   A distributed database architecture for
                                  global roaming in next-generation mobile
                                  networks . . . . . . . . . . . . . . . . 146--160
                 Dongyu Qiu and   
                 Ness B. Shroff   A predictive flow control scheme for
                                  efficient network utilization and QoS    161--172
   Célio Albuquerque and   
           Brett J. Vickers and   
                   Tatsuya Suda   Network border patrol: preventing
                                  congestion collapse and promoting
                                  fairness in the Internet . . . . . . . . 173--186
              Ben-Jye Chang and   
                 Ren-Hung Hwang   Performance analysis for hierarchical
                                  multirate loss networks  . . . . . . . . 187--199

IEEE\slash ACM Transactions on Networking
Volume 12, Number 2, April, 2004

                 Ion Stoica and   
              Daniel Adkins and   
             Shelley Zhuang and   
              Scott Shenker and   
                  Sonesh Surana   Internet indirection infrastructure  . . 205--218
             Subhabrata Sen and   
                       Jia Wang   Analyzing peer-to-peer traffic across
                                  large networks . . . . . . . . . . . . . 219--232
        James R. Challenger and   
               Paul Dantzig and   
               Arun Iyengar and   
         Mark S. Squillante and   
                       Li Zhang   Efficiently serving dynamic data at
                                  highly accessed Web sites  . . . . . . . 233--246
       Emmanuel Léty and   
           Thierry Turletti and   
       François Baccelli   SCORE: a scalable communication protocol
                                  for large-scale virtual environments . . 247--260
               David Watson and   
              Matthew Smart and   
            G. Robert Malan and   
                Farnam Jahanian   Protocol scrubbing: network security
                                  through transparent flow modification    261--273
               Supratim Deb and   
                     R. Srikant   Congestion control for fair resource
                                  allocation in networks with multicast
                                  flows  . . . . . . . . . . . . . . . . . 274--285
      Srisankar S. Kunniyur and   
                     R. Srikant   An adaptive virtual queue (AVQ)
                                  algorithm for active queue management    286--299
            Michele Garetto and   
            Renato Lo Cigno and   
                Michela Meo and   
            Marco Ajmone Marsan   Closed queueing network models of
                                  interacting long-lived TCP flows . . . . 300--311
                  Peter Marbach   Analysis of a static pricing scheme for
                                  priority services  . . . . . . . . . . . 312--325
             Shengquan Wang and   
                  Dong Xuan and   
           Riccardo Bettati and   
                       Wei Zhao   Providing absolute differentiated
                                  services for real-time applications in
                                  static-priority scheduling networks  . . 326--339
             Moses Charikar and   
                Joseph Naor and   
                Baruch Schieber   Resource optimization in QoS multicast
                                  routing of real-time multimedia  . . . . 340--348
         Shanchieh Jay Yang and   
             Gustavo De Veciana   Enhancing both network and user
                                  performance for networks supporting best
                                  effort traffic . . . . . . . . . . . . . 349--360
                Mingyan Liu and   
                  John S. Baras   Fixed point approximation for multirate
                                  multihop loss networks with
                                  state-dependent routing  . . . . . . . . 361--374
        Jeff R. K. Hartline and   
        Ran Libeskind-Hadas and   
            Kurt M. Dresner and   
           Ethan W. Drucker and   
                 Katrina J. Ray   Optimal virtual topologies for
                                  one-to-many communication in WDM paths
                                  and rings  . . . . . . . . . . . . . . . 375--383
           Ashwin Sridharan and   
             Kumar N. Sivarajan   Blocking in all-optical networks . . . . 384--397

IEEE\slash ACM Transactions on Networking
Volume 12, Number 3, June, 2004

             Yuri Breitbart and   
          Minos Garofalakis and   
                    Ben Jai and   
               Cliff Martin and   
             Rajeev Rastogi and   
               Avi Silberschatz   Topology discovery in heterogeneous IP
                                  networks: the \em NetInventory system    401--414
       Constantino M. Lagoa and   
                    Hao Che and   
         Bernardo A. Movsichoff   Adaptive control algorithms for
                                  decentralized optimal traffic
                                  engineering in the Internet  . . . . . . 415--428
         Raymond R.-F. Liao and   
             Andrew T. Campbell   Dynamic core provisioning for
                                  quantitative differentiated services . . 429--442
             Alfio Lombardo and   
           Giacomo Morabito and   
              Giovanni Schembra   A novel analytical framework compounding
                                  statistical traffic modeling and
                                  aggregate-level service curve
                                  disciplines: network performance and
                                  efficiency implications  . . . . . . . . 443--455
      Christos Papadopoulos and   
              Guru Parulkar and   
                George Varghese   Light-weight multicast services (LMS): a
                                  router-assisted scheme for reliable
                                  multicast  . . . . . . . . . . . . . . . 456--468
          Pavlin Radoslavov and   
      Christos Papadopoulos and   
            Ramesh Govindan and   
                 Deborah Estrin   A comparison of application-level and
                                  router-assisted hierarchical schemes for
                                  reliable multicast . . . . . . . . . . . 469--482
                  Danny Raz and   
              Yuval Shavitt and   
                    Lixia Zhang   Distributed council election . . . . . . 483--492
                     Wei Ye and   
             John Heidemann and   
                 Deborah Estrin   Medium access control with coordinated
                                  adaptive sleeping for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 493--506
               Peng-Jun Wan and   
     Gruia Cãlinescu and   
                    Chih-Wei Yi   Minimum-power multicast routing in
                                  static ad hoc wireless networks  . . . . 507--514
                   Feng Xie and   
          Joseph L. Hammond and   
             Daniel L. Noneaker   Steady-state analysis of a
                                  split-connection scheme for Internet
                                  access through a wireless terminal . . . 515--525
              Xiangdong Qin and   
                  Yuanyuan Yang   Multicast connection capacity of WDM
                                  switching networks with limited
                                  wavelength conversion  . . . . . . . . . 526--538
            Timothy Y. Chow and   
              Fabian Chudak and   
             Anthony M. Ffrench   Fast optical layer mesh protection using
                                  pre-cross-connected trails . . . . . . . 539--548
                   C. Y. Li and   
               P. K. A. Wai and   
                Victor O. K. Li   The decomposition of a blocking model
                                  for connection-oriented networks . . . . 549--558
              Yu-Chee Tseng and   
               Yu-Chi Chueh and   
                 Jang-Ping Sheu   Seamless channel transition for the
                                  staircase video broadcasting scheme  . . 559--571
               Yongtao Gong and   
                Peiyuan Lee and   
                       Wanyi Gu   Comments on ``Dynamic wavelength routing
                                  using congestion and neighborhood
                                  information''  . . . . . . . . . . . . . 572--572

IEEE\slash ACM Transactions on Networking
Volume 12, Number 4, August, 2004

           Vijay K. Gurbani and   
                    Xian-He Sun   Terminating telephony services on the
                                  Internet . . . . . . . . . . . . . . . . 571--581
               Hani Jamjoom and   
         Padmanabhan Pillai and   
                   Kang G. Shin   Resynchronization and controllability of
                                  bursty service requests  . . . . . . . . 582--594
               Prince Samar and   
           Marc R. Pearlman and   
                Zygmunt J. Haas   Independent zone routing: an adaptive
                                  hybrid routing framework for ad hoc
                                  wireless networks  . . . . . . . . . . . 595--608
             Jae-Hwan Chang and   
             Leandros Tassiulas   Maximum lifetime routing in wireless
                                  sensor networks  . . . . . . . . . . . . 609--619
            Natalija Vlajic and   
Charalambos D. Charalambous and   
             Dimitrios Makrakis   Performance aspects of data broadcast in
                                  wireless networks with user retrials . . 620--633
    Özgür B. Akan and   
                Ian F. Akyildiz   ARC: the analytical rate control scheme
                                  for real-time traffic in wireless
                                  networks . . . . . . . . . . . . . . . . 634--644
                  Yiu Kwok Tham   Scheduling satellite-switched
                                  time-division multiple access with
                                  general switching modes  . . . . . . . . 645--652
                    Yan Sun and   
                Wade Trappe and   
                  K. J. Ray Liu   A scalable multicast key management
                                  scheme for heterogeneous wireless
                                  networks . . . . . . . . . . . . . . . . 653--666
                   Xi Zhang and   
                   Kang G. Shin   Markov-chain modeling for multicast
                                  signaling delay analysis . . . . . . . . 667--680
            Luciano Lenzini and   
              Enzo Mingozzi and   
                  Giovanni Stea   Tradeoffs between low complexity, low
                                  latency, and fairness with deficit
                                  round-robin schedulers . . . . . . . . . 681--693
                    Ao Tang and   
               Jiantao Wang and   
                  Steven H. Low   Understanding CHOKe: throughput and
                                  spatial characteristics  . . . . . . . . 694--707
                 Zhili Zhao and   
             Swaroop Darbha and   
          A. L. Narasimha Reddy   A method for estimating the proportion
                                  of nonresponsive traffic at a router . . 708--718
                James Aweya and   
           Michel Ouellette and   
              Delfin Y. Montuno   Design and stability analysis of a rate
                                  control algorithm using the
                                  Routh--Hurwitz stability criterion . . . 719--732
   Jaudelice C. de Oliveira and   
           Caterina Scoglio and   
            Ian F. Akyildiz and   
                     George Uhl   New preemption policies for
                                  DiffServ-aware traffic engineering to
                                  minimize rerouting in MPLS networks  . . 733--745
                Hanoch Levy and   
           Tsippy Mendelson and   
                    Gilad Goren   Dynamic allocation of resources to
                                  virtual path agents  . . . . . . . . . . 746--758
           Lachlan L. H. Andrew   Fast simulation of wavelength continuous
                                  WDM networks . . . . . . . . . . . . . . 759--765

IEEE\slash ACM Transactions on Networking
Volume 12, Number 5, October, 2004

              John W. Byers and   
          Jeffrey Considine and   
       Michael Mitzenmacher and   
                 Stanislav Rost   Informed content delivery across
                                  adaptive overlay networks  . . . . . . . 767--780
         Ludmila Cherkasova and   
                   Minaxi Gupta   Analysis of enterprise media server
                                  workloads: access patterns, locality,
                                  content evolution, and rates of change   781--794
                Kamil Sarac and   
              Kevin C. Almeroth   Tracetree: a scalable mechanism to
                                  discover multicast tree topologies in
                                  the Internet . . . . . . . . . . . . . . 795--808
       Ma\lgorzata Steinder and   
             Adarshpal S. Sethi   Probabilistic fault localization in
                                  communication systems using belief
                                  networks . . . . . . . . . . . . . . . . 809--822
                Ruibing Hao and   
                  David Lee and   
            Rakesh K. Sinha and   
                 Nancy Griffeth   Integrated system interoperability
                                  testing with applications to VoIP  . . . 823--836
     Georgios Varsamopoulos and   
            Sandeep K. S. Gupta   Dynamically adapting registration areas
                                  to user mobility and call patterns for
                                  efficient location management in PCS
                                  networks . . . . . . . . . . . . . . . . 837--850
           Piet Van Mieghem and   
            Fernando A. Kuipers   Concepts of exact QoS routing algorithms 851--864
          Antonis Panagakis and   
          Nandita Dukkipati and   
        Ioannis Stavrakakis and   
                       Joy Kuri   Optimal call admission control on a
                                  single link with a GPS scheduler . . . . 865--878
             Taieb F. Znati and   
                    Rami Melhem   Node delay assignment strategies to
                                  support end-to-end delay requirements in
                                  heterogeneous networks . . . . . . . . . 879--892
           Dirceu Cavendish and   
                Mario Gerla and   
                Saverio Mascolo   A control theoretical approach to
                                  congestion control in packet networks    893--906
    Ioannis Ch. Paschalidis and   
            Spyridon Vassilaras   Importance sampling for the estimation
                                  of buffer overflow probabilities via
                                  trace-driven simulations . . . . . . . . 907--919
              Eric Bouillet and   
Jean-François Labourdette   Distributed computation of shared backup
                                  path in mesh optical networks using
                                  probabilistic methods  . . . . . . . . . 920--930
 Srinivasan Ramasubramanian and   
                 Arun K. Somani   Analysis of optical networks with
                                  heterogeneous grooming architectures . . 931--943
             Arun K. Somani and   
                  Mani Mina and   
                        Ling Li   On trading wavelengths with fibers: a
                                  cost-performance based study . . . . . . 944--951
          Cheng-Shang Chang and   
                       Zhen Liu   A bandwidth sharing theory for a large
                                  number of HTTP-like connections  . . . . 952--962

IEEE\slash ACM Transactions on Networking
Volume 12, Number 6, December, 2004

      Constantinos Dovrolis and   
    Parameswaran Ramanathan and   
                    David Moore   Packet-dispersion techniques and a
                                  capacity-estimation methodology  . . . . 963--977
             N. G. Duffield and   
            Francesco Lo Presti   Network tomography from measured
                                  end-to-end delay covariance  . . . . . . 978--992
              Yuval Shavitt and   
                   Tomer Tankel   Big-bang simulation for embedding
                                  network distances in Euclidean space . . 993--1006
         Michael Rabinovich and   
                       Hua Wang   DHTTP: an efficient and cache-friendly
                                  transfer protocol for the Web  . . . . . 1007--1020
            Ian F. Akyildiz and   
                     Wenye Wang   The predictive user mobility profile
                                  framework for wireless multimedia
                                  networks . . . . . . . . . . . . . . . . 1021--1035
             Hsiao-Hwa Chen and   
                   Wee-Teck Tea   Hierarchy schedule-sensing protocol for
                                  CDMA wireless data-centric networks with
                                  multiple packet collision and capture
                                  effect . . . . . . . . . . . . . . . . . 1036--1048
                 Haiyun Luo and   
                Jiejun Kong and   
              Petros Zerfos and   
                  Songwu Lu and   
                    Lixia Zhang   URSA: ubiquitous and robust access
                                  control for mobile ad hoc networks . . . 1049--1063
                 Yigal Bejerano   Efficient integration of multihop
                                  wireless and wired networks with QoS
                                  constraints  . . . . . . . . . . . . . . 1064--1078
               Priya Ranjan and   
               Eyad H. Abed and   
                  Richard J. La   Nonlinear instabilities in TCP-RED . . . 1079--1092
               Scott Jordan and   
               Kalpana Jogi and   
                Chunlin Shi and   
                   Ikhlaq Sidhu   The variation of optimal bandwidth and
                                  buffer allocation with the number of
                                  sources  . . . . . . . . . . . . . . . . 1093--1104
                 Pin-Han Ho and   
      János Tapolcai and   
                  Tibor Cinkler   Segment shared protection in mesh
                                  communications networks with bandwidth
                                  guaranteed tunnels . . . . . . . . . . . 1105--1118
               Hongsik Choi and   
         Suresh Subramaniam and   
                 Hyeong-Ah Choi   Loopback recovery from double-link
                                  failures in optical mesh networks  . . . 1119--1130
        Marco Ajmone Marsan and   
        Mirko Franceschinis and   
            Emilio Leonardi and   
                 Fabio Neri and   
             Alessandro Tarello   Underload instabilities in packet
                                  networks with flow schedulers  . . . . . 1131--1143
                 Chuanxiong Guo   SRR: an $O(1)$ time-complexity packet
                                  scheduler for flows in multiservice
                                  packet networks  . . . . . . . . . . . . 1144--1155
        Guillermo del Angel and   
               Terrence L. Fine   Optimal power and retransmission control
                                  policies for random access systems . . . 1156--1166


IEEE\slash ACM Transactions on Networking
Volume 13, Number 1, February, 2005

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 1--1
            Florin Baboescu and   
                George Varghese   Scalable packet classification . . . . . 2--14
                     Jun Xu and   
              Richard J. Lipton   On fundamental tradeoffs between delay
                                  bounds and computational complexity in
                                  packet scheduling algorithms . . . . . . 15--28
            David K. Y. Yau and   
             John C. S. Lui and   
                 Feng Liang and   
                      Yeung Yam   Defending against distributed
                                  denial-of-service attacks with max-min
                                  fair server-centric router throttles . . 29--42
          Fernando Paganini and   
                Zhikui Wang and   
              John C. Doyle and   
                  Steven H. Low   Congestion control for high performance,
                                  stability, and fairness in general
                                  networks . . . . . . . . . . . . . . . . 43--56
                 Dongyu Qiu and   
                 Ness B. Shroff   Queueing properties of feedback flow
                                  control systems  . . . . . . . . . . . . 57--68
                   Yong Xia and   
             David Harrison and   
     Shivkumar Kalyanaraman and   
       Kishore Ramachandran and   
              Arvind Venkatesan   Accumulation-based congestion control    69--80
       Ashvin Lakshmikantha and   
            Carolyn L. Beck and   
                     R. Srikant   Robustness of real and virtual
                                  queue-based active queue management
                                  schemes  . . . . . . . . . . . . . . . . 81--93
        Andreas Pitsillides and   
             Petros Ioannou and   
              Marios Lestas and   
                Loukas Rossides   Adaptive nonlinear congestion controller
                                  for a differentiated-services framework  94--107
              Aditya Karnik and   
                   Anurag Kumar   Performance of TCP congestion control
                                  with explicit rate feedback  . . . . . . 108--120
             Saswati Sarkar and   
             Leandros Tassiulas   Fair distributed congestion control in
                                  multirate multicast networks . . . . . . 121--133
                Wade Trappe and   
                  Yuke Wang and   
                  K. J. Ray Liu   Resource-aware conference key
                                  establishment for heterogeneous networks 134--146
                      Li Li and   
          Joseph Y. Halpern and   
              Paramvir Bahl and   
                Yi-Min Wang and   
              Roger Wattenhofer   A cone-based distributed
                                  topology-control algorithm for wireless
                                  multi-hop networks . . . . . . . . . . . 147--159
               Guanglei Liu and   
                 Chuanyi Ji and   
             Vincent W. S. Chan   On the scalability of network management
                                  information for inter-domain light-path
                                  assessment . . . . . . . . . . . . . . . 160--172
                Li-Wei Chen and   
                  Eytan Modiano   Efficient routing and wavelength
                                  assignment for reconfigurable WDM ring
                                  networks with wavelength converters  . . 173--186
                   Kejie Lu and   
                 Gaoxi Xiao and   
                Imrich Chlamtac   Analysis of blocking probability for
                                  distributed lightpath establishment in
                                  WDM optical networks . . . . . . . . . . 187--197
                     Yu Liu and   
               David Tipper and   
      Peerapon Siripongwutikorn   Approximating optimal spare capacity
                                  allocation by successive survivable
                                  routing  . . . . . . . . . . . . . . . . 198--211

IEEE\slash ACM Transactions on Networking
Volume 13, Number 2, April, 2005

              Debasis Mitra and   
                     Qiong Wang   Stochastic traffic engineering for
                                  demand uncertainty and risk-aware
                                  network revenue management . . . . . . . 221--233
           Ashwin Sridharan and   
         Roch Guérin and   
                Christophe Diot   Achieving near-optimal traffic
                                  engineering solutions for current
                                  OSPF/IS-IS networks  . . . . . . . . . . 234--247
       Hervé Kerivin and   
                Dritan Nace and   
            Thi-Tuyet-Loan Pham   Design of capacitated survivable
                                  networks with a single facility  . . . . 248--261
             Giuseppe Ascia and   
           Vincenzo Catania and   
                  Daniela Panno   An evolutionary management scheme in
                                  high-performance packet switches . . . . 262--275
                Chengzhi Li and   
             Edward W. Knightly   Schedulability criterion and performance
                                  analysis of coordinated schedulers . . . 276--287
              Ossama Younis and   
                    Sonia Fahmy   FlowMate: scalable on-line flow
                                  clustering . . . . . . . . . . . . . . . 288--301
               Supratim Deb and   
            Ayalvadi Ganesh and   
                      Peter Key   Resource allocation between persistent
                                  and transient flows  . . . . . . . . . . 302--315
               Marco Mellia and   
                Michela Meo and   
                Claudio Casetti   TCP smart framing: a segmentation
                                  algorithm to reduce TCP latency  . . . . 316--329
         Nishanth R. Sastry and   
                   Simon S. Lam   CYRF: a theory of window-based unicast
                                  congestion control . . . . . . . . . . . 330--342
             Byung-Jae Kwak and   
               Nah-Oak Song and   
              Leonard E. Miller   Performance analysis of exponential
                                  backoff  . . . . . . . . . . . . . . . . 343--355
               Eitan Altman and   
     Konstantin Avrachenkov and   
                  Chadi Barakat   A stochastic model of TCP/IP with
                                  stationary random losses . . . . . . . . 356--369
                    Ying Xu and   
             Roch Guérin   Individual QoS versus aggregate QoS: a
                                  loss performance study . . . . . . . . . 370--383
                 Weilian Su and   
                Ian F. Akyildiz   Time-diffusion synchronization protocol
                                  for wireless sensor networks . . . . . . 384--397
               Taejoon Park and   
                   Kang G. Shin   Optimal tradeoffs for location-based
                                  routing in large-scale ad hoc networks   398--410
            Atilla Eryilmaz and   
                 R. Srikant and   
               James R. Perkins   Stable scheduling policies for fading
                                  wireless channels  . . . . . . . . . . . 411--424
             Olivier Dousse and   
   François Baccelli and   
                 Patrick Thiran   Impact of interferences on connectivity
                                  in ad hoc networks . . . . . . . . . . . 425--436
              Eric Bouillet and   
Jean-François Labourdette and   
            Ramu Ramamurthy and   
                  Sid Chaudhuri   Lightpath re-optimization in mesh
                                  optical networks . . . . . . . . . . . . 437--447
               Abel Dasylva and   
          Delfin Y. Montuno and   
                Prasad Kodaypak   Optimization of optical cross-connects
                                  with wave-mixing conversion  . . . . . . 448--458

IEEE\slash ACM Transactions on Networking
Volume 13, Number 3, June, 2005

                Ellen W. Zegura   Editorial  . . . . . . . . . . . . . . . 461--461
             David D. Clark and   
            John Wroclawski and   
           Karen R. Sollins and   
                  Robert Braden   Tussle in cyberspace: defining
                                  tomorrow's Internet  . . . . . . . . . . 462--475
                Bong-Jun Ko and   
                 Dan Rubenstein   Distributed self-stabilizing placement
                                  of replicated resources in emerging
                                  networks . . . . . . . . . . . . . . . . 476--487
              Wu-chang Feng and   
              Francis Chang and   
                Wu-chi Feng and   
               Jonathan Walpole   A traffic characterization of popular
                                  on-line games  . . . . . . . . . . . . . 488--500
             Dan Rubenstein and   
                    Sambit Sahu   Can unstructured P2P protocols survive
                                  flash crowds?  . . . . . . . . . . . . . 501--512
                   Hyuk Lim and   
            Jennifer C. Hou and   
                  Chong-Ho Choi   Constructing Internet coordinate system
                                  based on delay measurement . . . . . . . 513--525
               Do Young Eun and   
                 Ness B. Shroff   Network decomposition: theory and
                                  practice . . . . . . . . . . . . . . . . 526--539
     Homayoun Yousefi'zadeh and   
           Hamid Jafarkhani and   
                    Amir Habibi   Layered media multicast control (LMMC):
                                  rate allocation and partitioning . . . . 540--553
            Ian F. Akyildiz and   
    Özgür B. Akan and   
               Giacomo Morabito   A rate control scheme for adaptive
                                  real-time applications in IP networks
                                  with lossy links and long round trip
                                  times  . . . . . . . . . . . . . . . . . 554--567
           Milan Vojnovi\'c and   
            Jean-Yves Le Boudec   On the long-run behavior of
                                  equation-based rate control  . . . . . . 568--581
               Jiantao Wang and   
                     Lun Li and   
              Steven H. Low and   
                  John C. Doyle   Cross-layer optimization in TCP/IP
                                  networks . . . . . . . . . . . . . . . . 582--595
            Saâd Biaz and   
                Nitin H. Vaidya   ``De-randomizing'' congestion losses to
                                  improve TCP performance over
                                  wired-wireless networks  . . . . . . . . 596--608
                  Hongyi Wu and   
                 Chong Wang and   
                Nian-Feng Tzeng   Novel self-configurable positioning
                                  technique for multihop wireless networks 609--621
          Pierre T. Kabamba and   
          Semyon M. Meerkov and   
                 Choon Yik Tang   Ranking and adaptive ranking CDMA  . . . 622--635
                      Sem Borst   User-level performance of channel-aware
                                  scheduling algorithms in wireless data
                                  networks . . . . . . . . . . . . . . . . 636--647
             Yigal Bejerano and   
             Yuri Breitbart and   
                 Ariel Orda and   
             Rajeev Rastogi and   
            Alexander Sprintson   Algorithms for computing QoS paths with
                                  restoration  . . . . . . . . . . . . . . 648--661
        Anirban Chakrabarti and   
                   G. Manimaran   Reliability constrained routing in QoS
                                  networks . . . . . . . . . . . . . . . . 662--675
                   Xiang Yu and   
            Ian Li-Jin Thng and   
               Yuming Jiang and   
                  Chunming Qiao   Queueing processes in GPS and PGPS with
                                  LRD traffic inputs . . . . . . . . . . . 676--689
               Anindya Basu and   
                Girija Narlikar   Fast incremental updates for pipelined
                                  forwarding engines . . . . . . . . . . . 690--703
                Xiaowen Chu and   
                          Bo Li   Dynamic routing and wavelength
                                  assignment in the presence of wavelength
                                  conversion for all-optical networks  . . 704--715

IEEE\slash ACM Transactions on Networking
Volume 13, Number 4, August, 2005

        Fernando A. Kuipers and   
         Piet F. A. Van Mieghem   Conditions that impact the complexity of
                                  QoS routing  . . . . . . . . . . . . . . 717--730
      Nicholas F. Maxemchuk and   
              Iradj Ouveysi and   
                 Moshe Zukerman   A quantitative measure for
                                  telecommunications networks topology
                                  design . . . . . . . . . . . . . . . . . 731--742
                Yossi Chait and   
               C. V. Hollot and   
               Vishal Misra and   
                Don Towsley and   
             Honggang Zhang and   
                       Yong Cui   Throughput differentiation using
                                  coloring at the network edge and
                                  preferential marking at the core . . . . 743--754
            David E. Taylor and   
        Andreas Herkersdorf and   
        Andreas Döring and   
                  Gero Dittmann   Robust header compression (ROHC) in
                                  next-generation network processors . . . 755--768
   Mohammad J. Akhbarizadeh and   
                Mehrdad Nourani   Hardware-based IP routing using
                                  partitioned lookup table . . . . . . . . 769--781
             Yashar Ganjali and   
         Abtin Keshavarzian and   
                  Devavrat Shah   Cell switching versus packet switching
                                  in input-queued switches . . . . . . . . 782--789
               Weiguang Shi and   
            M. H. MacGregor and   
               Pawel Gburzynski   Load balancing for parallel forwarding   790--801
            Rama Sangireddy and   
         Natsuhiko Futamura and   
             Srinivas Aluru and   
                 Arun K. Somani   Scalable, memory efficient, high-speed
                                  IP lookup algorithms . . . . . . . . . . 802--812
                Xiaojun Lin and   
                 Ness B. Shroff   Simplification of network dynamics in
                                  large systems  . . . . . . . . . . . . . 813--826
               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Non-convex optimization and rate control
                                  for multi-class services in the Internet 827--840
   François Baccelli and   
                      Dohy Hong   Interaction of TCP flows as billiards    841--853
               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Downlink power allocation for
                                  multi-class wireless systems . . . . . . 854--867
            Murali Kodialam and   
              Thyaga Nandagopal   Characterizing achievable rates in
                                  multi-hop wireless mesh networks with
                                  orthogonal channels  . . . . . . . . . . 868--880
              Sushant Sinha and   
             C. Siva Ram Murthy   Information theoretic approach to
                                  traffic adaptive WDM networks  . . . . . 881--894
      Poompat Saengudomlert and   
           Eytan H. Modiano and   
             Robert G. Gallager   Dynamic wavelength assignment for WDM
                                  all-optical tree networks  . . . . . . . 895--905
Jean-François Labourdette and   
              Eric Bouillet and   
            Ramu Ramamurthy and   
        Ahmet A. Akyamaç   Fast approximate dimensioning and
                                  performance analysis of mesh optical
                                  networks . . . . . . . . . . . . . . . . 906--917
                    Lu Shen and   
                    Xi Yang and   
               Byrav Ramamurthy   Shared risk link group (SRLG)-diverse
                                  path provisioning under hybrid service
                                  level agreements in wavelength-routed
                                  optical mesh networks  . . . . . . . . . 918--931

IEEE\slash ACM Transactions on Networking
Volume 13, Number 5, October, 2005

              Nick Duffield and   
               Carsten Lund and   
                  Mikkel Thorup   Estimating flow distributions from
                                  sampled flow statistics  . . . . . . . . 933--946
                  Yin Zhang and   
            Matthew Roughan and   
               Carsten Lund and   
                David L. Donoho   Estimating point-to-point and
                                  point-to-multipoint traffic matrices: an
                                  information-theoretic approach . . . . . 947--960
               Cliff C. Zou and   
                 Weibo Gong and   
                Don Towsley and   
                      Lixin Gao   The monitoring and early detection of
                                  Internet Worms . . . . . . . . . . . . . 961--974
                   Rong Pan and   
           Balaji Prabhakar and   
       Konstantinos Psounis and   
                  Damon Wischik   SHRiNK: a method for enabling scaleable
                                  performance prediction and efficient
                                  network simulation . . . . . . . . . . . 975--988
                   Yuguang Fang   Modeling and performance analysis for
                                  wireless mobile networks: a new
                                  analytical approach  . . . . . . . . . . 989--1002
    Özgür B. Akan and   
                Ian F. Akyildiz   Event-to-sink reliable transport in
                                  wireless sensor networks . . . . . . . . 1003--1016
               Sarah Koskie and   
                    Zoran Gajic   A Nash game algorithm for SIR-based
                                  power control in $3$G wireless CDMA
                                  networks . . . . . . . . . . . . . . . . 1017--1026
               Clement Yuen and   
                  Peter Marbach   Price-based rate control in random
                                  access networks  . . . . . . . . . . . . 1027--1040
                Youngmi Jin and   
                 George Kesidis   Dynamics of usage-priced communication
                                  networks: the case of a single
                                  bottleneck resource  . . . . . . . . . . 1041--1053
                Yunkai Zhou and   
                   Harish Sethu   On achieving fairness in the joint
                                  allocation of processing and bandwidth
                                  resources: principles and algorithms . . 1054--1067
                   Shao Liu and   
              Tamer Ba\csar and   
                     R. Srikant   Exponential-RED: a stabilizing AQM
                                  scheme for low- and high-speed TCP
                                  protocols  . . . . . . . . . . . . . . . 1068--1081
                   Yu-Ping Tian   Stability analysis and design of the
                                  second-order congestion control for
                                  networks with heterogeneous delays . . . 1082--1093
                  Yair Amir and   
            Baruch Awerbuch and   
            Claudiu Danilov and   
               Jonathan Stanton   A cost-benefit flow control for reliable
                                  multicast and unicast in overlay
                                  networks . . . . . . . . . . . . . . . . 1094--1106
            Dmitri Loguinov and   
                 Juan Casas and   
                  Xiaoming Wang   Graph-theoretic analysis of structured
                                  peer-to-peer systems: routing distances
                                  and fault resilience . . . . . . . . . . 1107--1120
                  Hui Zhang and   
                Ashish Goel and   
                Ramesh Govindan   Improving lookup latency in distributed
                                  hash table systems using random sampling 1121--1134
                Xuehong Sun and   
            Sartaj K. Sahni and   
                Yiqiang Q. Zhao   Packet classification consuming small
                                  amount of memory . . . . . . . . . . . . 1135--1145
                 Ariel Orda and   
            Alexander Sprintson   A scalable approach to the partition of
                                  QoS requirements in unicast and
                                  multicast  . . . . . . . . . . . . . . . 1146--1159
João Luís Sobrinho   An algebraic theory of dynamic network
                                  routing  . . . . . . . . . . . . . . . . 1160--1173
        Stavroula Siachalou and   
            Leonidas Georgiadis   Algorithms for precomputing constrained
                                  widest paths and multicast trees . . . . 1174--1187
                    Wei Sun and   
                   Kang G. Shin   End-to-end delay bounds for traffic
                                  aggregates under guaranteed-rate
                                  scheduling algorithms  . . . . . . . . . 1188--1201

IEEE\slash ACM Transactions on Networking
Volume 13, Number 6, December, 2005

             David Alderson and   
                     Lun Li and   
           Walter Willinger and   
                  John C. Doyle   Understanding Internet topology:
                                  principles, models, and validation . . . 1205--1218
             Graham Cormode and   
               S. Muthukrishnan   What's new: Finding significant
                                  differences in network data streams  . . 1219--1232
                    Nan Jin and   
     Gayathri Venkitachalam and   
                   Scott Jordan   Dynamic congestion-based pricing of
                                  bandwidth and buffer . . . . . . . . . . 1233--1246
               Haining Wang and   
               Abhijit Bose and   
           Mohamed El-Gendy and   
                   Kang G. Shin   IP Easy-pass: a light-weight
                                  network-edge resource access control . . 1247--1260
               Tansu Alpcan and   
                    Tamer Basar   A globally stable adaptive congestion
                                  control scheme for Internet-style
                                  networks with delay  . . . . . . . . . . 1261--1274
               Steven Weber and   
             Gustavo De Veciana   Rate adaptive multimedia streams:
                                  optimization and admission control . . . 1275--1288
        Marco Ajmone Marsan and   
            Michele Garetto and   
             Paolo Giaccone and   
            Emilio Leonardi and   
       Enrico Schiattarella and   
             Alessandro Tarello   Using partial differential equations to
                                  model TCP mice and elephants in large IP
                                  networks . . . . . . . . . . . . . . . . 1289--1301
            Shengming Jiang and   
                 Dajiang He and   
                  Jianqiang Rao   A prediction-based link availability
                                  estimation for routing metrics in MANETs 1302--1312
                    Ning Li and   
                Jennifer C. Hou   Localized topology control algorithms
                                  for heterogeneous wireless networks  . . 1313--1324
              Peter Marbach and   
                       Ying Qiu   Cooperation in wireless ad hoc networks:
                                  a market-based approach  . . . . . . . . 1325--1338
        Seema Bandyopadhyay and   
             Qingjiang Tian and   
                Edward J. Coyle   Spatio-temporal sampling rates and
                                  energy efficiency in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1339--1352
                  Haibin Lu and   
                   Sartaj Sahni   Conflict detection and resolution in
                                  two-dimensional prefix router tables . . 1353--1363
             Isaac Keslassy and   
            Murali Kodialam and   
             T. V. Lakshman and   
            Dimitrios Stiliadis   On guaranteed smooth scheduling for
                                  input-queued switches  . . . . . . . . . 1364--1375
            Shahrokh Valaee and   
   Jean-Charles Grégoire   An estimator of regulator parameters in
                                  a stochastic setting . . . . . . . . . . 1376--1389
                     Tao Wu and   
                 Arun K. Somani   Cross-talk attack monitoring and
                                  localization in all-optical networks . . 1390--1401
                 Eric Rosenberg   Hierarchical topological network design  1402--1409
              Tzu-Lun Huang and   
                      D. T. Lee   Comments and an improvement on ``A
                                  distributed algorithm of delay-bounded
                                  multicast routing for multimedia
                                  applications in wide area networks'' . . 1410--1411


IEEE\slash ACM Transactions on Networking
Volume 14, Number 1, February, 2006

               Jang-Won Lee and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Joint resource allocation and
                                  base-station assignment for the downlink
                                  in CDMA networks . . . . . . . . . . . . 1--14
                Koushik Kar and   
       Ananth Krishnamurthy and   
                   Neeraj Jaggi   Dynamic node activation in networks of
                                  rechargeable sensors . . . . . . . . . . 15--26
            Zygmunt J. Haas and   
                     Tara Small   A new networking model for biological
                                  applications of ad hoc sensor networks   27--40
           Razvan Cristescu and   
   Baltasar Beferull-Lozano and   
            Martin Vetterli and   
              Roger Wattenhofer   Network correlated data gathering with
                                  explicit communication: NP-completeness
                                  and algorithms . . . . . . . . . . . . . 41--54
             Himanshu Gupta and   
              Zongheng Zhou and   
               Samir R. Das and   
                      Quinyi Gu   Connected sensor cover:
                                  self-organization of sensor networks for
                                  efficient query execution  . . . . . . . 55--67
               Nicolas Hohn and   
                  Darryl Veitch   Inverting sampled traffic  . . . . . . . 68--80
              John W. Byers and   
                 Gu-In Kwon and   
               Michael Luby and   
           Michael Mitzenmacher   Fine-grained layered multicast with
                                  STAIR  . . . . . . . . . . . . . . . . . 81--93
               Priya Ranjan and   
              Richard J. La and   
                   Eyad H. Abed   Global stability conditions for rate
                                  control with arbitrary communication
                                  delays . . . . . . . . . . . . . . . . . 94--107
Peerapol Tinnakornsrisuphap and   
                  Richard J. La   Asymptotic behavior of heterogeneous TCP
                                  flows and RED gateway  . . . . . . . . . 108--120
              Hyoung-Il Lee and   
                  Seung-Woo Seo   Matching output queueing with a multiple
                                  input/output-queued switch . . . . . . . 121--132
             Eveline Veloso and   
    Virgílio Almeida and   
          Wagner Meira, Jr. and   
             Azer Bestavros and   
                    Shudong Jin   A hierarchical characterization of a
                                  live streaming media workload  . . . . . 133--146
                   Dahai Xu and   
                  Yang Chen and   
                Yizhi Xiong and   
              Chunming Qiao and   
                         Xin He   On the complexity of and algorithms for
                                  finding the shortest path with a
                                  disjoint counterpart . . . . . . . . . . 147--158
           Andrea Fumagalli and   
                    Marco Tacca   Differentiated reliability (DiR) in
                                  wavelength division multiplexing rings   159--168
              Jianping Wang and   
               Xiangtong Qi and   
                      Biao Chen   Wavelength assignment for multicast in
                                  all-optical WDM networks with splitting
                                  constraints  . . . . . . . . . . . . . . 169--182
                 Ian Ferrel and   
             Adrian Mettler and   
              Edward Miller and   
            Ran Libeskind-Hadas   Virtual topologies for multicasting with
                                  multiple originators in WDM networks . . 183--190
              Hiroaki Harai and   
                Masayuki Murata   High-speed buffer management for 40
                                  Gb/s-based photonic packet switches  . . 191--204
                Hung Q. Ngo and   
                 Dazhen Pan and   
                  Chunming Qiao   Constructions and analyses of
                                  nonblocking WDM switches based on
                                  arrayed waveguide grating and limited
                                  wavelength conversion  . . . . . . . . . 205--217
                  Canhui Ou and   
    Laxman H. Sahasrabuddhe and   
                  Keyao Zhu and   
          Charles U. Martel and   
            Biswanath Mukherjee   Survivable virtual concatenation for
                                  data over SONET/SDH in optical transport
                                  networks . . . . . . . . . . . . . . . . 218--231

IEEE\slash ACM Transactions on Networking
Volume 14, Number 2, April, 2006

             Suman Banerjee and   
              Seungjoon Lee and   
        Bobby Bhattacharjee and   
             Aravind Srinivasan   Resilient multicast using overlays . . . 237--248
            Sergey Gorinsky and   
                 Sugat Jain and   
                Harrick Vin and   
                Yongguang Zhang   Design of multicast protocols robust
                                  against inflated subscription  . . . . . 249--262
          Patrick P. C. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Distributed collaborative key agreement
                                  and authentication protocols for dynamic
                                  peer groups  . . . . . . . . . . . . . . 263--276
                Hanoch Levy and   
               Haim Zlatokrilov   The effect of packet dispersion on voice
                                  applications in IP networks  . . . . . . 277--288
             John Musacchio and   
                   Jean Walrand   WiFi access point pricing as a dynamic
                                  game . . . . . . . . . . . . . . . . . . 289--301
                Xiaojun Lin and   
                 Ness B. Shroff   The impact of imperfect scheduling on
                                  cross-layer congestion control in
                                  wireless networks  . . . . . . . . . . . 302--315
            Mehmet C. Vuran and   
                Ian F. Akyildiz   Spatial correlation-based collaborative
                                  medium access control in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 316--329
      Poompat Saengudomlert and   
              Eytan Modiano and   
             Robert G. Gallager   On-line routing and wavelength
                                  assignment for dynamic traffic in WDM
                                  ring and torus networks  . . . . . . . . 330--340
                Zvi Rosberg and   
             Andrew Zalesky and   
                 Moshe Zukerman   Packet delay in optical circuit-switched
                                  networks . . . . . . . . . . . . . . . . 341--354
                    Ao Tang and   
               Jiantao Wang and   
                  Steven H. Low   Counter-intuitive throughput behaviors
                                  in networks under end-to-end control . . 355--368
            Stephan Bohacek and   
           Joao P. Hespanha and   
                 Junsoo Lee and   
               Chansook Lim and   
                 Katia Obraczka   A new TCP for persistent packet
                                  reordering . . . . . . . . . . . . . . . 369--382
               Liangping Ma and   
          Kenneth E. Barner and   
                Gonzalo R. Arce   Statistical analysis of TCP's
                                  retransmission timeout algorithm . . . . 383--396
       Sarang Dharmapurikar and   
      Praveen Krishnamurthy and   
                David E. Taylor   Longest prefix matching using Bloom
                                  filters  . . . . . . . . . . . . . . . . 397--409
               Hani Jamjoom and   
                   Kang G. Shin   On the role and controllability of
                                  persistent clients in traffic aggregates 410--423
                  David Lee and   
               Dongluo Chen and   
                Ruibing Hao and   
          Raymond E. Miller and   
                Jianping Wu and   
                        Xia Yin   Network protocol system monitoring: a
                                  formal approach with passive testing . . 424--437
             Yigal Bejerano and   
              Mark A. Smith and   
        Joseph (Seffi) Naor and   
               Nicole Immorlica   Efficient location area planning for
                                  personal communication systems . . . . . 438--450
               Zesheng Chen and   
                    Tian Bu and   
              Mostafa Ammar and   
                    Don Towsley   Comments on ``Modeling TCP Reno
                                  performance: a simple model and its
                                  empirical validation'' . . . . . . . . . 451--453

IEEE\slash ACM Transactions on Networking
Volume 14, Number 3, 2006

      Matthias Grossglauser and   
                Martin Vetterli   Locating mobile nodes with EASE:
                                  learning efficient routes from encounter
                                  histories alone  . . . . . . . . . . . . 457--469
            Kin-Kwong Leung and   
                   Chi Wan Sung   An opportunistic power control algorithm
                                  for cellular network . . . . . . . . . . 470--478
            Zygmunt J. Haas and   
          Joseph Y. Halpern and   
                          Li Li   Gossip-based ad hoc routing  . . . . . . 479--491
      Guillermo Barrenetxea and   
   Baltasar Berefull-Lozano and   
                Martin Vetterli   Lattice networks: capacity limits,
                                  optimal routing, and queueing behavior   492--505
                   Xin Wang and   
            Henning Schulzrinne   Pricing network resources for adaptive
                                  applications . . . . . . . . . . . . . . 506--519
                Anish Arora and   
                  Hongwei Zhang   LSRP: local stabilization in shortest
                                  path routing . . . . . . . . . . . . . . 520--531
                Aman Shaikh and   
                 Rohit Dube and   
                   Anujan Varma   Avoiding instability during graceful
                                  shutdown of multiple OSPF routers  . . . 532--542
Luís Henrique M. K. Costa and   
                Serge Fdida and   
       Otto Carlos M. B. Duarte   Incremental service deployment using the
                                  hop-by-hop multicast routing protocol    543--556
                Danny Dolev and   
               Osnat Mokryn and   
                  Yuval Shavitt   On multicast trees: structure and size
                                  estimation . . . . . . . . . . . . . . . 557--567
         Ayalvadi J. Ganesh and   
               Peter B. Key and   
               Damien Polis and   
                     R. Srikant   Congestion notification and probing
                                  mechanisms for endpoint admission
                                  control  . . . . . . . . . . . . . . . . 568--578
                   Lei Ying and   
           Geir E. Dullerud and   
                     R. Srikant   Global stability of Internet congestion
                                  controllers with heterogeneous delays    579--591
         Richard W. Thommes and   
                 Mark J. Coates   Deterministic packet marking for
                                  time-varying congestion price estimation 592--602
              Ji-Cheol Moon and   
                  Byeong Gi Lee   Rate-adaptive snoop: a TCP enhancement
                                  scheme over rate-controlled lossy links  603--615
             Robert Shorten and   
               Fabian Wirth and   
                  Douglas Leith   A positive systems model of TCP-like
                                  congestion control: asymptotic results   616--629
                   Yuming Jiang   Per-domain packet scale rate guarantee
                                  for expedited forwarding . . . . . . . . 630--643
          Cheng-Shang Chang and   
              Duan-Shin Lee and   
                    Chi-Yao Yue   Providing guaranteed rate services in
                                  the load balanced Birkhoff--von Neumann
                                  switches . . . . . . . . . . . . . . . . 644--656
                   Yu Cheng and   
                  Weihua Zhuang   Dynamic inter-SLA resource sharing in
                                  path-oriented differentiated services
                                  networks . . . . . . . . . . . . . . . . 657--670

IEEE\slash ACM Transactions on Networking
Volume 14, Number SI, June, 2006

                   Ning Cai and   
                Mung Chiang and   
            Michelle Effros and   
               Ralf Koetter and   
       Muriel Médard and   
           Balaji Prabhakar and   
                 R. Srikant and   
                Don Towsley and   
               Raymond W. Yeung   Introduction to the special issue on
                                  networking and information theory  . . . 2285--2288
                   Feng Xue and   
                    P. R. Kumar   On the $ \theta $-coverage and
                                  connectivity of large random networks    2289--2299
               Florin Ciucu and   
             Almut Burchard and   
            Jörg Liebeherr   Scaling properties of statistical
                                  end-to-end bounds in the network
                                  calculus . . . . . . . . . . . . . . . . 2300--2312
            Liang-Liang Xie and   
                    P. R. Kumar   On the path-loss attenuation regime for
                                  positive cost and linear scaling of
                                  transport capacity in wireless networks  2313--2328
               Michael Katz and   
                  Shlomo Shamai   Relaying protocols for two colocated
                                  users  . . . . . . . . . . . . . . . . . 2329--2344
      Nicholas J. A. Harvey and   
           Robert Kleinberg and   
            April Rasala Lehman   On the capacity of information networks  2345--2364
          Randall Dougherty and   
             Chris Freiling and   
                  Kenneth Zeger   Unachievability of network coding
                                  capacity . . . . . . . . . . . . . . . . 2365--2372
                  Xijin Yan and   
                   Jun Yang and   
                     Zhen Zhang   An outer bound for multisource multisink
                                  network coding with minimum cost
                                  consideration  . . . . . . . . . . . . . 2373--2385
           Michael Langberg and   
        Alexander Sprintson and   
                 Jehoshua Bruck   The encoding complexity of network
                                  coding . . . . . . . . . . . . . . . . . 2386--2397
                  Yunnan Wu and   
                 Kamal Jain and   
                  Sun-Yuan Kung   A unification of network coding and
                                  tree-packing (routing) theorems  . . . . 2398--2409
            Chandra Chekuri and   
         Christina Fragouli and   
                 Emina Soljanin   On average throughput and alphabet size
                                  in network coding  . . . . . . . . . . . 2410--2424
          Niranjan Ratnakar and   
                 Gerhard Kramer   The multicast capacity of deterministic
                                  relay networks with no interference  . . 2425--2432
                  Xue-Bin Liang   Matrix games in the multicast networks:
                                  maximum information flows with network
                                  switching  . . . . . . . . . . . . . . . 2433--2466
                Zongpeng Li and   
                 Baochun Li and   
                    Lap Chi Lau   On achieving maximum multicast
                                  throughput in undirected networks  . . . 2467--2485
               Supratim Deb and   
       Muriel Médard and   
                Clifford Choute   Algebraic gossip: a network coding
                                  approach to optimal multiple rumor
                                  mongering  . . . . . . . . . . . . . . . 2486--2507
               Stephen Boyd and   
               Arpita Ghosh and   
           Balaji Prabhakar and   
                  Devavrat Shah   Randomized gossip algorithms . . . . . . 2508--2530
      Birsen Sirkeci-Mergen and   
             Anna Scaglione and   
             Gökhan Mergen   Asymptotic analysis of multistage
                                  cooperative broadcast in wireless
                                  networks . . . . . . . . . . . . . . . . 2531--2550
               Amin Shokrollahi   Raptor codes . . . . . . . . . . . . . . 2551--2567
             Abbas El Gamal and   
               James Mammen and   
           Balaji Prabhakar and   
                  Devavrat Shah   Optimal throughput-delay scaling in
                                  wireless networks: part I: the fluid
                                  model  . . . . . . . . . . . . . . . . . 2568--2592
                    Jie Luo and   
             Anthony Ephremides   On the throughput, capacity, and
                                  stability regions of random multiple
                                  access . . . . . . . . . . . . . . . . . 2593--2607
             Desmond S. Lun and   
          Niranjan Ratnakar and   
       Muriel Médard and   
               Ralf Koetter and   
            David R. Karger and   
                  Tracey Ho and   
                 Ebad Ahmed and   
                      Fang Zhao   Minimum-cost multicast over coded packet
                                  networks . . . . . . . . . . . . . . . . 2608--2623
              Marcin Sikora and   
        J. Nicholas Laneman and   
             Martin Haenggi and   
    Daniel J. Costello, Jr. and   
                 Thomas E. Fuja   Bandwidth- and power-efficient routing
                                  in linear wireless networks  . . . . . . 2624--2633
                 Gang Liang and   
                  Nina Taft and   
                         Bin Yu   A fast lightweight approach to
                                  origin-destination IP traffic estimation
                                  using partial measurements . . . . . . . 2634--2648
          Dragan Petrovi\'c and   
         Kannan Ramchandran and   
                     Jan Rabaey   Overcoming untuned radios in wireless
                                  networks with network coding . . . . . . 2649--2657
               Peng-Jun Wan and   
                    Chih-Wei Yi   Coverage by randomly deployed wireless
                                  sensor networks  . . . . . . . . . . . . 2658--2669
                 Saikat Ray and   
                    Wei Lai and   
        Ioannis Ch. Paschalidis   Statistical location detection with
                                  sensor networks  . . . . . . . . . . . . 2670--2683
        Leonidas Georgiadis and   
             Leandros Tassiulas   Optimal overload response in sensor
                                  networks . . . . . . . . . . . . . . . . 2684--2696
          Rajesh Sundaresan and   
            Sergio Verdú   Capacity of queues via point-process
                                  channels . . . . . . . . . . . . . . . . 2697--2709
              Omer Gurewitz and   
               Israel Cidon and   
                     Moshe Sidi   One-way delay estimation using
                                  network-wide measurements  . . . . . . . 2710--2724
                 An-Swol Hu and   
             Sergio D. Servetto   On the scalability of cooperative time
                                  synchronization in pulse-connected
                                  networks . . . . . . . . . . . . . . . . 2725--2748
          Steven A. Borbash and   
             Anthony Ephremides   The feasibility of matchings in a
                                  wireless network . . . . . . . . . . . . 2749--2755
             Olivier Dousse and   
      Massimo Franceschetti and   
                 Patrick Thiran   On the throughput scaling of wireless
                                  relay networks . . . . . . . . . . . . . 2756--2761
              Ashish Khisti and   
                   Uri Erez and   
             Gregory W. Wornell   Fundamental limits and scaling behavior
                                  of cooperative multicasting in wireless
                                  networks . . . . . . . . . . . . . . . . 2762--2770
      Sahand Haji Ali Ahmad and   
     Aleksandar Jovi\vci\'c and   
               Pramod Viswanath   On outer bounds to the capacity region
                                  of wireless networks . . . . . . . . . . 2770--2776
                Xiaojun Lin and   
              Gaurav Sharma and   
           Ravi R. Mazumdar and   
                 Ness B. Shroff   Degenerate delay-capacity tradeoffs in
                                  ad-hoc networks with Brownian mobility   2777--2784
         Aditya Ramamoorthy and   
                 Kamal Jain and   
             Philip A. Chou and   
                Michelle Effros   Separating distributed source coding
                                  from network coding  . . . . . . . . . . 2785--2795
   Ángela I. Barbero and   
          Òyvind Ytrehus   Cycle-logical treatment for
                                  ``Cyclopathic'' networks . . . . . . . . 2795--2804
                 Kamal Jain and   
          Vijay V. Vazirani and   
                   Gideon Yuval   On the capacity of multiple unicast
                                  sessions in undirected graphs  . . . . . 2805--2809
      Alexandros G. Dimakis and   
          Vinod Prabhakaran and   
             Kannan Ramchandran   Decentralized erasure codes for
                                  distributed networked storage  . . . . . 2809--2816
           Razvan Cristescu and   
       Baltasar Beferull-Lozano   Lossy network correlated data gathering
                                  with high-resolution coding  . . . . . . 2817--2824
               Yitzhak Birk and   
                      Tomer Kol   Coding on demand by an informed source
                                  (ISCOD) for efficient broadcast of
                                  different supplemental data to caching
                                  clients  . . . . . . . . . . . . . . . . 2825--2830
      Massimo Franceschetti and   
                 Ronald Meester   Critical node lifetimes in random
                                  networks via the Chen-Stein method . . . 2831--2837
          Cheng-Shang Chang and   
               Yi-Ting Chen and   
                  Duan-Shin Lee   Constructions of optical FIFO queues . . 2838--2843

IEEE\slash ACM Transactions on Networking
Volume 14, Number 4, August, 2006

                    Don Towsley   Editorial  . . . . . . . . . . . . . . . 673--673
                   Ning Cai and   
                Mung Chiang and   
            Michelle Effros and   
               Ralf Koetter and   
       Muriel Médard and   
           Balaji Prabhakar and   
                 R. Srikant and   
                Don Towsley and   
               Raymond W. Yeung   Introduction to the special issue on
                                  networking and information theory  . . . 674--674
                    Don Towsley   Abstracts from the IEEE transactions on
                                  information theory, special issue, June
                                  2006 . . . . . . . . . . . . . . . . . . 675--682
      Aleksandar Kuzmanovic and   
             Edward W. Knightly   Low-rate TCP-targeted denial of service
                                  attacks and counter strategies . . . . . 683--696
              Nick Duffield and   
        Francesco Lo Presti and   
                Vern Paxson and   
                    Don Towsley   Network loss tomography using striped
                                  unicast probes . . . . . . . . . . . . . 697--710
            David Breitgand and   
                  Danny Raz and   
                  Yuval Shavitt   The traveling miser problem  . . . . . . 711--724
                   Lili Qiu and   
          Yang Richard Yang and   
                  Yin Zhang and   
                  Scott Shenker   On selfish routing in Internet-like
                                  environments . . . . . . . . . . . . . . 725--738
      Aleksandar Kuzmanovic and   
             Edward W. Knightly   TCP-LP: low-priority service via
                                  end-point congestion control . . . . . . 739--752
                   Jing Zhu and   
                  Sumit Roy and   
                     Jae H. Kim   Performance modelling of TCP
                                  enhancements in terrestrial-satellite
                                  hybrid networks  . . . . . . . . . . . . 753--766
                 Martin Karsten   Collected experience from implementing
                                  RSVP . . . . . . . . . . . . . . . . . . 767--778
                 Xinming He and   
      Christos Papadopoulos and   
              Pavlin Radoslavov   Incremental deployment strategies for
                                  router-assisted reliable multicast . . . 779--792
             Sunil Kulkarni and   
               Aravind Iyer and   
            Catherine Rosenberg   An address-light, integrated MAC and
                                  routing protocol for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 793--806
               Zi-Tsan Chou and   
              Ching-Chi Hsu and   
                  Shin-Neng Hsu   UPCF: a new point coordination function
                                  with QoS and power management for
                                  multimedia over wireless LANs  . . . . . 807--820
             Lih-feng Tsaur and   
                  Daniel C. Lee   Closed-loop architecture and protocols
                                  for rapid dynamic spreading gain
                                  adaptation in CDMA networks  . . . . . . 821--834
         Prasanna Chaporkar and   
             Saswati Sarkar and   
                   Rahul Shetty   Dynamic quorum policy for maximizing
                                  throughput in limited information
                                  multiparty MAC . . . . . . . . . . . . . 835--848
             Yigal Bejerano and   
              Randeep S. Bhatia   MiFi: a framework for fairness and QoS
                                  assurance for current IEEE 802.11
                                  networks with multiple access points . . 849--862
                  Kai Zheng and   
               Chengchen Hu and   
                 Hongbin Lu and   
                        Bin Liu   A TCAM-based distributed parallel IP
                                  lookup scheme and performance analysis   863--875
              Omer Gurewitz and   
               Israel Cidon and   
                     Moshe Sidi   Network classless time protocol based on
                                  clock offset optimization  . . . . . . . 876--888
               Hassan Naser and   
             Hussein T. Mouftah   A joint-ONU interval-based dynamic
                                  scheduling algorithm for Ethernet
                                  passive optical networks . . . . . . . . 889--899
          Daniel O. Awduche and   
                  Bijan Jabbari   Demand assigned capacity management
                                  (DACM) in IP over optical (IPO) networks 900--913
                Weifa Liang and   
                   Xiaojun Shen   A general approach for all-to-all
                                  routing in multihop WDM optical networks 914--923

IEEE\slash ACM Transactions on Networking
Volume 14, Number 5, October, 2006

             Cristian Estan and   
            George Varghese and   
                   Michael Fisk   Bitmap algorithms for counting active
                                  flows on high-speed links  . . . . . . . 925--937
                    Yung Yi and   
               Supratim Deb and   
              Sanjay Shakkottai   Time-scale decomposition and equivalent
                                  rate-based marking . . . . . . . . . . . 938--950
       Janardhan R. Iyengar and   
               Paul D. Amer and   
                Randall Stewart   Concurrent multipath transfer using SCTP
                                  multihoming over independent end-to-end
                                  paths  . . . . . . . . . . . . . . . . . 951--964
               Yaqing Huang and   
         Roch Guérin and   
                   Pranav Gupta   Supporting excess real-time traffic with
                                  active drop queue  . . . . . . . . . . . 965--977
           Richard T. B. Ma and   
              Sam C. M. Lee and   
             John C. S. Lui and   
                David K. Y. Yau   Incentive and service differentiation in
                                  P2P networks: a game theoretic approach  978--991
      Patrick Maillé and   
                   Bruno Tuffin   Pricing the Internet with multibid
                                  auctions . . . . . . . . . . . . . . . . 992--1004
           Vinay J. Ribeiro and   
            Rudolf H. Riedi and   
            Richard G. Baraniuk   Multiscale queueing analysis . . . . . . 1005--1018
            Nedo Celandroni and   
              Franco Davoli and   
                Erina Ferro and   
                  Alberto Gotta   Long-lived TCP connections via
                                  satellite: cross-layer bandwidth
                                  allocation, pricing, and adaptive
                                  control  . . . . . . . . . . . . . . . . 1019--1030
                Tarik Taleb and   
                   Nei Kato and   
                Yoshiaki Nemoto   REFWA: an efficient and fair congestion
                                  control scheme for LEO satellite
                                  networks . . . . . . . . . . . . . . . . 1031--1044
           Pavan Nuggehalli and   
          Vikram Srinivasan and   
  Carla-Fabiana Chiasserini and   
                  Ramesh R. Rao   Efficient cache placement in multi-hop
                                  wireless networks  . . . . . . . . . . . 1045--1055
      Iordanis Koutsopoulos and   
             Leandros Tassiulas   Cross-layer adaptive techniques for
                                  throughput enhancement in wireless
                                  OFDM-based networks  . . . . . . . . . . 1056--1066
            Matthew Andrews and   
                     Lisa Zhang   Scheduling over nonstationary wireless
                                  channels with finite rate sets . . . . . 1067--1077
               Wee-Seng Soh and   
                   Hyong S. Kim   A predictive bandwidth reservation
                                  scheme using mobile positioning and road
                                  topology information . . . . . . . . . . 1078--1091
             Yigal Bejerano and   
                 Rajeev Rastogi   Robust monitoring of link delays and
                                  faults in IP networks  . . . . . . . . . 1092--1103
        Narendra K. Singhal and   
    Laxman H. Sahasrabuddhe and   
            Biswanath Mukherjee   Optimal multicasting of multiple
                                  light-trees of different bandwidth
                                  granularities in a WDM mesh network with
                                  sparse splitting capabilities  . . . . . 1104--1117
                Zvi Rosberg and   
             Andrew Zalesky and   
                  Hai L. Vu and   
                 Moshe Zukerman   Analysis of OBS networks with limited
                                  wavelength conversion  . . . . . . . . . 1118--1127
                 Yinian Mao and   
                    Yan Sun and   
                     Min Wu and   
                  K. J. Ray Liu   JET: dynamic join-exit-tree amortization
                                  and scheduling for contributory key
                                  management . . . . . . . . . . . . . . . 1128--1140
             Frank K. Hwang and   
                Wen-Dar Lin and   
                Vadim Lioubimov   On noninterruptive rearrangeable
                                  networks . . . . . . . . . . . . . . . . 1141--1149
      Guillermo Barrenetxea and   
   Baltasar Beferull-Lozano and   
                Martin Vetterli   Correction to `Lattice networks:
                                  Capacity limits, optimal routing, and
                                  queueing behavior' . . . . . . . . . . . 1150--1150

IEEE\slash ACM Transactions on Networking
Volume 14, Number 6, December, 2006

        Jean-Yves Le Boudec and   
                 Milan Vojnovic   The random trip model: stability,
                                  stationary regime, and perfect
                                  simulation . . . . . . . . . . . . . . . 1153--1166
                 Jerzy Konorski   A game-theoretic study of CSMA/CA under
                                  a backoff attack . . . . . . . . . . . . 1167--1178
             Chun-Ting Chou and   
               Kang G. Shin and   
                 Sai Shankar N.   Contention-based airtime usage control
                                  in multirate IEEE 802.11 wireless LANs   1179--1192
            David Applegate and   
                    Edith Cohen   Making routing robust to changing
                                  traffic demands: algorithms and
                                  evaluation . . . . . . . . . . . . . . . 1193--1206
               Eddie Kohler and   
                 Jinyang Li and   
                Vern Paxson and   
                  Scott Shenker   Observed structure of addresses in IP
                                  traffic  . . . . . . . . . . . . . . . . 1207--1218
                Bamba Gueye and   
              Artur Ziviani and   
              Mark Crovella and   
                    Serge Fdida   Constraint-based geolocation of Internet
                                  hosts  . . . . . . . . . . . . . . . . . 1219--1232
        Srinivas Shakkottai and   
                     R. Srikant   Economics of network pricing with
                                  multiple ISPs  . . . . . . . . . . . . . 1233--1245
               David X. Wei and   
                  Cheng Jin and   
              Steven H. Low and   
                   Sanjay Hegde   FAST TCP: motivation, architecture,
                                  algorithms, performance  . . . . . . . . 1246--1259
              Huaizhong Han and   
        Srinivas Shakkottai and   
               C. V. Hollot and   
                 R. Srikant and   
                    Don Towsley   Multi-path TCP: a joint congestion
                                  control and routing scheme to exploit
                                  path diversity in the Internet . . . . . 1260--1271
                Dritan Nace and   
             Nhat-Linh Doan and   
               Eric Gourdin and   
                   Bernard Liau   Computing optimal max-min fair resource
                                  allocation for elastic flows . . . . . . 1272--1281
               Wei-Hua Wang and   
      Marimuthu Palaniswami and   
                  Steven H. Low   Application-oriented flow control:
                                  fundamentals, algorithms and fairness    1282--1291
     Anthony C. Boucouvalas and   
                       Pi Huang   OBEX over IrDA: performance analysis and
                                  optimization by considering multiple
                                  applications . . . . . . . . . . . . . . 1292--1301
           Jacob Chakareski and   
                 Philip A. Chou   RaDiO edge: rate-distortion optimized
                                  proxy-driven streaming from the network
                                  edge . . . . . . . . . . . . . . . . . . 1302--1312
                Xingzhe Fan and   
      Kartikeya Chandrayana and   
                Murat Arcak and   
     Shivkumar Kalyanaraman and   
             John Ting-Yung Wen   A two-time-scale design for edge-based
                                  detection and rectification of
                                  uncooperative flows  . . . . . . . . . . 1313--1322
                   Feng Xie and   
                  Gang Feng and   
               Chee Kheong Siew   The impact of loss recovery on
                                  congestion control for reliable
                                  multicast  . . . . . . . . . . . . . . . 1323--1335
             Dean H. Lorenz and   
                 Ariel Orda and   
                  Danny Raz and   
                  Yuval Shavitt   Efficient QoS partition and routing of
                                  unicast and multicast  . . . . . . . . . 1336--1347
                Xiaojun Lin and   
                 Ness B. Shroff   An optimization-based approach for QoS
                                  routing in high-bandwidth networks . . . 1348--1361
         Sriram Ramabhadran and   
                Joseph Pasquale   The Stratified Round Robin scheduler:
                                  design, analysis and implementation  . . 1362--1373
          Michael Rosenblum and   
      Constantine Caramanis and   
          Michel X. Goemans and   
                   Vahid Tarokh   Approximating fluid schedules in
                                  crossbar packet-switches and Banyan
                                  networks . . . . . . . . . . . . . . . . 1374--1387
                      Maher Ali   Generalized sharing in survivable
                                  optical networks . . . . . . . . . . . . 1388--1399


IEEE\slash ACM Transactions on Networking
Volume 15, Number 1, February, 2007

      Nathaniel E. Baughman and   
            Marc Liberatore and   
              Brian Neil Levine   Cheat-proof playout for centralized and
                                  peer-to-peer gaming  . . . . . . . . . . 1--13
        Ramana Rao Kompella and   
               Sumeet Singh and   
                George Varghese   On scalable attack detection in the
                                  network  . . . . . . . . . . . . . . . . 14--25
        Ramaswamy Ramaswamy and   
                    Tilman Wolf   High-speed prefix-preserving IP address
                                  anonymization for passive measurement
                                  systems  . . . . . . . . . . . . . . . . 26--39
               Haining Wang and   
                  Cheng Jin and   
                   Kang G. Shin   Defense against spoofed IP traffic using
                                  hop-count filtering  . . . . . . . . . . 40--53
             Sharad Jaiswal and   
        Gianluca Iannaccone and   
            Christophe Diot and   
                 Jim Kurose and   
                    Don Towsley   Measurement and classification of
                                  out-of-sequence packets in a Tier-1 IP
                                  backbone . . . . . . . . . . . . . . . . 54--66
               Dogu Arifler and   
         Gustavo de Veciana and   
                 Brian L. Evans   A factor analytic approach to inferring
                                  congestion sharing based on flow level
                                  measurements . . . . . . . . . . . . . . 67--79
                 Caixia Chi and   
                Dawei Huang and   
                  David Lee and   
                   XiaoRong Sun   Lazy flooding: a new technique for
                                  information dissemination in distributed
                                  network systems  . . . . . . . . . . . . 80--92
             Seung Jun Baek and   
             Gustavo De Veciana   Spatial energy balancing through
                                  proactive multipath routing in wireless
                                  multihop networks  . . . . . . . . . . . 93--104
    Ioannis Ch. Paschalidis and   
                    Wei Lai and   
              David Starobinski   Asymptotically optimal transmission
                                  policies for large-scale low-power
                                  wireless sensor networks . . . . . . . . 105--118
             Jakob Eriksson and   
         Michalis Faloutsos and   
      Srikanth V. Krishnamurthy   DART: dynamic address routing for
                                  scalable ad hoc and mesh networks  . . . 119--132
                    Yung Yi and   
              Sanjay Shakkottai   Hop-by-hop congestion control over a
                                  wireless multi-hop network . . . . . . . 133--144
                 Liang Song and   
           Dimitrios Hatzinakos   A cross-layer architecture of wireless
                                  sensor networks for target tracking  . . 145--158
               David Malone and   
                  Ken Duffy and   
                     Doug Leith   Modeling the 802.11 distributed
                                  coordination function in nonsaturated
                                  heterogeneous conditions . . . . . . . . 159--172
               Zongming Fei and   
                   Mengkun Yang   A proactive tree recovery mechanism for
                                  resilient overlay multicast  . . . . . . 173--186
           Seong-Ryong Kang and   
                Dmitri Loguinov   Modeling best-effort and FEC streaming
                                  of scalable video in lossy network
                                  channels . . . . . . . . . . . . . . . . 187--200
               Guoliang Xue and   
               Arunabha Sen and   
                Weiyi Zhang and   
                  Jian Tang and   
        Krishnaiya Thulasiraman   Finding a path subject to many additive
                                  QoS constraints  . . . . . . . . . . . . 201--211
                   Yong Lee and   
                 Jianyu Lou and   
                Junzhou Luo and   
                   Xiaojun Shen   An efficient packet scheduling algorithm
                                  with deadline guarantees for
                                  input-queued switches  . . . . . . . . . 212--225
           Ayman G. Fayoumi and   
            Anura P. Jayasumana   A surjective-mapping based model for
                                  optical shared-buffer cross-connect  . . 226--233
             Zhenghao Zhang and   
                  Yuanyuan Yang   On-line optimal wavelength assignment in
                                  WDM networks with shared wavelength
                                  converter pool . . . . . . . . . . . . . 234--245

IEEE\slash ACM Transactions on Networking
Volume 15, Number 2, April, 2007

              Nick Feamster and   
               Jennifer Rexford   Network-wide prediction of BGP routes    253--266
       Giuseppe Di Battista and   
            Thomas Erlebach and   
             Alexander Hall and   
        Maurizio Patrignani and   
          Maurizio Pizzonia and   
                  Thomas Schank   Computing the types of the relationships
                                  between autonomous systems . . . . . . . 267--280
                    Ping Ji and   
                   Zihui Ge and   
                 Jim Kurose and   
                    Don Towsley   A comparison of hard-state and
                                  soft-state signaling protocols . . . . . 281--294
    Predrag R. Jelenkovi\'c and   
       Petar Mom\vcilovi\'c and   
             Mark S. Squillante   Scalability of wireless networks . . . . 295--308
              Ping Chung Ng and   
               Soung Chang Liew   Throughput analysis of IEEE802.11
                                  multi-hop ad hoc networks  . . . . . . . 309--322
             Gennaro Boggia and   
             Pietro Camarda and   
       Luigi Alfredo Grieco and   
                Saverio Mascolo   Feedback-based control for providing
                                  real-time services with the 802.11e MAC  323--333
                    Hai Liu and   
                Xiaohua Jia and   
               Peng-Jun Wan and   
                Chih-Wei Yi and   
              S. Kami Makki and   
                  Niki Pissinou   Maximizing lifetime of sensor
                                  surveillance systems . . . . . . . . . . 334--345
    Seyit A. Çamtepe and   
              Bülent Yener   Combinatorial design of key distribution
                                  mechanisms for wireless sensor networks  346--358
         Srihari Nelakuditi and   
               Sanghwan Lee and   
                  Yinzhe Yu and   
               Zhi-Li Zhang and   
                 Chen-Nee Chuah   Fast local rerouting for handling
                                  transient link failures  . . . . . . . . 359--372
                Sonia Fahmy and   
                   Minseok Kwon   Characterizing overlay multicast
                                  networks and their costs . . . . . . . . 373--386
          Marjan Bozinovski and   
           Hans P. Schwefel and   
                  Ramjee Prasad   Maximum availability server selection
                                  policy for efficient and reliable
                                  session control systems  . . . . . . . . 387--399
          Mansoor Alicherry and   
                 Randeep Bhatia   Simple pre-provisioning scheme to enable
                                  fast restoration . . . . . . . . . . . . 400--412
                 Ron Banner and   
                     Ariel Orda   Multipath routing algorithms for
                                  congestion minimization  . . . . . . . . 413--424
      Alexandre O. Stauffer and   
              Valmir C. Barbosa   Probabilistic heuristics for
                                  disseminating information in networks    425--435
          Nicholas B. Chang and   
                    Mingyan Liu   Controlled flooding search in a large
                                  network  . . . . . . . . . . . . . . . . 436--449
            Aggelos Ioannou and   
        Manolis G. H. Katevenis   Pipelined heap (priority queue)
                                  management for advanced scheduling in
                                  high-speed networks  . . . . . . . . . . 450--461
                  Haibin Lu and   
                   Sartaj Sahni   $ O(\log W) $ multidimensional packet
                                  classification . . . . . . . . . . . . . 462--472
                  Eli Brosh and   
                 Asaf Levin and   
                  Yuval Shavitt   Approximation and heuristic algorithms
                                  for minimum-delay application-layer
                                  multicast trees  . . . . . . . . . . . . 473--484

IEEE\slash ACM Transactions on Networking
Volume 15, Number 3, June, 2007

             Augustin Soule and   
              Antonio Nucci and   
               Rene L. Cruz and   
            Emilio Leonardi and   
                      Nina Taft   Estimating dynamic traffic matrices by
                                  using viable routing changes . . . . . . 485--498
            David E. Taylor and   
             Jonathan S. Turner   ClassBench: a packet classification
                                  benchmark  . . . . . . . . . . . . . . . 499--511
             Mortada Mehyar and   
             Demetri Spanos and   
           John Pongsajapan and   
              Steven H. Low and   
              Richard M. Murray   Asynchronous distributed averaging on
                                  communication networks . . . . . . . . . 512--520
      Iordanis Koutsopoulos and   
             Leandros Tassiulas   Joint optimal access point selection and
                                  channel assignment in wireless networks  521--532
         Ashutosh Sabharwal and   
           Ahmad Khoshnevis and   
                Edward Knightly   Opportunistic spectral usage: bounds and
                                  a multi-band CSMA/CA protocol  . . . . . 533--545
     Karthikeyan Sundaresan and   
           Raghupathy Sivakumar   A unified MAC layer framework for ad-hoc
                                  networks with smart antennas . . . . . . 546--559
             Yigal Bejerano and   
              Seung-Jae Han and   
                          Li Li   Fairness and load balancing in wireless
                                  LANs using association control . . . . . 560--573
            Mehmet C. Vuran and   
                Ian F. Akyildiz   A-MAC: adaptive medium access control
                                  for next generation wireless terminals   574--587
               Anurag Kumar and   
               Eitan Altman and   
           Daniele Miorandi and   
                   Munish Goyal   New insights from a fixed-point analysis
                                  of single cell IEEE 802.11 WLANs . . . . 588--601
      Denizhan N. Alparslan and   
                Khosrow Sohraby   A generalized random mobility model for
                                  wireless ad hoc networks and its
                                  analysis: one-dimensional case . . . . . 602--615
      Denizhan N. Alparslan and   
                Khosrow Sohraby   Two-dimensional modeling and analysis of
                                  generalized random mobility models for
                                  wireless ad hoc networks . . . . . . . . 616--629
                 Junsoo Lee and   
            Stephan Bohacek and   
    João P. Hespanha and   
                 Katia Obraczka   Modeling communication networks with
                                  hybrid systems . . . . . . . . . . . . . 630--643
              Derek Leonard and   
               Zhongmei Yao and   
                  Vivek Rai and   
                Dmitri Loguinov   On lifetime-based node failure and
                                  stochastic resilience of decentralized
                                  peer-to-peer networks  . . . . . . . . . 644--656
           Michael J. Neely and   
              Eytan Modiano and   
               Yuan-Sheng Cheng   Logarithmic delay for $ N \times N $
                                  packet switches under the crossbar
                                  constraint . . . . . . . . . . . . . . . 657--668
           Nicolas Christin and   
        Jörg Liebeherr and   
               Tarek Abdelzaher   Enhancing class-based service
                                  architectures with adaptive rate
                                  allocation and dropping mechanisms . . . 669--682
      Balaji Krithikaivasan and   
                  Yong Zeng and   
               Kaushik Deka and   
                     Deep Medhi   ARCH-based traffic forecasting and
                                  dynamic bandwidth provisioning for
                                  periodically measured nonstationary
                                  traffic  . . . . . . . . . . . . . . . . 683--696
                 Cheng Chen and   
               Zheng Guo Li and   
                  Yeng Chai Soh   MRF: a framework for source and
                                  destination based bandwidth
                                  differentiation service  . . . . . . . . 697--708
          Massimo Tornatore and   
                Guido Maier and   
              Achille Pattavina   WDM network design by ILP models based
                                  on flow aggregation  . . . . . . . . . . 709--720
                  Chunsheng Xin   Blocking analysis of dynamic traffic
                                  grooming in mesh WDM optical networks    721--733

IEEE\slash ACM Transactions on Networking
Volume 15, Number 4, August, 2007

                 Ron Banner and   
                     Ariel Orda   The power of tuning: a novel approach
                                  for the efficient design of survivable
                                  networks . . . . . . . . . . . . . . . . 737--749
              Kwok Shing Ho and   
                Kwok Wai Cheung   Generalized survivable network . . . . . 750--760
            Renata Teixeira and   
         Timothy G. Griffin and   
     Mauricio G. C. Resende and   
               Jennifer Rexford   TIE breaking: tunable interdomain egress
                                  selection  . . . . . . . . . . . . . . . 761--774
               Xiaowei Yang and   
                David Clark and   
               Arthur W. Berger   NIRA: a new inter-domain routing
                                  architecture . . . . . . . . . . . . . . 775--788
              Antonio Nucci and   
     Supratik Bhattacharyya and   
                  Nina Taft and   
                Christophe Diot   IGP link weight assignment for
                                  operational Tier-1 backbones . . . . . . 789--802
                  Smita Rai and   
            Omkar Deshpande and   
                  Canhui Ou and   
          Charles U. Martel and   
            Biswanath Mukherjee   Reliable multipath provisioning for
                                  high-capacity backbone mesh networks . . 803--812
     Bernardo A. Movsichoff and   
       Constantino M. Lagoa and   
                        Hao Che   End-to-end optimal algorithms for
                                  integrated QoS, traffic engineering, and
                                  failure recovery . . . . . . . . . . . . 813--823
                    Ao Tang and   
               Jiantao Wang and   
              Steven H. Low and   
                    Mung Chiang   Equilibrium of heterogeneous congestion
                                  control: existence and uniqueness  . . . 824--837
              Yueping Zhang and   
           Seong-Ryong Kang and   
                Dmitri Loguinov   Delay-independent stability and
                                  performance of distributed congestion
                                  control  . . . . . . . . . . . . . . . . 838--851
                Injong Rhee and   
                      Lisong Xu   Limitations of equation-based congestion
                                  control  . . . . . . . . . . . . . . . . 852--865
          Robert N. Shorten and   
               Douglas J. Leith   On queue provisioning, network
                                  efficiency and the transmission control
                                  protocol . . . . . . . . . . . . . . . . 866--877
               Yanping Zhao and   
             Derek L. Eager and   
                 Mary K. Vernon   Network bandwidth requirements for
                                  scalable on-demand streaming . . . . . . 878--891
              Xiaoming Wang and   
                Dmitri Loguinov   Load-balancing performance of consistent
                                  hashing: asymptotic analysis of random
                                  node join  . . . . . . . . . . . . . . . 892--905
              Pi-Chung Wang and   
             Chun-Liang Lee and   
              Chia-Tai Chan and   
                  Hung-Yi Chang   Performance improvement of
                                  two-dimensional packet classification by
                                  filter rephrasing  . . . . . . . . . . . 906--917
                Xiliang Liu and   
         Kaliappa Ravindran and   
                Dmitri Loguinov   A queueing-theoretic foundation of
                                  available bandwidth estimation:
                                  single-hop analysis  . . . . . . . . . . 918--931
               Reuven Cohen and   
                   Liran Katzir   A generic quantitative approach to the
                                  scheduling of synchronous packets in a
                                  shared uplink wireless channel . . . . . 932--943
         Gábor Fodor and   
            Miklós Telek   Bounding the blocking probabilities in
                                  multirate CDMA networks supporting
                                  elastic services . . . . . . . . . . . . 944--956
                Xiaojun Cao and   
               Vishal Anand and   
                  Chunming Qiao   Waveband switching for dynamic traffic
                                  demands in multigranular optical
                                  networks . . . . . . . . . . . . . . . . 957--968
                Hung Q. Ngo and   
                 Dazhen Pan and   
                  Yuanyuan Yang   Optical switching networks with minimum
                                  number of limited-range wavelength
                                  converters . . . . . . . . . . . . . . . 969--979

IEEE\slash ACM Transactions on Networking
Volume 15, Number 5, October, 2007

              Gaurav Sharma and   
              Ravi Mazumdar and   
                 Ness B. Shroff   Delay and capacity trade-offs in mobile
                                  ad hoc networks: a global perspective    981--992
              Richard J. La and   
                      Yijie Han   Distribution of path durations in mobile
                                  ad hoc networks and path selection . . . 993--1006
                  Daji Qiao and   
              Sunghyun Choi and   
                   Kang G. Shin   Interference analysis and transmit power
                                  control in IEEE 802.11a/h wireless LANs  1007--1020
                 Longbi Lin and   
             Ness B. Shroff and   
                     R. Srikant   Asymptotically optimal energy-aware
                                  routing for multihop wireless networks
                                  with renewable energy sources  . . . . . 1021--1034
              Aditya Karnik and   
                   Anurag Kumar   Distributed optimal self-organization in
                                  ad hoc wireless sensor networks  . . . . 1035--1045
             Shailesh Patil and   
             Gustavo De Veciana   Managing resources and quality of
                                  service in heterogeneous wireless
                                  systems exploiting opportunism . . . . . 1046--1058
           Robert Schweller and   
                 Zhichun Li and   
                   Yan Chen and   
                    Yan Gao and   
               Ashish Gupta and   
                  Yin Zhang and   
             Peter A. Dinda and   
              Ming-Yang Kao and   
                   Gokhan Memik   Reversible sketches: enabling monitoring
                                  and analysis over high-speed data
                                  streams  . . . . . . . . . . . . . . . . 1059--1072
        Bozidar Radunovi\'c and   
            Jean-Yves Le Boudec   A unified framework for max-min and
                                  min-max fairness with applications . . . 1073--1083
                   Yan Chen and   
               David Bindel and   
               Han Hee Song and   
                  Randy H. Katz   Algebra-based scalable overlay network
                                  monitoring: algorithms, evaluation, and
                                  applications . . . . . . . . . . . . . . 1084--1097
                 Yasong Jin and   
               Soshant Bali and   
           Tyrone E. Duncan and   
                Victor S. Frost   Predicting properties of congestion
                                  events for a queueing system with fBm
                                  traffic  . . . . . . . . . . . . . . . . 1098--1108
                Yee-Ting Li and   
              Douglas Leith and   
              Robert N. Shorten   Experimental evaluation of TCP protocols
                                  for high-speed networks  . . . . . . . . 1109--1122
        Olivier Bonaventure and   
          Clarence Filsfils and   
         Pierre François   Achieving sub-50 milliseconds recovery
                                  upon BGP peering link failures . . . . . 1123--1135
                Anton Riedl and   
             Dominic A. Schupke   Routing optimization in IP networks
                                  utilizing additive and concave link
                                  metrics  . . . . . . . . . . . . . . . . 1136--1148
               Yanping Zhao and   
             Derek L. Eager and   
                 Mary K. Vernon   Scalable on-demand streaming of
                                  nonlinear media  . . . . . . . . . . . . 1149--1162
                   Jikai Li and   
              Chunming Qiao and   
                  Jinhui Xu and   
                       Dahai Xu   Maximizing throughput for optical burst
                                  switching networks . . . . . . . . . . . 1163--1176
                 Jing Zhang and   
                  Keyao Zhu and   
                   Hui Zang and   
          Norman S. Matloff and   
            Biswanath Mukherjee   Availability-aware provisioning
                                  strategies for differentiated protection
                                  services in wavelength-convertible WDM
                                  mesh networks  . . . . . . . . . . . . . 1177--1190
             Zhenghao Zhang and   
                  Yuanyuan Yang   A novel analytical model for switches
                                  with shared buffer . . . . . . . . . . . 1191--1203
              Dijiang Huang and   
               Manish Mehta and   
     Appie van de Liefvoort and   
                     Deep Medhi   Modeling pairwise key establishment for
                                  random key predistribution in
                                  large-scale sensor networks  . . . . . . 1204--1215

IEEE\slash ACM Transactions on Networking
Volume 15, Number 6, December, 2007

                    Long Le and   
                  Jay Aikat and   
               Kevin Jeffay and   
              F. Donelson Smith   The effects of active queue management
                                  and explicit congestion notification on
                                  Web performance  . . . . . . . . . . . . 1217--1230
                   Thomas Voice   Stability of multi-path dual congestion
                                  control algorithms . . . . . . . . . . . 1231--1239
            Prashanth Hande and   
              Shengyu Zhang and   
                    Mung Chiang   Distributed rate allocation for
                                  inelastic flows  . . . . . . . . . . . . 1240--1253
         Patrick G. Bridges and   
               Gary T. Wong and   
             Matti Hiltunen and   
     Richard D. Schlichting and   
             Matthew J. Barrick   A configurable and extensible transport
                                  protocol . . . . . . . . . . . . . . . . 1254--1265
              Nick Feamster and   
              Ramesh Johari and   
              Hari Balakrishnan   Implications of autonomy for the
                                  expressiveness of policy routing . . . . 1266--1279
     Pierre François and   
            Olivier Bonaventure   Avoiding transient loops during the
                                  convergence of link-state routing
                                  protocols  . . . . . . . . . . . . . . . 1280--1292
Gábor Rétvári and   
József J. Bíró and   
                  Tibor Cinkler   On shortest path representation  . . . . 1293--1306
                   Jin Xiao and   
                  Raouf Boutaba   Assessing network service profitability:
                                  modeling from market science perspective 1307--1320
                Amos Beimel and   
               Shlomi Dolev and   
                    Noam Singer   RT oblivious erasure correcting  . . . . 1321--1332
            Atilla Eryilmaz and   
                     R. Srikant   Fair resource allocation in wireless
                                  networks using queue-length-based
                                  scheduling and congestion control  . . . 1333--1344
  Mohammad Taghi Hajiaghayi and   
           Nicole Immorlica and   
              Vahab S. Mirrokni   Power optimization in fault-tolerant
                                  topology control algorithms for wireless
                                  multi-hop networks . . . . . . . . . . . 1345--1358
               Ritesh Madan and   
               Shuguang Cui and   
                Sanjay Lall and   
            Andrea J. Goldsmith   Modeling and optimization of
                                  transmission schemes in
                                  energy-constrained wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1359--1372
                Yaling Yang and   
                   Jun Wang and   
                  Robin Kravets   Distributed optimal contention window
                                  control for elastic traffic in
                                  single-cell wireless LANs  . . . . . . . 1373--1386
             Xiangying Yang and   
             Gustavo De Veciana   Inducing multiscale clustering using
                                  multistage MAC contention in CDMA ad hoc
                                  networks . . . . . . . . . . . . . . . . 1387--1400
                  Huiyu Luo and   
              Gregory J. Pottie   Designing routes for source coding with
                                  explicit side information in sensor
                                  networks . . . . . . . . . . . . . . . . 1401--1413
               Sandro Bosio and   
             Antonio Capone and   
                  Matteo Cesana   Radio planning of wireless local area
                                  networks . . . . . . . . . . . . . . . . 1414--1427
           Satish Raghunath and   
         K. K. Ramakrishnan and   
         Shivkumar Kalyanaraman   Measurement-based characterization of IP
                                  VPNs . . . . . . . . . . . . . . . . . . 1428--1441
                Chengzhi Li and   
             Almut Burchard and   
            Jörg Liebeherr   A network calculus with effective
                                  bandwidth  . . . . . . . . . . . . . . . 1442--1453
                  Paolo Valente   Exact GPS simulation and optimal fair
                                  scheduling with logarithmic complexity   1454--1466
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
              Shantidev Mohanty   Fast, memory efficient flow rate
                                  estimation using runs  . . . . . . . . . 1467--1477
                   Jie Lian and   
           Kshirasagar Naik and   
                Gordon B. Agnew   A framework for evaluating the
                                  performance of cluster algorithms for
                                  hierarchical networks  . . . . . . . . . 1478--1489
          Patrick P. C. Lee and   
               Vishal Misra and   
                 Dan Rubenstein   Distributed algorithms for secure
                                  multipath routing in attack-resistant
                                  networks . . . . . . . . . . . . . . . . 1490--1501
                   Heng Yin and   
                   Haining Wang   Building an application-aware IPsec
                                  policy system  . . . . . . . . . . . . . 1502--1513
                    Yan Sun and   
                  K. J. Ray Liu   Hierarchical group access control for
                                  secure multicast communications  . . . . 1514--1526
              Javier Salido and   
               Loukas Lazos and   
               Radha Poovendran   Energy and bandwidth-efficient key
                                  distribution in wireless ad hoc
                                  networks: a cross-layer approach . . . . 1527--1540
            Emilio Leonardi and   
               Marco Mellia and   
        Marco Ajmone Marsan and   
                     Fabio Neri   Optimal scheduling and routing for
                                  maximum network throughput . . . . . . . 1541--1554
           Olufemi Komolafe and   
                    David Harle   An holistic framework for regular
                                  virtual topology design  . . . . . . . . 1555--1564
           Haitham S. Hamza and   
             Jitender S. Deogun   WDM optical interconnects: a balanced
                                  design approach  . . . . . . . . . . . . 1565--1578
              Piotr Cho\lda and   
              Andrzej Jajszczyk   Reliability assessment of optical
                                  p-cycles . . . . . . . . . . . . . . . . 1579--1592
           Mordechai Shalom and   
                    Shmuel Zaks   A $ 10 / 7 + \epsilon $ approximation
                                  for minimizing the number of ADMs in
                                  SONET rings  . . . . . . . . . . . . . . 1593--1602
       François Abel and   
          Cyriel Minkenberg and   
              Ilias Iliadis and   
              Ton Engbersen and   
             Mitchell Gusat and   
        Ferdinand Gramsamer and   
              Ronald P. Luijten   Design issues in next-generation
                                  merchant switch fabrics  . . . . . . . . 1603--1615
                Hongbin Luo and   
                Hongfang Yu and   
                       Lemin Li   Comments on `Segment shared protection
                                  in mesh communication networks with
                                  bandwidth guaranteed tunnels'  . . . . . 1616--1616


IEEE\slash ACM Transactions on Networking
Volume 16, Number 1, February, 2008

             Ram Keralapura and   
             Chen-Nee Chuah and   
                  Nina Taft and   
            Gianluca Iannaccone   Race conditions in coexisting overlay
                                  networks . . . . . . . . . . . . . . . . 1--14
            Michael T. Goodrich   Probabilistic packet marking for
                                  large-scale IP traceback . . . . . . . . 15--24
              Yuval Shavitt and   
                   Tomer Tankel   Hyperbolic embedding of Internet graph
                                  for distance estimation and overlay
                                  construction . . . . . . . . . . . . . . 25--36
              Nick Duffield and   
          Matthias Grossglauser   Trajectory sampling with unreliable
                                  reporting  . . . . . . . . . . . . . . . 37--50
                Fabian Kuhn and   
          Roger Wattenhofer and   
                Aaron Zollinger   An algorithmic approach to geographic
                                  routing in ad hoc and sensor networks    51--62
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
         Cauligi S. Raghavendra   Efficient routing in intermittently
                                  connected mobile networks: the
                                  single-copy case . . . . . . . . . . . . 63--76
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
         Cauligi S. Raghavendra   Efficient routing in intermittently
                                  connected mobile networks: the
                                  multiple-copy case . . . . . . . . . . . 77--90
              Aditya Akella and   
                Bruce Maggs and   
          Srinivasan Seshan and   
                   Anees Shaikh   On the performance benefits of
                                  multihoming route control  . . . . . . . 91--104
               Shigang Chen and   
             Meongchul Song and   
                   Sartaj Sahni   Two techniques for fast computation of
                                  constrained shortest paths . . . . . . . 105--115
Venugopalan Ramasubramanian and   
            Daniel Mossé   BRA: a bidirectional routing abstraction
                                  for asymmetric mobile ad hoc networks    116--129
                Xiliang Liu and   
         Kaliappa Ravindran and   
                Dmitri Loguinov   A stochastic foundation of available
                                  bandwidth estimation: multi-hop analysis 130--143
               Maulin Patel and   
          R. Chandrasekaran and   
                  S. Venkatesan   Improved quasi-path restoration in mesh
                                  networks . . . . . . . . . . . . . . . . 144--156
 Srinivasan Ramasubramanian and   
                   Amit Chandak   Dual-link failure resiliency through
                                  backup link mutual exclusion . . . . . . 157--169
           Aleksandra Smiljanic   Rate and delay guarantees provided by
                                  Clos packet switches with load balancing 170--181
              Ilias Iliadis and   
              Cyriel Minkenberg   Performance of a speculative
                                  transmission scheme for
                                  scheduling-latency reduction . . . . . . 182--195
                 R. L. Cruz and   
                Saleh Al-Harthi   A service-curve framework for packet
                                  scheduling with switch configuration
                                  delays . . . . . . . . . . . . . . . . . 196--205
                  Saad Mneimneh   Matching from the first iteration: an
                                  iterative switching algorithm for an
                                  input queued switch  . . . . . . . . . . 206--217
                Adam Kirsch and   
           Michael Mitzenmacher   Simple summaries for hashing with
                                  choices  . . . . . . . . . . . . . . . . 218--231
                   Xin Wang and   
        Henning Schulzrinne and   
              Dilip Kandlur and   
                   Dinesh Verma   Measurement and analysis of LDAP
                                  performance  . . . . . . . . . . . . . . 232--243
                William Lau and   
     Gustav Filip Rosenbaum and   
                     Sanjay Jha   Comments on `Dynamic routing of
                                  restorable bandwidth-guaranteed tunnels
                                  using aggregated network resource usage
                                  information' . . . . . . . . . . . . . . 244--245

IEEE\slash ACM Transactions on Networking
Volume 16, Number 2, April, 2008

              Yuh-Ming Chiu and   
                   Do Young Eun   Minimizing file download time in
                                  stochastic peer-to-peer networks . . . . 253--266
           Daniel Stutzbach and   
                Reza Rejaie and   
                 Subhabrata Sen   Characterizing unstructured overlay
                                  topologies in modern P2P file-sharing
                                  systems  . . . . . . . . . . . . . . . . 267--280
              Kin-Wah Kwong and   
                    H. K. Tsang   Building heterogeneous peer-to-peer
                                  networks: protocol and analysis  . . . . 281--292
                Lukas Kencl and   
            Jean-Yves Le Boudec   Adaptive load sharing for network
                                  processors . . . . . . . . . . . . . . . 293--306
               Joel Sommers and   
               Paul Barford and   
              Nick Duffield and   
                       Amos Ron   A geometric approach to improving active
                                  packet loss measurement  . . . . . . . . 307--320
              Y. Thomas Hou and   
                     Yi Shi and   
               Hanif D. Sherali   Rate allocation and network lifetime
                                  problems for wireless sensor networks    321--334
               Nima Sarshar and   
           Behnam A. Rezaei and   
          Vwani P. Roychowdhury   Low latency wireless ad hoc networking:
                                  power and bandwidth challenges and a
                                  solution . . . . . . . . . . . . . . . . 335--346
              Honghai Zhang and   
                Jennifer C. Hou   Asymptotic critical total power for
                                  $k$-connectivity of wireless networks    347--358
         Vehbi Cagri Gungor and   
    Özgür B. Akan and   
                Ian F. Akyildiz   A real-time and reliable transport
                                  (RT)$^2$ protocol for wireless sensor
                                  and actor networks . . . . . . . . . . . 359--370
           Isabella Cerutti and   
           Andrea Fumagalli and   
                     Puja Gupta   Delay models of single-source
                                  single-relay cooperative ARQ protocols
                                  in slotted radio networks with Poisson
                                  frame arrivals . . . . . . . . . . . . . 371--382
               Holger Boche and   
                Martin Schubert   A superlinearly and globally convergent
                                  algorithm for power control and resource
                                  allocation with general interference
                                  functions  . . . . . . . . . . . . . . . 383--395
           Michael J. Neely and   
              Eytan Modiano and   
                   Chih-Ping Li   Fairness and optimal stochastic control
                                  for heterogeneous networks . . . . . . . 396--409
             Seung Yeob Nam and   
                Sunggon Kim and   
                  Dan Keun Sung   Measurement-based admission control at
                                  edge routers . . . . . . . . . . . . . . 410--423
                  Zafar Ali and   
              Waseem Sheikh and   
          Edwin K. P. Chong and   
                   Arif Ghafoor   A scalable call admission control
                                  algorithm  . . . . . . . . . . . . . . . 424--434
                 Minsu Shin and   
                 Song Chong and   
                    Injong Rhee   Dual-resource TCP/AQM for
                                  processing-constrained networks  . . . . 435--449
         Christina Fragouli and   
           Jörg Widmer and   
            Jean-Yves Le Boudec   Efficient broadcasting using network
                                  coding . . . . . . . . . . . . . . . . . 450--463
         Violet R. Syrotiuk and   
        Charles J. Colbourn and   
              Sruthi Yellamraju   Rateless forward error correction for
                                  topology-transparent scheduling  . . . . 464--472
 Srinivasan Ramasubramanian and   
                 Arun K. Somani   MICRON: a framework for connection
                                  establishment in optical networks  . . . 473--485
               Dongmei Wang and   
                    Guangzhi Li   Efficient distributed bandwidth
                                  management for MPLS fast reroute . . . . 486--495
              Aditya Akella and   
                Bruce Maggs and   
          Srinivasan Seshan and   
               Anees Shaikh and   
            Ramesh K. Sitaraman   Corrections to `On the performance
                                  benefits of multihoming route control'   496--496

IEEE\slash ACM Transactions on Networking
Volume 16, Number 3, June, 2008

               Sachin Katti and   
            Hariharan Rahul and   
                  Wenjun Hu and   
                Dina Katabi and   
       Muriel Médard and   
                  Jon Crowcroft   XORs in the air: practical wireless
                                  network coding . . . . . . . . . . . . . 497--510
                Injong Rhee and   
               Ajit Warrier and   
                 Mahesh Aia and   
                Jeongki Min and   
             Mihail L. Sichitiu   Z-MAC: a hybrid MAC for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 511--524
               Archan Misra and   
               Abhishek Roy and   
                   Sajal K. Das   Information-theory based optimal
                                  location management schemes for
                                  integrated multi-system wireless
                                  networks . . . . . . . . . . . . . . . . 525--538
            Behcet Sarikaya and   
                     Xiao Zheng   SIP paging and tracking of wireless LAN
                                  hosts for VoIP . . . . . . . . . . . . . 539--548
   Karthik Lakshminarayanan and   
              Daniel Adkins and   
              Adrian Perrig and   
                     Ion Stoica   Securing user-controlled routing
                                  infrastructures  . . . . . . . . . . . . 549--561
              Seong Soo Kim and   
          A. L. Narasimha Reddy   Statistical techniques for detecting
                                  traffic anomalies through packet header
                                  data . . . . . . . . . . . . . . . . . . 562--575
                 Haifeng Yu and   
           Michael Kaminsky and   
         Phillip B. Gibbons and   
             Abraham D. Flaxman   SybilGuard: defending against sybil
                                  attacks via social networks  . . . . . . 576--589
               Yung-Ming Li and   
                   Yong Tan and   
                  Yong-Pin Zhou   Analysis of scale effects in
                                  peer-to-peer networks  . . . . . . . . . 590--602
   Laurent Massoulié and   
                 Milan Vojnovic   Coupon replication systems . . . . . . . 603--616
Fabián E. Bustamante and   
                        Yi Qiao   Designing less-structured P2P systems
                                  for the expected high churn  . . . . . . 617--627
                   Xunqi Yu and   
         James W. Modestino and   
             Ragip Kurceren and   
                   Yee Sin Chan   A model-based approach to evaluation of
                                  the efficacy of FEC coding in combating
                                  network packet losses  . . . . . . . . . 628--641
                Weiyi Zhang and   
               Guoliang Xue and   
                  Jian Tang and   
       Krishnaiyan Thulasiraman   Faster algorithms for construction of
                                  recovery trees enhancing QoP and QoS . . 642--655
               Guoliang Xue and   
                Weiyi Zhang and   
                  Jian Tang and   
       Krishnaiyan Thulasiraman   Polynomial time approximation algorithms
                                  for multi-constrained QoS routing  . . . 656--669
                   Jian Chu and   
                   Chin-Tau Lea   New architecture and algorithms for fast
                                  construction of hose-model VPNs  . . . . 670--679
              Chen-Shu Wang and   
                Ching-Ter Chang   Integrated genetic algorithm and goal
                                  programming for network topology design
                                  problem with multiple objectives and
                                  multiple criteria  . . . . . . . . . . . 680--690
               Reuven Cohen and   
                   Gabi Nakibly   On the computational complexity and
                                  effectiveness of $N$-hub shortest-path
                                  routing  . . . . . . . . . . . . . . . . 691--704
                Sundar Iyer and   
        Ramana Rao Kompella and   
                   Nick McKeown   Designing packet buffers for router
                                  linecards  . . . . . . . . . . . . . . . 705--717
                  Si-Min He and   
                Shu-Tao Sun and   
              Hong-Tao Guan and   
                Qiang Zheng and   
              You-Jian Zhao and   
                        Wen Gao   On guaranteed smooth switching for
                                  buffered crossbar switches . . . . . . . 718--731
             Xiaohong Jiang and   
          Achille Pattavina and   
               Susumu Horiguchi   Strictly nonblocking $f$-cast photonic
                                  networks . . . . . . . . . . . . . . . . 732--745

IEEE\slash ACM Transactions on Networking
Volume 16, Number 4, August, 2008

         Athina Markopoulou and   
        Gianluca Iannaccone and   
     Supratik Bhattacharyya and   
             Chen-Nee Chuah and   
             Yashar Ganjali and   
                Christophe Diot   Characterization of failures in an
                                  operational IP backbone network  . . . . 749--762
                Min Sik Kim and   
               Taekhyun Kim and   
             Yong-June Shin and   
               Simon S. Lam and   
               Edward J. Powers   A wavelet-based approach to detect
                                  shared congestion  . . . . . . . . . . . 763--776
                     Tao Ye and   
               Hema T. Kaur and   
     Shivkumar Kalyanaraman and   
                   Murat Yuksel   Large-scale network parameter
                                  configuration using an on-line
                                  simulation framework . . . . . . . . . . 777--790
                   Imad Aad and   
         Jean-Pierre Hubaux and   
             Edward W. Knightly   Impact of denial of service attacks on
                                  ad hoc networks  . . . . . . . . . . . . 791--802
         Daniele Micciancio and   
               Saurabh Panjwani   Optimal communication complexity of
                                  generic multicast key distribution . . . 803--813
      Supriya Krishnamurthy and   
            Sameh El-Ansary and   
                Erik Aurell and   
                    Seif Haridi   An analytical study of a structured
                                  overlay in the presence of dynamic
                                  membership . . . . . . . . . . . . . . . 814--825
                    Loc Bui and   
            Atilla Eryilmaz and   
                 R. Srikant and   
                     Xinzhou Wu   Asynchronous congestion control in
                                  multi-hop wireless networks with maximal
                                  matching-based scheduling  . . . . . . . 826--839
               Rajiv Gandhi and   
             Arunesh Mishra and   
       Srinivasan Parthasarathy   Minimizing broadcast latency and
                                  redundancy in ad hoc networks  . . . . . 840--851
            Vincent Lenders and   
                 Martin May and   
              Bernhard Plattner   Density-based anycast: a robust routing
                                  strategy for wireless ad hoc networks    852--863
            Michele Garetto and   
        Theodoros Salonidis and   
             Edward W. Knightly   Modeling per-flow throughput and
                                  capturing starvation in CSMA multi-hop
                                  wireless networks  . . . . . . . . . . . 864--877
               Omesh Tickoo and   
                  Biplab Sikdar   Modeling queueing and channel access
                                  delay in unsaturated IEEE 802.11 random
                                  access MAC based wireless networks . . . 878--891
                Cunqing Hua and   
            Tak-Shing Peter Yum   Optimal routing and data aggregation for
                                  maximizing lifetime of wireless sensor
                                  networks . . . . . . . . . . . . . . . . 892--903
                Xueyan Tang and   
                   Jianliang Xu   Optimizing lifetime for continuous data
                                  aggregation with precision guarantees in
                                  wireless sensor networks . . . . . . . . 904--917
                Rami Langar and   
          Nizar Bouabdallah and   
                  Raouf Boutaba   A comprehensive analysis of mobility
                                  management in MPLS-based wireless access
                                  networks . . . . . . . . . . . . . . . . 918--931
                Yiping Xing and   
                R. Chandramouli   Stochastic learning solution for
                                  distributed discrete power control game
                                  in wireless data networks  . . . . . . . 932--944
               Do Young Eun and   
                   Xinbing Wang   Achieving 100% throughput in TCP/AQM
                                  under aggressive packet marking with
                                  small buffer . . . . . . . . . . . . . . 945--956
         Stephen L. Spitler and   
                  Daniel C. Lee   Integration of explicit
                                  effective-bandwidth-based QoS routing
                                  with best-effort routing . . . . . . . . 957--969
          Andrew Brzezinski and   
                  Eytan Modiano   Achieving 100% throughput in
                                  reconfigurable optical networks  . . . . 970--983
               Karyn Benson and   
          Benjamin Birnbaum and   
    Esteban Molina-Estolano and   
            Ran Libeskind-Hadas   Competitive analysis of online traffic
                                  grooming in WDM rings  . . . . . . . . . 984--997

IEEE\slash ACM Transactions on Networking
Volume 16, Number 5, October, 2008

                    Nan Jin and   
                   Scott Jordan   On the feasibility of dynamic
                                  congestion-based pricing in
                                  differentiated services networks . . . . 1001--1014
            Miriam Allalouf and   
                  Yuval Shavitt   Centralized and distributed algorithms
                                  for routing and weighted max-min fair
                                  bandwidth allocation . . . . . . . . . . 1015--1024
              Ishai Menache and   
                  Nahum Shimkin   Capacity management and equilibrium for
                                  proportional QoS . . . . . . . . . . . . 1025--1037
            Tuna Güven and   
              Richard J. La and   
            Mark A. Shayman and   
            Bobby Bhattacharjee   A unified framework for multipath
                                  routing for unicast and multicast
                                  traffic  . . . . . . . . . . . . . . . . 1038--1051
                    Shu Tao and   
        John Apostolopoulos and   
             Roch Guérin   Real-time monitoring of video quality in
                                  IP networks  . . . . . . . . . . . . . . 1052--1065
             Milan Vojnovic and   
             Ayalvadi J. Ganesh   On the race of worms, alerts, and
                                  patches  . . . . . . . . . . . . . . . . 1066--1079
         Venkatesh Ramaiyan and   
               Anurag Kumar and   
                   Eitan Altman   Fixed point analysis of single cell IEEE
                                  802.11e WLANs: uniqueness and
                                  multistability . . . . . . . . . . . . . 1080--1093
            Hazer Inaltekin and   
              Stephen B. Wicker   The analysis of Nash equilibria of the
                                  one-shot random-access game for wireless
                                  networks and the behavior of selfish
                                  nodes  . . . . . . . . . . . . . . . . . 1094--1107
                   Wei Wang and   
          Vikram Srinivasan and   
                Kee-Chaing Chua   Extending the lifetime of wireless
                                  sensor networks through mobile relays    1108--1120
              Gaurav Sharma and   
               Ravi R. Mazumdar   A case for hybrid sensor networks  . . . 1121--1132
         Sundar Subramanian and   
          Sanjay Shakkottai and   
               Ari Arapostathis   Broadcasting in sensor networks: the
                                  role of local information  . . . . . . . 1133--1146
                Ahmed Bader and   
                    Eylem Ekici   Performance optimization of
                                  interference-limited multihop networks   1147--1160
              Aditya Karnik and   
               Aravind Iyer and   
            Catherine Rosenberg   Throughput-optimal configuration of
                                  fixed wireless networks  . . . . . . . . 1161--1174
              Honghai Zhang and   
                Jennifer C. Hou   On the asymptotic minimum transporting
                                  energy and its implication on the
                                  wireless network capacity  . . . . . . . 1175--1187
               Michael J. Neely   Order optimal delay for opportunistic
                                  scheduling in multi-user wireless
                                  uplinks and downlinks  . . . . . . . . . 1188--1199
      Salah-Eddine Elayoubi and   
     Beno\^\it Fourestié   Performance evaluation of admission
                                  control and adaptive modulation in OFDMA
                                  WiMax systems  . . . . . . . . . . . . . 1200--1211
 Juan José Jaramillo and   
                Fabio Milan and   
                     R. Srikant   Padded frames: a novel algorithm for
                                  stable scheduling in load-balanced
                                  switches . . . . . . . . . . . . . . . . 1212--1225
               Bensong Chen and   
          George N. Rouskas and   
                    Rudra Dutta   On hierarchical traffic grooming in WDM
                                  networks . . . . . . . . . . . . . . . . 1226--1238

IEEE\slash ACM Transactions on Networking
Volume 16, Number 6, December, 2008

                    Kuai Xu and   
               Zhi-Li Zhang and   
         Supratik Bhattacharyya   Internet traffic behavior profiling for
                                  network security monitoring  . . . . . . 1241--1252
                 Minho Sung and   
                     Jun Xu and   
                     Jun Li and   
                          Li Li   Large-scale IP traceback in high-speed
                                  Internet: practical techniques and
                                  information-theoretic foundation . . . . 1253--1266
               Xiaowei Yang and   
            David Wetherall and   
                Thomas Anderson   TVA: a DoS-limiting network architecture 1267--1280
                   Yong Xia and   
Lakshminarayanan Subramanian and   
                 Ion Stoica and   
         Shivkumar Kalyanaraman   One more bit is enough . . . . . . . . . 1281--1294
            Renata Teixeira and   
                Aman Shaikh and   
         Timothy G. Griffin and   
               Jennifer Rexford   Impact of hot-potato routing changes in
                                  IP networks  . . . . . . . . . . . . . . 1295--1307
            Fernando Solano and   
             Thomas Stidsen and   
             Ramon Fabregat and   
                Jose Luis Marzo   Label space reduction in MPLS networks:
                                  how much can a single stacked label do?  1308--1320
          Randeep S. Bhatia and   
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Bandwidth guaranteed routing with fast
                                  restoration against link and node
                                  failures . . . . . . . . . . . . . . . . 1321--1330
            Stamatis Stefanakos   Reliable routings in networks with
                                  generalized link failure events  . . . . 1331--1339
       George F. Georgakopoulos   Buffered cross-bar switches, revisited:
                                  design steps, proofs and simulations
                                  towards optimal rate and minimum buffer
                                  memory . . . . . . . . . . . . . . . . . 1340--1351
     Srinivasan Ramasubramanian   Supporting multiple protection
                                  strategies in optical networks . . . . . 1352--1365
                   Lei Song and   
                 Jing Zhang and   
            Biswanath Mukherjee   A comprehensive study on
                                  backup-bandwidth reprovisioning after
                                  network-state updates in survivable
                                  telecom mesh networks  . . . . . . . . . 1366--1377
                   Qun Zhao and   
                 Mohan Gurusamy   Lifetime maximization for connected
                                  target coverage in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1378--1391
       John Papandriopoulos and   
            Subhrakanti Dey and   
                    Jamie Evans   Optimal and distributed protocols for
                                  cross-layer design of physical and
                                  transport layers in MANETs . . . . . . . 1392--1405
          Andrew Brzezinski and   
                Gil Zussman and   
                  Eytan Modiano   Distributed throughput maximization in
                                  wireless mesh networks via
                                  pre-partitioning . . . . . . . . . . . . 1406--1419
            Prashanth Hande and   
             Sundeep Rangan and   
                Mung Chiang and   
                     Xinzhou Wu   Distributed uplink power control for
                                  optimal SIR assignment in cellular data
                                  networks . . . . . . . . . . . . . . . . 1420--1433
              Aaron Walters and   
                 David Zage and   
           Cristina Nita Rotaru   A framework for mitigating attacks
                                  against measurement-based adaptation
                                  mechanisms in unstructured multicast
                                  overlay networks . . . . . . . . . . . . 1434--1446
            Mohamed Hefeeda and   
                    Osama Saleh   Traffic modeling and proportional
                                  partial caching for peer-to-peer systems 1447--1460
                     Tao Wu and   
              David Starobinski   A comparative analysis of server
                                  selection in content replication
                                  networks . . . . . . . . . . . . . . . . 1461--1474
              Derek Leonard and   
               Zhongmei Yao and   
              Xiaoming Wang and   
                Dmitri Loguinov   On static and dynamic partitioning
                                  behavior of large-scale P2P networks . . 1475--1488


IEEE\slash ACM Transactions on Networking
Volume 17, Number 1, February, 2009

           Piet Van Mieghem and   
               Jasmina Omic and   
                   Robert Kooij   Virus spread in networks . . . . . . . . 1--14
                     Yi Xie and   
                  Shun-Zheng Yu   Monitoring the application-layer DDoS
                                  attacks for popular websites . . . . . . 15--25
         Supranamaya Ranjan and   
            Ram Swaminathan and   
              Mustafa Uysal and   
              Antonio Nucci and   
                Edward Knightly   DDoS-shield: DDoS-resilient scheduling
                                  to counter application layer attacks . . 26--39
            Patrick Traynor and   
               William Enck and   
           Patrick McDaniel and   
                Thomas La Porta   Mitigating attacks on open functionality
                                  in SMS-capable cellular networks . . . . 40--53
                     Yi Xie and   
                  Shun-Zheng Yu   A large-scale hidden semi-Markov model
                                  for anomaly detection on user browsing
                                  behaviors  . . . . . . . . . . . . . . . 54--65
                  Franck Le and   
                Sihyung Lee and   
                  Tina Wong and   
               Hyong S. Kim and   
                Darrell Newcomb   Detecting network-wide and
                                  router-specific misconfigurations
                                  through data mining  . . . . . . . . . . 66--79
            Khaled Harfoush and   
             Azer Bestavros and   
                     John Byers   Measuring capacity bandwidth of targeted
                                  path segments  . . . . . . . . . . . . . 80--92
           Piet Van Mieghem and   
                   Huijuan Wang   The observable part of a network . . . . 93--105
               Han Hee Song and   
                   Lili Qiu and   
                      Yin Zhang   NetQuest: a flexible framework for
                                  large-scale network measurement  . . . . 106--119
         György Terdik and   
                   Tibor Gyires   Lévy flights and fractal modeling of
                                  Internet traffic . . . . . . . . . . . . 120--129
                 Reaz Ahmed and   
                  Raouf Boutaba   Plexus: a scalable peer-to-peer protocol
                                  enabling efficient subset search . . . . 130--143
               Zhongmei Yao and   
              Xiaoming Wang and   
              Derek Leonard and   
                Dmitri Loguinov   Node isolation model and age-based
                                  neighbor selection in unstructured P2P
                                  networks . . . . . . . . . . . . . . . . 144--157
                Xiaoming Fu and   
        Henning Schulzrinne and   
          Hannes Tschofenig and   
         Christian Dickmann and   
                 Dieter Hogrefe   Overhead and performance study of the
                                  General Internet Signaling Transport
                                  (GIST) protocol  . . . . . . . . . . . . 158--171
      Pascal von Rickenbach and   
          Roger Wattenhofer and   
                Aaron Zollinger   Algorithmic models of interference in
                                  wireless ad hoc and sensor networks  . . 172--185
           Khaled Elmeleegy and   
                Alan L. Cox and   
                T. S. Eugene Ng   Understanding and mitigating the effects
                                  of count to infinity in Ethernet
                                  networks . . . . . . . . . . . . . . . . 186--199
                   Jie Lian and   
                 Yunhao Liu and   
           Kshirasagar Naik and   
                       Lei Chen   Virtual surrounding face geocasting in
                                  wireless ad hoc and sensor networks  . . 200--211
            Sastry Kompella and   
                 Shiwen Mao and   
              Y. Thomas Hou and   
               Hanif D. Sherali   On path selection and rate allocation
                                  for video in wireless mesh networks  . . 212--224
       Teerawat Issariyakul and   
           Vikram Krishnamurthy   Amplify-and-forward cooperative
                                  diversity wireless networks: model,
                                  analysis, and monotonicity properties    225--238
                Hongbin Luo and   
                   Lemin Li and   
                    Hongfang Yu   Routing connections with differentiated
                                  reliability requirements in WDM mesh
                                  networks . . . . . . . . . . . . . . . . 253--266
           Stefano Avallone and   
            Ian F. Akyildiz and   
                 Giorgio Ventre   A channel and rate assignment algorithm
                                  and a layer-2.5 forwarding paradigm for
                                  multi-radio wireless mesh networks . . . 267--280
           Vahid Tabatabaee and   
             Leandros Tassiulas   MNCM: a critical node matching approach
                                  to scheduling for input buffered
                                  switches with no speedup . . . . . . . . 294--304
                 Andrew Zalesky   To burst or circuit switch?  . . . . . . 305--318
               Guanglei Liu and   
                     Chuanyi Ji   Scalability of network-failure
                                  resilience: analysis using multi-layer
                                  probabilistic graphical models . . . . . 319--331
          Giridhar Jayavelu and   
 Srinivasan Ramasubramanian and   
                  Ossama Younis   Maintaining colored trees for disjoint
                                  multipath routing under node failures    346--359

IEEE\slash ACM Transactions on Networking
Volume 17, Number 2, April, 2009

                    Bin Fan and   
             John C. S. Lui and   
                  Dah-Ming Chiu   The design trade-offs of BitTorrent-like
                                  file sharing protocols . . . . . . . . . 365--376
           Daniel Stutzbach and   
                Reza Rejaie and   
              Nick Duffield and   
             Subhabrata Sen and   
               Walter Willinger   On unbiased sampling for unstructured
                                  peer-to-peer networks  . . . . . . . . . 377--390
                   Yihua He and   
            Georgos Siganos and   
         Michalis Faloutsos and   
         Srikanth Krishnamurthy   Lord of the links: a framework for
                                  discovering missing links in the
                                  Internet topology  . . . . . . . . . . . 391--404
              Andrea Bianco and   
          Gianluca Mardente and   
               Marco Mellia and   
          Maurizio Munaf\`o and   
               Luca Muscariello   Web user-session inference by means of
                                  clustering techniques  . . . . . . . . . 405--416
              Darryl Veitch and   
              Julien Ridoux and   
             Satish Babu Korada   Robust synchronization of absolute and
                                  difference clocks over networks  . . . . 417--430
     Björn Scheuermann and   
             Wolfgang Kiess and   
                Magnus Roos and   
              Florian Jarre and   
                   Martin Mauve   On the time synchronization of
                                  distributed log files in networks with
                                  local broadcast media  . . . . . . . . . 431--444
           Ricardo Oliveira and   
             Beichuan Zhang and   
                    Dan Pei and   
                    Lixia Zhang   Quantifying path exploration in the
                                  Internet . . . . . . . . . . . . . . . . 445--458
            Murali Kodialam and   
             T. V. Lakshman and   
             James B. Orlin and   
               Sudipta Sengupta   Oblivious routing of highly variable
                                  traffic in service overlays and IP
                                  backbones  . . . . . . . . . . . . . . . 459--472
             Amund Kvalbein and   
      Audun Fosselie Hansen and   
            Tarik \vCi\vcic and   
             Stein Gjessing and   
                     Olav Lysne   Multiple routing configurations for fast
                                  IP network recovery  . . . . . . . . . . 473--486
               Reuven Cohen and   
                   Gabi Nakibly   A traffic engineering approach for
                                  placement and selection of network
                                  services . . . . . . . . . . . . . . . . 487--500
           Geoffrey Goodell and   
          Mema Roussopoulos and   
                  Scott Bradner   A directory service for perspective
                                  access networks  . . . . . . . . . . . . 501--514
           Pradeep Kyasanur and   
                Nitin H. Vaidya   Capacity of multichannel wireless
                                  networks under the protocol model  . . . 515--527
            Bhaskaran Raman and   
         Kameswari Chebrolu and   
         Dattatraya Gokhale and   
                  Sayandeep Sen   On the feasibility of the link
                                  abstraction in wireless mesh networks    528--541
              Bow-Nan Cheng and   
               Murat Yuksel and   
         Shivkumar Kalyanaraman   Orthogonal rendezvous routing protocol
                                  for wireless mesh networks . . . . . . . 542--555
                Mehdi Rasti and   
          Ahmad R. Sharafat and   
                    Babak Seyfe   Pareto-efficient and goal-driven power
                                  control in wireless networks: a
                                  game-theoretic approach with a novel
                                  pricing scheme . . . . . . . . . . . . . 556--569
               Reuven Cohen and   
                 Boris Kapchits   An optimal wake-up scheduling algorithm
                                  for minimizing energy consumption while
                                  limiting maximum delay in a mesh sensor
                                  network  . . . . . . . . . . . . . . . . 570--581
             Hanan Shpungin and   
                  Michael Segal   Low-energy fault-tolerant bounded-hop
                                  broadcast in wireless networks . . . . . 582--590
                  Tianji Li and   
                   Qiang Ni and   
               David Malone and   
              Douglas Leith and   
                  Yang Xiao and   
               Thierry Turletti   Aggregation with fragment retransmission
                                  for very high-speed WLANs  . . . . . . . 591--604
  Alvaro A. Cárdenas and   
         Svetlana Radosavac and   
                  John S. Baras   Evaluation of detection algorithms for
                                  MAC layer misbehavior: theory and
                                  experiments  . . . . . . . . . . . . . . 605--617
                Mingyu Chen and   
                Xingzhe Fan and   
          Manohar N. Murthi and   
  T. Dilusha Wickramarathna and   
               Kamal Premaratne   Normalized queueing delay: congestion
                                  control jointly utilizing delay and
                                  marking  . . . . . . . . . . . . . . . . 618--631
                     Bin Wu and   
              Kwan L. Yeung and   
               Mounir Hamdi and   
                         Xin Li   Minimizing internal speedup for
                                  performance guaranteed switches with
                                  optical fabrics  . . . . . . . . . . . . 632--645
            Matthew Andrews and   
                     Lisa Zhang   Complexity of wavelength assignment in
                                  optical network optimization . . . . . . 646--657
          Kalyan Kuppuswamy and   
                  Daniel C. Lee   An analytic approach to efficiently
                                  computing call blocking probabilities
                                  for multiclass WDM networks  . . . . . . 658--670
       Abdelhamid E. Eshoul and   
             Hussein T. Mouftah   Survivability approaches using
                                  $p$-cycles in WDM mesh networks under
                                  static traffic . . . . . . . . . . . . . 671--683

IEEE\slash ACM Transactions on Networking
Volume 17, Number 3, June, 2009

    Ioannis Ch. Paschalidis and   
           Georgios Smaragdakis   Spatio-temporal network anomaly
                                  detection by assessing deviations of
                                  empirical measures . . . . . . . . . . . 685--697
                     Yan Hu and   
              Dah-Ming Chiu and   
                 John C. S. Lui   Entropy based adaptive flow aggregation  698--711
 Kashi Venkatesh Vishwanath and   
                    Amin Vahdat   Swing: realistic and responsive network
                                  traffic generation . . . . . . . . . . . 712--725
              Xiaoming Wang and   
               Zhongmei Yao and   
                Dmitri Loguinov   Residual-based estimation of peer and
                                  link lifetimes in P2P networks . . . . . 726--739
                  Feng Wang and   
                   Jian Qiu and   
                  Lixin Gao and   
                       Jia Wang   On understanding transient interdomain
                                  routing failures . . . . . . . . . . . . 740--751
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Locally restorable routing of highly
                                  variable traffic . . . . . . . . . . . . 752--763
            Barath Raghavan and   
             Patric Verkaik and   
                Alex C. Snoeren   Secure and policy-compliant source
                                  routing  . . . . . . . . . . . . . . . . 764--777
                   Jian Chu and   
                   Chin-Tau Lea   Optimal link weights for IP-based
                                  networks supporting hose-model VPNs  . . 778--788
               Nicolas Hohn and   
   Konstantina Papagiannaki and   
                  Darryl Veitch   Capturing router congestion and delay    789--802
                Wencheng Lu and   
                   Sartaj Sahni   Succinct representation of static packet
                                  classifiers  . . . . . . . . . . . . . . 803--816
                     Jun Li and   
                Yiqiang Q. Zhao   Resequencing analysis of stop-and-wait
                                  ARQ for parallel multichannel
                                  communications . . . . . . . . . . . . . 817--830
             Vincent Borrel and   
            Franck Legendre and   
     Marcelo Dias De Amorim and   
                    Serge Fdida   SIMPS: using sociology for personal
                                  mobility . . . . . . . . . . . . . . . . 831--842
          Saurabh Ganeriwal and   
        Ilias Tsigkogiannis and   
                Hohyun Shim and   
          Vlassios Tsiatsis and   
         Mani B. Srivastava and   
                 Deepak Ganesan   Estimating clock uncertainty for
                                  efficient duty-cycling in sensor
                                  networks . . . . . . . . . . . . . . . . 843--856
                Sungoh Kwon and   
                 Ness B. Shroff   Analysis of shortest path routing for
                                  large multi-hop wireless networks  . . . 857--869
               Petar Djukic and   
                Shahrokh Valaee   Delay aware link scheduling for
                                  multi-hop TDMA wireless networks . . . . 870--883
         Claudio Cicconetti and   
            Ian F. Akyildiz and   
                Luciano Lenzini   FEBA: a bandwidth allocation algorithm
                                  for service differentiation in IEEE
                                  802.16 mesh networks . . . . . . . . . . 884--897
           Murtaza A. Zafer and   
                  Eytan Modiano   A calculus approach to energy-efficient
                                  data transmission with
                                  quality-of-service constraints . . . . . 898--911
               Chee Wei Tan and   
          Daniel P. Palomar and   
                    Mung Chiang   Energy-robustness tradeoff in cellular
                                  network power control  . . . . . . . . . 912--925
               Kae Won Choi and   
              Wha Sook Jeon and   
                Dong Geun Jeong   Resource allocation in OFDMA wireless
                                  communications systems supporting
                                  multimedia services  . . . . . . . . . . 926--935
           Richard T. B. Ma and   
               Vishal Misra and   
                 Dan Rubenstein   An analysis of generalized slotted-Aloha
                                  protocols  . . . . . . . . . . . . . . . 936--949
                  Xiang-Yang Li   Multicast capacity of wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 950--961
             Yuan-Cheng Lai and   
                 Chih-Chung Lin   Two blocking algorithms on adaptive
                                  binary splitting: single and pair
                                  resolutions for RFID tag identification  962--975
                 Kevin Ross and   
                Nicholas Bambos   Projective cone scheduling (PCS)
                                  algorithms for packet switches of
                                  maximal throughput . . . . . . . . . . . 976--989
                Hung Q. Ngo and   
                  Yang Wang and   
                     Dazhen Pan   Rearrangeable and nonblocking $ [w,
                                  f]$-distributors . . . . . . . . . . . . 990--1001
           Rodney Van Meter and   
           Thaddeus D. Ladd and   
                W. J. Munro and   
                     Kae Nemoto   System design for a long-line quantum
                                  repeater . . . . . . . . . . . . . . . . 1002--1013

IEEE\slash ACM Transactions on Networking
Volume 17, Number 4, August, 2009

             Jonathan S. Turner   Strong performance guarantees for
                                  asynchronous buffered crossbar scheduler 1017--1028
              Banit Agrawal and   
               Timothy Sherwood   High-bandwidth network memory system
                                  through virtual pipelines  . . . . . . . 1029--1041
              Michael Menth and   
   Andreas Binzenhöfer and   
            Stefan Mühleck   Source models for speech traffic
                                  revisited  . . . . . . . . . . . . . . . 1042--1051
           Nazanin Magharei and   
                    Reza Rejaie   PRIME: peer-to-peer receiver-driven
                                  mesh-based streaming . . . . . . . . . . 1052--1065
            Vijay Sivaraman and   
             Hossam Elgindy and   
             David Moreland and   
                 Diethelm Ostry   Packet pacing in small buffer optical
                                  packet switched networks . . . . . . . . 1066--1079
         Satyajeet S. Ahuja and   
 Srinivasan Ramasubramanian and   
                Marwan M. Krunz   Single-link failure detection in
                                  all-optical networks using monitoring
                                  cycles and paths . . . . . . . . . . . . 1080--1093
               Suman Sarkar and   
               Hong-Hsu Yen and   
               Sudhir Dixit and   
            Biswanath Mukherjee   Hybrid wireless-optical broadband access
                                  network (WOBAN): network planning using
                                  Lagrangean relaxation  . . . . . . . . . 1094--1105
                     Pan Li and   
                  Chi Zhang and   
                   Yuguang Fang   Asymptotic connectivity in wireless ad
                                  hoc networks using directional antennas  1106--1117
             Apoorva Jindal and   
           Konstantinos Psounis   The achievable rate region of
                                  802.11-scheduled multihop networks . . . 1118--1131
               Changhee Joo and   
                Xiaojun Lin and   
                 Ness B. Shroff   Understanding the capacity region of the
                                  Greedy maximal scheduling algorithm in
                                  multihop wireless networks . . . . . . . 1132--1145
               Michael J. Neely   Delay analysis for maximal scheduling
                                  with flow control in wireless networks
                                  with bursty traffic  . . . . . . . . . . 1146--1159
              Paramvir Bahl and   
            Ranveer Chandra and   
          Patrick P. C. Lee and   
               Vishal Misra and   
            Jitendra Padhye and   
             Dan Rubenstein and   
                         Yan Yu   Opportunistic use of client repeaters to
                                  improve performance of WLANs . . . . . . 1160--1171
                Kyu-Han Kim and   
                   Kang G. Shin   On accurate and asymmetry-aware
                                  measurement of link quality in wireless
                                  mesh networks  . . . . . . . . . . . . . 1172--1185
            Mehmet C. Vuran and   
                Ian F. Akyildiz   Error control in wireless sensor
                                  networks: a cross layer analysis . . . . 1186--1199
            Shamik Sengupta and   
              Mainak Chatterjee   An economic framework for dynamic
                                  spectrum access and service pricing  . . 1200--1213
              Gwillerm Froc and   
             Issam Mabrouki and   
                Xavier Lagrange   Design and performance of wireless data
                                  gathering networks based on unicast
                                  random walk routing  . . . . . . . . . . 1214--1227
              Ming-Jer Tsai and   
              Hong-Yen Yang and   
              Bing-Hong Liu and   
                 Wen-Qian Huang   Virtual-coordinate-based
                                  delivery-guaranteed routing protocol in
                                  wireless sensor networks . . . . . . . . 1228--1241
                   Joon Ahn and   
         Bhaskar Krishnamachari   Scaling laws for data-centric storage
                                  and querying in wireless sensor networks 1242--1255
                    Ming Li and   
             Deepak Ganesan and   
                Prashant Shenoy   PRESTO: feedback-driven data management
                                  in sensor networks . . . . . . . . . . . 1256--1269
       Martín Casado and   
        Michael J. Freedman and   
              Justin Pettit and   
               Jianying Luo and   
               Natasha Gude and   
               Nick McKeown and   
                  Scott Shenker   Rethinking enterprise network control    1270--1283
          Katerina Argyraki and   
              David R. Cheriton   Scalable network-layer defense against
                                  Internet bandwidth-flooding attacks  . . 1284--1297
             Sabyasachi Roy and   
            Himabindu Pucha and   
                Zheng Zhang and   
              Y. Charlie Hu and   
                       Lili Qiu   On the placement of infrastructure
                                  overlay nodes  . . . . . . . . . . . . . 1298--1311
          Jayakrishnan Nair and   
                   D. Manjunath   Distributed iterative optimal resource
                                  allocation with concurrent updates of
                                  routing and flow control variables . . . 1312--1325
           Hiroyuki Okamura and   
               Tadashi Dohi and   
              Kishor S. Trivedi   Markovian arrival process parameter
                                  estimation with group data . . . . . . . 1326--1339
    Françis Baccelli and   
          Sridhar Machiraju and   
              Darryl Veitch and   
                     Jean Bolot   The role of PASTA in network measurement 1340--1353

IEEE\slash ACM Transactions on Networking
Volume 17, Number 5, October, 2009

               Meeyoung Cha and   
               Haewoon Kwak and   
            Pablo Rodriguez and   
              Yong-Yeol Ahn and   
                       Sue Moon   Analyzing the video popularity
                                  characteristics of large-scale user
                                  generated content systems  . . . . . . . 1357--1370
             Moritz Steiner and   
         Taoufik En-Najjary and   
              Ernst W. Biersack   Long term study of peer behavior in the
                                  KAD DHT  . . . . . . . . . . . . . . . . 1371--1384
                 Yigal Bejerano   Taking the skeletons out of the closets:
                                  a simple and efficient topology
                                  discovery scheme for large Ethernet LANs 1385--1398
          Mudhakar Srivatsa and   
               Arun Iyengar and   
                   Jian Yin and   
                       Ling Liu   Scalable key management algorithms for
                                  location-based services  . . . . . . . . 1399--1412
          Fernando Paganini and   
                Enrique Mallada   A unified approach to congestion control
                                  and node-based multipath routing . . . . 1413--1426
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Guaranteed performance routing of
                                  unpredictable traffic with fast path
                                  restoration  . . . . . . . . . . . . . . 1427--1438
                   Xin Yuan and   
            Wickus Nienaber and   
               Zhenhai Duan and   
                    Rami Melhem   Oblivious routing in fat-tree based
                                  system area networks with uncertain
                                  traffic demands  . . . . . . . . . . . . 1439--1452
               Holger Boche and   
                Martin Schubert   Nash bargaining and proportional
                                  fairness for wireless systems  . . . . . 1453--1466
                 Loc X. Bui and   
             Sujay Sanghavi and   
                     R. Srikant   Distributed link scheduling with
                                  constant overhead  . . . . . . . . . . . 1467--1480
               Changhee Joo and   
                 Ness B. Shroff   Performance of random access scheduling
                                  schemes in multi-hop wireless networks   1481--1493
                Zhenzhen Ye and   
      Alhussein A. Abouzeid and   
                        Jing Ai   Optimal stochastic policies for
                                  distributed data aggregation in wireless
                                  sensor networks  . . . . . . . . . . . . 1494--1507
                     Yan Wu and   
                Sonia Fahmy and   
                 Ness B. Shroff   Optimal sleep/wake scheduling for
                                  time-synchronized sensor networks with
                                  QoS guarantees . . . . . . . . . . . . . 1508--1521
            Michele Garetto and   
             Paolo Giaccone and   
                Emilio Leonardi   Capacity scaling in ad hoc networks with
                                  heterogeneous mobile nodes: the
                                  super-critical regime  . . . . . . . . . 1522--1535
                  Suli Zhao and   
          Dipankar Raychaudhuri   Scalability and performance evaluation
                                  of hierarchical hybrid wireless networks 1536--1549
                     Hui Ma and   
          Rajiv Vijayakumar and   
                  Sumit Roy and   
                       Jing Zhu   Optimizing 802.11 wireless mesh networks
                                  based on physical carrier sensing  . . . 1550--1563
                Wei-Jen Hsu and   
   Thrasyvoulos Spyropoulos and   
       Konstantinos Psounis and   
                    Ahmed Helmy   Modeling spatial and temporal
                                  dependencies of user mobility in
                                  wireless mobile networks . . . . . . . . 1564--1577
                    Han Cai and   
                   Do Young Eun   Crossing over the bounded domain: from
                                  exponential to power-law intermeeting
                                  time in mobile ad hoc networks . . . . . 1578--1591
                   Wei Wang and   
               Mehul Motani and   
              Vikram Srinivasan   Opportunistic energy-efficient contact
                                  probing in delay-tolerant applications   1592--1605
           Soung Chang Liew and   
             Ying Jun Zhang and   
                    Da Rui Chen   Bounded-mean-delay throughput and
                                  nonstarvation conditions in Aloha
                                  network  . . . . . . . . . . . . . . . . 1606--1618
     Stefan Alexandru Pascu and   
              Ahmed A. El-Amawy   On conflict-free all-to-all broadcast in
                                  one-hop optical networks of arbitrary
                                  topologies . . . . . . . . . . . . . . . 1619--1630
             Michel Mandjes and   
             Remco Van De Meent   Resource dimensioning through buffer
                                  sampling . . . . . . . . . . . . . . . . 1631--1644
             Ravi S. Prasad and   
       Constantine Dovrolis and   
                 Marina Thottan   Router buffer sizing for TCP traffic and
                                  the role of the output/input capacity
                                  ratio  . . . . . . . . . . . . . . . . . 1645--1658
                Chao-Lin Yu and   
          Cheng-Shang Chang and   
                  Duan-Shin Lee   CR switch: a load-balanced switch with
                                  contention and reservation . . . . . . . 1659--1671
        Georgios Y. Lazarou and   
                 Julie Baca and   
            Victor S. Frost and   
                Joseph B. Evans   Describing network traffic using the
                                  index of variability . . . . . . . . . . 1672--1683
               Reuven Cohen and   
        Niloofar Fazlollahi and   
              David Starobinski   Path switching and grading algorithms
                                  for advance channel reservation
                                  architectures  . . . . . . . . . . . . . 1684--1695

IEEE\slash ACM Transactions on Networking
Volume 17, Number 6, December, 2009

       Lachlan L. H. Andrew and   
              Steven H. Low and   
            Bartek P. Wydrowski   Understanding XCP: equilibrium and
                                  fairness . . . . . . . . . . . . . . . . 1697--1710
        Jerry Chi-Yuan Chou and   
                   Bill Lin and   
             Subhabrata Sen and   
              Oliver Spatscheck   Proactive surge protection: a defense
                                  mechanism for bandwidth-based attacks    1711--1723
                   Yao Zhao and   
                   Yan Chen and   
                   David Bindel   Towards unbiased end-to-end network
                                  diagnosis  . . . . . . . . . . . . . . . 1724--1737
            Mehmet H. Gunes and   
                    Kamil Sarac   Resolving IP aliases in building
                                  traceroute-based Internet maps . . . . . 1738--1751
                  Ao-Jan Su and   
          David R. Choffnes and   
      Aleksandar Kuzmanovic and   
    Fabián E. Bustamante   Drafting behind Akamai: inferring
                                  network conditions based on CDN
                                  redirections . . . . . . . . . . . . . . 1752--1765
         Michael Sirivianos and   
               Xiaowei Yang and   
              Stanislaw Jarecki   Robust and efficient incentives for
                                  cooperative content distribution . . . . 1766--1779
          George N. Rouskas and   
                Nikhil Baradwaj   On bandwidth tiered service  . . . . . . 1780--1793
              Huseyin Mutlu and   
             Murat Alanyali and   
              David Starobinski   Spot pricing of secondary spectrum
                                  access in wireless cellular networks . . 1794--1804
          Nicholas B. Chang and   
                    Mingyan Liu   Optimal channel probing and transmission
                                  scheduling for opportunistic spectrum
                                  access . . . . . . . . . . . . . . . . . 1805--1818
       Shrutivandana Sharma and   
         Demosthenis Teneketzis   An externalities-based decentralized
                                  optimal power allocation algorithm for
                                  wireless networks  . . . . . . . . . . . 1819--1831
              Omer Gurewitz and   
           Vincenzo Mancuso and   
                 Jingpu Shi and   
             Edward W. Knightly   Measurement and modeling of the origins
                                  of starvation of congestion-controlled
                                  flows in wireless mesh networks  . . . . 1832--1845
              Abhinav Gupta and   
                Xiaojun Lin and   
                     R. Srikant   Low-complexity distributed scheduling
                                  algorithms for wireless networks . . . . 1846--1859
          Mahdi Lotfinezhad and   
                  Ben Liang and   
                Elvino S. Sousa   On stability region and delay
                                  performance of linear-memory randomized
                                  scheduling for time-varying networks . . 1860--1873
                Xiaojun Lin and   
             Shahzada B. Rasool   Distributed and provably efficient
                                  algorithms for joint channel-assignment,
                                  scheduling, and routing in multichannel
                                  ad hoc wireless networks . . . . . . . . 1874--1887
            Michele Garetto and   
             Paolo Giaccone and   
                Emilio Leonardi   Capacity scaling in ad hoc networks with
                                  heterogeneous mobile nodes: the
                                  subcritical regime . . . . . . . . . . . 1888--1901
                 Rik Sarkar and   
                Xianjin Zhu and   
                        Jie Gao   Double rulings for information brokerage
                                  in sensor networks . . . . . . . . . . . 1902--1915
    Christopher J. Martinez and   
           Devang K. Pandya and   
                   Wei-Ming Lin   On designing fast nonuniformly
                                  distributed IP address lookup hashing
                                  algorithms . . . . . . . . . . . . . . . 1916--1925
                  Lynn Choi and   
                 Hyogon Kim and   
                  Sunil Kim and   
                   Moon Hae Kim   Scalable packet classification through
                                  rulebase partitioning using the maximum
                                  entropy hashing  . . . . . . . . . . . . 1926--1935
                Mario Baldi and   
                Guido Marchetto   Pipeline forwarding of packets based on
                                  a low-accuracy network-distributed
                                  common time reference  . . . . . . . . . 1936--1949
              Michael Menth and   
             Michael Duelli and   
            Ruediger Martin and   
                 Jens Milbrandt   Resilience analysis of packet-switched
                                  communication networks . . . . . . . . . 1950--1963
          Srini Seetharaman and   
                Volker Hilt and   
             Markus Hofmann and   
                  Mostafa Ammar   Resolving cross-layer conflict between
                                  overlay routing and traffic engineering  1964--1977
                Amir Gourgy and   
           Ted H. Szymanski and   
                Douglas G. Down   On tracking the behavior of an
                                  output-queued switch using an
                                  input-queued switch  . . . . . . . . . . 1978--1988
                  Smita Rai and   
              Ching-Fong Su and   
            Biswanath Mukherjee   On provisioning in all-optical networks:
                                  an impairment-aware approach . . . . . . 1989--2001
                Onur Turkcu and   
             Suresh Subramaniam   Performance of optical networks with
                                  limited reconfigurability  . . . . . . . 2002--2013
               Yi-Ting Chen and   
                  Jay Cheng and   
                  Duan-Shin Lee   Constructions of linear compressors,
                                  nonovertaking delay lines, and flexible
                                  delay lines for optical packet switching 2014--2027


IEEE\slash ACM Transactions on Networking
Volume 18, Number 1, February, 2010

                  Guohan Lu and   
                   Yan Chen and   
              Stefan Birrer and   
Fabián E. Bustamante and   
                        Xing Li   POPI: a user-level tool for inferring
                                  router packet forwarding priority  . . . 1--14
               Reuven Cohen and   
                   Liran Katzir   Computational analysis and efficient
                                  algorithms for micro and macro OFDMA
                                  downlink scheduling  . . . . . . . . . . 15--26
               Sanghwan Lee and   
               Zhi-Li Zhang and   
                Sambit Sahu and   
                  Debanjan Saha   On suitability of Euclidean embedding
                                  for host-based network coordinate
                                  systems  . . . . . . . . . . . . . . . . 27--40
             Jren-Chit Chin and   
                    Yu Dong and   
               Wing-Kai Hon and   
            Chris Yu-Tak Ma and   
                David K. Y. Yau   Detection of intelligent mobile target
                                  in a mobile sensor network . . . . . . . 41--52
                Lanjia Wang and   
                 Zhichun Li and   
                   Yan Chen and   
                     Zhi Fu and   
                        Xing Li   Thwarting zero-day polymorphic worms
                                  with network-level length-based
                                  signature generation . . . . . . . . . . 53--66
                 Ahmed E. Kamal   $ 1 + N $ network protection for mesh
                                  networks: network coding-based
                                  protection using $p$-cycles  . . . . . . 67--80
                  Fong Pong and   
                Nian-Feng Tzeng   SUSE: superior storage-efficiency for
                                  routing tables through prefix
                                  transformation and aggregation . . . . . 81--94
         Stefan Rührup and   
              Hanna Kalosha and   
                Amiya Nayak and   
             Ivan Stojmenovi\'c   Message-efficient beaconless georouting
                                  with guaranteed delivery in wireless
                                  sensor, ad hoc, and actuator networks    95--108
           Ricardo Oliveira and   
                    Dan Pei and   
           Walter Willinger and   
             Beichuan Zhang and   
                    Lixia Zhang   The (in)completeness of the observed
                                  Internet AS-level structure  . . . . . . 109--122
                    Jian Ni and   
                Haiyong Xie and   
           Sekhar Tatikonda and   
              Yang Richard Yang   Efficient and dynamic routing topology
                                  inference from end-to-end measurements   123--135
             Steven Chamberland   Global access network evolution  . . . . 136--149
                    Zhen Yu and   
                      Yong Guan   A dynamic en-route filtering scheme for
                                  data reporting in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 150--163
                 Damien Fay and   
              Hamed Haddadi and   
            Andrew Thomason and   
            Andrew W. Moore and   
            Richard Mortier and   
         Almerima Jamakovic and   
                Steve Uhlig and   
                     Miguel Rio   Weighted spectral distribution for
                                  Internet topology analysis: theory and
                                  applications . . . . . . . . . . . . . . 164--176
              Yuichi Ohsita and   
           Takashi Miyamura and   
          Shin'ichi Arakawa and   
                 Shingo Ata and   
                   Eiji Oki and   
             Kohei Shiomoto and   
                Masayuki Murata   Gradually reconfiguring virtual network
                                  topologies based on estimated traffic
                                  matrices . . . . . . . . . . . . . . . . 177--189
           Behnam A. Rezaei and   
               Nima Sarshar and   
          Vwani P. Roychowdhury   Distributed resource sharing in
                                  low-latency wireless ad hoc networks . . 190--201
                    Tao Shu and   
                   Marwan Krunz   Coverage-time optimization for clustered
                                  wireless sensor networks: a
                                  power-balancing approach . . . . . . . . 202--215
         Jonathan L. Bredin and   
            Erik D. Demaine and   
  Mohammad Taghi Hajiaghayi and   
                    Daniela Rus   Deploying sensor networks with
                                  guaranteed fault tolerance . . . . . . . 216--228
                   Bo Zhang and   
         Tze Sing Eugene Ng and   
              Animesh Nandi and   
            Rudolf H. Riedi and   
             Peter Druschel and   
                    Guohui Wang   Measurement-based analysis, modeling,
                                  and synthesis of the Internet delay
                                  space  . . . . . . . . . . . . . . . . . 229--242
               Lap Kong Law and   
   Konstantinos Pelechrinis and   
  Srikanth V. Krishnamurthy and   
             Michalis Faloutsos   Downlink capacity of hybrid cellular ad
                                  hoc networks . . . . . . . . . . . . . . 243--256
              Xiaoming Wang and   
                Dmitri Loguinov   Understanding and modeling the Internet
                                  topology: economics and evolution
                                  perspective  . . . . . . . . . . . . . . 257--270
   Balagangadhar G. Bathula and   
             Vinod M. Vokkarane   QoS-based manycasting over optical
                                  burst-switched (OBS) networks  . . . . . 271--283
                     Bin Wu and   
              Kwan L. Yeung and   
                     Pin-Han Ho   ILP formulations for $p$-cycle design
                                  without candidate cycle enumeration  . . 284--295
            Rajgopal Kannan and   
             Shuangqing Wei and   
          Vasu Chakravarthy and   
          Muralidhar Rangaswamy   Approximation algorithms for minimum
                                  energy transmission scheduling in rate
                                  and duty-cycle constrained wireless
                                  networks . . . . . . . . . . . . . . . . 296--306
                 Saikat Ray and   
         Roch Guérin and   
              Kin-Wah Kwong and   
                     Rute Sofia   Always acyclic distributed path
                                  computation  . . . . . . . . . . . . . . 307--319
                      Mo Li and   
                     Yunhao Liu   Rendered path: range-free localization
                                  in anisotropic sensor networks with
                                  holes  . . . . . . . . . . . . . . . . . 320--332

IEEE\slash ACM Transactions on Networking
Volume 18, Number 2, April, 2010

           Gireesh Shrimali and   
              Aditya Akella and   
                 Almir Mutapcic   Cooperative interdomain traffic
                                  engineering using Nash bargaining and
                                  decomposition  . . . . . . . . . . . . . 341--352
              Dragos Andrei and   
          Massimo Tornatore and   
            Marwan Batayneh and   
          Charles U. Martel and   
            Biswanath Mukherjee   Provisioning of deadline-driven requests
                                  with flexible transmission rates in WDM
                                  mesh networks  . . . . . . . . . . . . . 353--366
                Amit Mondal and   
          Aleksandar Kuzmanovic   Upgrading mice to elephants: effects and
                                  end-point solutions  . . . . . . . . . . 367--378
                  Yufang Xi and   
                  Edmund M. Yeh   Distributed algorithms for minimum cost
                                  multicast with network coding  . . . . . 379--392
            Gagan Raj Gupta and   
                 Ness B. Shroff   Delay analysis for wireless networks
                                  with single hop traffic and general
                                  interference constraints . . . . . . . . 393--405
               Longbo Huang and   
               Michael J. Neely   The optimality of two prices: maximizing
                                  revenue in a stochastic communication
                                  system . . . . . . . . . . . . . . . . . 406--419
      Bo\vzidar Radunovi\'c and   
        Christos Gkantsidis and   
                  Peter Key and   
                Pablo Rodriguez   Toward practical opportunistic routing
                                  with intra-session network coding for
                                  mesh networks  . . . . . . . . . . . . . 420--433
          Satyajayant Misra and   
             Seung Don Hong and   
               Guoliang Xue and   
                      Jian Tang   Constrained relay node placement in
                                  wireless sensor networks: formulation
                                  and approximations . . . . . . . . . . . 434--447
               Nadim Parvez and   
            Anirban Mahanti and   
               Carey Williamson   An analytic throughput model for TCP
                                  NewReno  . . . . . . . . . . . . . . . . 448--461
            Ashraf Al Daoud and   
             Murat Alanyali and   
              David Starobinski   Pricing strategies for spectrum lease in
                                  secondary markets  . . . . . . . . . . . 462--475
        Srinivas Shakkottai and   
                  Ramesh Johari   Demand-aware content distribution on the
                                  Internet . . . . . . . . . . . . . . . . 476--489
                Alex X. Liu and   
            Chad R. Meiners and   
                     Eric Torng   TCAM Razor: a systematic approach
                                  towards minimizing packet classifiers in
                                  TCAMs  . . . . . . . . . . . . . . . . . 490--500
                 Longbi Lin and   
                Xiaojun Lin and   
                 Ness B. Shroff   Low-complexity and distributed energy
                                  minimization in multihop wireless
                                  networks . . . . . . . . . . . . . . . . 501--514
                Joohwan Kim and   
                Xiaojun Lin and   
             Ness B. Shroff and   
                   Prasun Sinha   Minimizing delay and maximizing lifetime
                                  for wireless sensor networks with
                                  anycast  . . . . . . . . . . . . . . . . 515--528
              Si Qing Zheng and   
             Ashwin Gumaste and   
                      Hong Shen   A parallel self-routing rearrangeable
                                  nonblocking multi-$ \log_2 N $ photonic
                                  switching network  . . . . . . . . . . . 529--539
          Ilenia Tinnirello and   
               Giuseppe Bianchi   Rethinking the IEEE 802.11e EDCA
                                  performance modeling methodology . . . . 540--553
          Nilanjan Banerjee and   
             Mark D. Corner and   
              Brian Neil Levine   Design and field experimentation of an
                                  energy-efficient architecture for DTN
                                  throwboxes . . . . . . . . . . . . . . . 554--567
               Reuven Cohen and   
                   Gabi Nakibly   Maximizing restorable throughput in MPLS
                                  networks . . . . . . . . . . . . . . . . 568--581
                Sheng Zhong and   
                         Fan Wu   A collusion-resistant routing scheme for
                                  noncooperative wireless ad hoc networks  582--595
      Aruna Balasubramanian and   
          Brian Neil Levine and   
             Arun Venkataramani   Replication routing in DTNs: a resource
                                  allocation approach  . . . . . . . . . . 596--609
            Mohamed Hefeeda and   
                 Cheng-Hsin Hsu   On burst transmission scheduling in
                                  mobile TV broadcast networks . . . . . . 610--623
            Chuan-Ching Sue and   
               Hsaing-Wen Cheng   A fitting report position scheme for the
                                  gated IPACT dynamic bandwidth algorithm
                                  in EPONs . . . . . . . . . . . . . . . . 624--637
            Atilla Eryilmaz and   
            Asuman Ozdaglar and   
              Devavrat Shah and   
                  Eytan Modiano   Distributed cross-layer algorithms for
                                  the optimal control of multihop wireless
                                  networks . . . . . . . . . . . . . . . . 638--651
               Joel Sommers and   
               Paul Barford and   
              Nick Duffield and   
                       Amos Ron   Multiobjective monitoring for SLA
                                  compliance . . . . . . . . . . . . . . . 652--665
             Ionut Trestian and   
         Supranamaya Ranjan and   
      Aleksandar Kuzmanovic and   
                  Antonio Nucci   Googling the Internet: profiling
                                  Internet endpoints via the World Wide
                                  Web  . . . . . . . . . . . . . . . . . . 666--679

IEEE\slash ACM Transactions on Networking
Volume 18, Number 3, June, 2010

             Cheng-Hsin Hsu and   
             Mohamed M. Hefeeda   Broadcasting video streams encoded with
                                  arbitrary bit rates in
                                  energy-constrained mobile TV networks    681--694
          David Starobinski and   
                    Weiyao Xiao   Asymptotically optimal data
                                  dissemination in multichannel wireless
                                  sensor networks: single radios suffice   695--707
                 Martin Karsten   Approximation of generalized processor
                                  sharing with interleaved stratified
                                  timer wheels . . . . . . . . . . . . . . 708--721
           Ioannis Broustis and   
   Konstantina Papagiannaki and   
  Srikanth V. Krishnamurthy and   
         Michalis Faloutsos and   
                Vivek P. Mhatre   Measurement-driven guidelines for 802.11
                                  WLAN design  . . . . . . . . . . . . . . 722--735
               Suat Ozdemir and   
               Hasan Çam   Integration of false data detection with
                                  data aggregation and confidential
                                  transmission in wireless sensor networks 736--749
          Nina Skorin-Kapov and   
                Jiajia Chen and   
                  Lena Wosinska   A new approach to optical networks
                                  security: attack-aware routing and
                                  wavelength assignment  . . . . . . . . . 750--760
                    Yun Mao and   
                  Feng Wang and   
                   Lili Qiu and   
                  Simon Lam and   
                 Jonathan Smith   S4: small state and small stretch
                                  compact routing protocol for large
                                  static wireless networks . . . . . . . . 761--774
           Richard T. B. Ma and   
              Dah Ming Chiu and   
             John C. S. Lui and   
               Vishal Misra and   
                 Dan Rubenstein   Internet economics: the use of Shapley
                                  value for ISP settlement . . . . . . . . 775--787
       V. J. Venkataramanan and   
                    Xiaojun Lin   On wireless scheduling algorithms for
                                  minimizing the queue-overflow
                                  probability  . . . . . . . . . . . . . . 788--801
               Hongseok Kim and   
             Gustavo De Veciana   Leveraging dynamic spare capacity in
                                  wireless systems to conserve mobile
                                  terminals' energy  . . . . . . . . . . . 802--815
         Abdallah Khreishah and   
             Chih-Chun Wang and   
                 Ness B. Shroff   Rate control with pairwise intersession
                                  network coding . . . . . . . . . . . . . 816--829
Enrique Campos-Náñez   Decentralized algorithms for adaptive
                                  pricing in multiclass loss networks  . . 830--843
                    Ao Tang and   
              Xiaoliang Wei and   
              Steven H. Low and   
                    Mung Chiang   Equilibrium of heterogeneous congestion
                                  control: optimality and stability  . . . 844--857
        Parbati Kumar Manna and   
               Shigang Chen and   
                   Sanjay Ranka   Inside the permutation-scanning worms:
                                  propagation modeling and analysis  . . . 858--870
                    Jun Luo and   
             Jean-Pierre Hubaux   Joint sink mobility and routing to
                                  maximize the lifetime of wireless sensor
                                  networks: the case of constrained
                                  mobility . . . . . . . . . . . . . . . . 871--884
                 Haifeng Yu and   
         Phillip B. Gibbons and   
           Michael Kaminsky and   
                      Feng Xiao   SybilLimit: a near-optimal social
                                  network defense against Sybil attacks    885--898
             Chris Chambers and   
              Wu-Chang Feng and   
                Sambit Sahu and   
              Debanjan Saha and   
                   David Brandt   Characterizing online games  . . . . . . 899--910
              Cesare Roseti and   
             Michele Luglio and   
           Francesco Zampognaro   Analysis and performance evaluation of a
                                  burst-based TCP for satellite DVB RCS
                                  links  . . . . . . . . . . . . . . . . . 911--921
                 Qingya She and   
             Xiaodong Huang and   
                   Jason P. Jue   How reliable can two-path protection be? 922--933
                  Ziqiu Yun and   
                 Xiaole Bai and   
                  Dong Xuan and   
                 Ten H. Lai and   
                     Weijia Jia   Optimal deployment patterns for full
                                  coverage and $k$-connectivity ($ k <= 6$)
                                  wireless sensor networks . . . . . . . . 934--947
                Wencheng Lu and   
                   Sartaj Sahni   Low-power TCAMs for very large
                                  forwarding tables  . . . . . . . . . . . 948--959
                Libin Jiang and   
                   Jean Walrand   A distributed CSMA algorithm for
                                  throughput and utility maximization in
                                  wireless networks  . . . . . . . . . . . 960--972
               Ritesh Madan and   
            Stephen P. Boyd and   
                    Sanjay Lall   Fast algorithms for resource allocation
                                  in wireless cellular networks  . . . . . 973--984
                Ori Gerstel and   
                      G. Sasaki   A general framework for service
                                  availability for bandwidth-efficient
                                  connection-oriented networks . . . . . . 985--995
                 Chun-I Fan and   
                Pei-Hsiu Ho and   
                   Ruei-Hau Hsu   Provably secure nested one-time secret
                                  mechanisms for fast mutual
                                  authentication and key exchange in
                                  mobile communications  . . . . . . . . . 996--1009

IEEE\slash ACM Transactions on Networking
Volume 18, Number 4, August, 2010

           Milan Vojnovi\'c and   
                Varun Gupta and   
         Thomas Karagiannis and   
            Christos Gkantsidis   Sampling strategies for epidemic-style
                                  information dissemination  . . . . . . . 1013--1025
              Mariyam Mirza and   
               Joel Sommers and   
               Paul Barford and   
                    Xiaojin Zhu   A machine learning approach to TCP
                                  throughput prediction  . . . . . . . . . 1026--1039
        Jörg Liebeherr and   
              Markus Fidler and   
                Shahrokh Valaee   A system-theoretic approach to bandwidth
                                  estimation . . . . . . . . . . . . . . . 1040--1053
                  Yufang Xi and   
                  Edmund M. Yeh   Throughput optimal distributed power
                                  control of stochastic wireless networks  1054--1066
                   Song Guo and   
             Victor C. M. Leung   A distributed algorithm for min-max tree
                                  and max-min cut problems in
                                  communication networks . . . . . . . . . 1067--1076
                    Bing Hu and   
                  Kwan L. Yeung   Feedback-based scheduling for
                                  load-balanced two-stage switches . . . . 1077--1090
                    Ming Yu and   
                   Mengchu Zhou   A performance modeling scheme for
                                  multistage switch networks with
                                  phase-type and bursty traffic  . . . . . 1091--1104
          Sriram Lakshmanan and   
             Cheng-Lin Tsao and   
           Raghupathy Sivakumar   Aegis: physical space security for
                                  wireless networks with smart antennas    1105--1118
               Yanming Shen and   
        Shivendra S. Panwar and   
               H. Jonathan Chao   SQUID: a practical 100% throughput
                                  scheduler for crosspoint buffered
                                  switches . . . . . . . . . . . . . . . . 1119--1131
                 Yunhao Liu and   
                  Kebin Liu and   
                          Mo Li   Passive diagnosis for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1132--1144
              Xiang-Yang Li and   
                 Yunhao Liu and   
                     Shi Li and   
                   ShaoJie Tang   Multicast capacity of wireless ad hoc
                                  networks under Gaussian channel model    1145--1157
           Sudipta Sengupta and   
           Shravan Rayanchu and   
                 Suman Banerjee   Network coding-aware routing in wireless
                                  networks . . . . . . . . . . . . . . . . 1158--1170
              Murtaza Zafer and   
                Bong Jun Ko and   
               Ivan Wang-Hei Ho   Transmit power estimation using
                                  spatially diverse measurements under
                                  wireless fading  . . . . . . . . . . . . 1171--1180
    Haythem A. Bany Salameh and   
               Marwan Krunz and   
                  Ossama Younis   Cooperative adaptive spectrum sharing in
                                  cognitive radio networks . . . . . . . . 1181--1194
                       Yong Liu   Delay bounds of chunk-based peer-to-peer
                                  video streaming  . . . . . . . . . . . . 1195--1206
                Can Emre Koksal   Rate quantization and the speedup
                                  required to achieve 100% throughput for
                                  multicast over crossbar switches . . . . 1207--1219
             Hassan Gobjuka and   
              Yuri J. Breitbart   Ethernet topology discovery for networks
                                  with incomplete information  . . . . . . 1220--1233
        Zubair M. Fadlullah and   
                Tarik Taleb and   
    Athanasios V. Vasilakos and   
             Mohsen Guizani and   
                       Nei Kato   DTRAB: combating against attacks on
                                  encrypted protocols through
                                  traffic-feature analysis . . . . . . . . 1234--1247
                      Di Wu and   
                   Yong Liu and   
                  Keith W. Ross   Modeling and analysis of multichannel
                                  P2P live video systems . . . . . . . . . 1248--1260
            Patrick Loiseau and   
     Paulo Gonçalves and   
          Guillaume Dewaele and   
             Pierre Borgnat and   
               Patrice Abry and   
     Pascale Vicat-Blanc Primet   Investigating self-similarity and
                                  heavy-tailed distributions on a
                                  large-scale experimental facility  . . . 1261--1274
              Mario Barbera and   
             Alfio Lombardo and   
            Carla Panarello and   
              Giovanni Schembra   Queue stability analysis and performance
                                  evaluation of a TCP-compliant window
                                  management mechanism . . . . . . . . . . 1275--1288
       Kishore Ramachandran and   
                 Ravi Kokku and   
              Honghai Zhang and   
                 Marco Gruteser   Symphony: synchronous two-phase rate and
                                  power control in 802.11 WLANs  . . . . . 1289--1302
                 Lijun Chen and   
              Steven H. Low and   
                  John C. Doyle   Random access game and medium access
                                  control design . . . . . . . . . . . . . 1303--1316
             Changchuan Yin and   
                   Long Gao and   
                   Shuguang Cui   Scaling laws for overlaid wireless
                                  networks: a cognitive radio network
                                  versus a primary network . . . . . . . . 1317--1329
                   Bill Lin and   
                 Isaac Keslassy   The concurrent matching switch
                                  architecture . . . . . . . . . . . . . . 1330--1343

IEEE\slash ACM Transactions on Networking
Volume 18, Number 5, October, 2010

                Xiaolong Li and   
         Homayoun Yousefi'zadeh   Analysis, simulation, and implementation
                                  of VCP: a wireless profiling . . . . . . 1345--1358
          Mikhail Afanasyev and   
                Tsuwei Chen and   
        Geoffrey M. Voelker and   
                Alex C. Snoeren   Usage patterns in an urban WiFi network  1359--1372
           Shervan Fashandi and   
        Shahab Oveis Gharan and   
               Amir K. Khandani   Path diversity over packet switched
                                  networks: performance analysis and rate
                                  allocation . . . . . . . . . . . . . . . 1373--1386
                    Jun Luo and   
        Catherine Rosenberg and   
            André Girard   Engineering wireless mesh networks:
                                  joint scheduling, routing, power
                                  control, and rate adaptation . . . . . . 1387--1400
          Leonard H. Grokop and   
                David N. C. Tse   Spectrum sharing between wireless
                                  networks . . . . . . . . . . . . . . . . 1401--1412
              Irene Y. Chen and   
                 Li-Da Tong and   
                  Yi-Ming Huang   Rearrangeable nonblocking optical
                                  interconnection network fabrics with
                                  crosstalk constraints  . . . . . . . . . 1413--1421
                    Ao Tang and   
       Lachlan L. H. Andrew and   
          Krister Jacobsson and   
          Karl H. Johansson and   
    Håkan Hjalmarsson and   
                  Steven H. Low   Queue dynamics with window flow control  1422--1435
                S. Q. Zheng and   
              Jianping Wang and   
                  Bing Yang and   
                       Mei Yang   Minimum-cost multiple paths subject to
                                  minimum link and node sharing in a
                                  network  . . . . . . . . . . . . . . . . 1436--1449
       Utku Günay Acer and   
     Shivkumar Kalyanaraman and   
          Alhussein A. Abouzeid   Weak state routing for large-scale
                                  dynamic networks . . . . . . . . . . . . 1450--1463
P. S. Chandrashekhar Thejaswi and   
              Junshan Zhang and   
                 Man-On Pun and   
            H. Vincent Poor and   
                     Dong Zheng   Distributed opportunistic scheduling
                                  with two-level probing . . . . . . . . . 1464--1477
                  Eli Brosh and   
         Salman Abdul Baset and   
               Vishal Misra and   
             Dan Rubenstein and   
            Henning Schulzrinne   The delay-friendliness of TCP for
                                  real-time traffic  . . . . . . . . . . . 1478--1491
   Madanagopal Ramachandran and   
               N. Usha Rani and   
           Timothy A. Gonsalves   Path computation algorithms for dynamic
                                  service provisioning with protection and
                                  inverse multiplexing in SDH/SONET
                                  networks . . . . . . . . . . . . . . . . 1492--1504
        Alessandro Finamore and   
               Marco Mellia and   
                Michela Meo and   
                    Dario Rossi   KISS: stochastic packet inspection
                                  classifier for UDP traffic . . . . . . . 1505--1515
       Domenico Giustiniano and   
               David Malone and   
           Douglas J. Leith and   
       Konstantina Papagiannaki   Measuring transmission opportunities in
                                  802.11 links . . . . . . . . . . . . . . 1516--1529
              Eyuphan Bulut and   
                Zijian Wang and   
       Boleslaw Karol Szymanski   Cost-effective multiperiod spraying for
                                  routing in delay-tolerant networks . . . 1530--1543
     MohammadHossein Bateni and   
           Alexandre Gerber and   
   MohammadTaghi Hajiaghayi and   
                 Subhabrata Sen   Multi-VPN optimization for scalable
                                  routing via relaying . . . . . . . . . . 1544--1556
Konstantinos Christodoulopoulos and   
    Konstantinos Manousakis and   
           Emmanouel Varvarigos   Offline routing and wavelength
                                  assignment in transparent WDM networks   1557--1570
                     Yan Wu and   
                Zhoujia Mao and   
                Sonia Fahmy and   
                 Ness B. Shroff   Constructing maximum-lifetime data
                                  gathering forests in sensor networks . . 1571--1584
               Tianxiong Ji and   
  Eleftheria Athanasopoulou and   
                     R. Srikant   On optimal scheduling algorithms for
                                  small generalized switches . . . . . . . 1585--1598
              Neda Beheshti and   
           Emily Burmeister and   
             Yashar Ganjali and   
             John E. Bowers and   
       Daniel J. Blumenthal and   
                   Nick McKeown   Optical packet buffers for backbone
                                  Internet routers . . . . . . . . . . . . 1599--1609
                   Shan Chu and   
                       Xin Wang   Opportunistic and cooperative spatial
                                  multiplexing in MIMO ad hoc networks . . 1610--1623
               Giusi Alfano and   
            Michele Garetto and   
            Emilio Leonardi and   
              Valentina Martina   Capacity scaling of wireless networks
                                  with inhomogeneous node density: lower
                                  bounds . . . . . . . . . . . . . . . . . 1624--1636
                    Yung Yi and   
         Gustavo De Veciana and   
              Sanjay Shakkottai   MAC scheduling with low overheads by
                                  learning neighborhood contention
                                  patterns . . . . . . . . . . . . . . . . 1637--1650
        Agostino Forestiero and   
            Emilio Leonardi and   
          Carlo Mastroianni and   
                    Michela Meo   Self-chord: a bio-inspired P2P framework
                                  for self-organizing distributed systems  1651--1664
          Anat Bremler-Barr and   
                  David Hay and   
              Danny Hendler and   
                    Ron M. Roth   PEDS: a parallel error detection scheme
                                  for TCAM devices . . . . . . . . . . . . 1665--1675

IEEE\slash ACM Transactions on Networking
Volume 18, Number 6, December, 2010

          Nizar Bouabdallah and   
                Rami Langar and   
                  Raouf Boutaba   Design and analysis of mobility-aware
                                  clustering algorithms for wireless mesh
                                  networks . . . . . . . . . . . . . . . . 1677--1690
        Srinivas Shakkottai and   
                    Xin Liu and   
                     R. Srikant   The multicast capacity of large multihop
                                  wireless networks  . . . . . . . . . . . 1691--1700
          Douglas M. Blough and   
                   G. Resta and   
                       P. Santi   Approximation algorithms for wireless
                                  link scheduling with SINR-based
                                  interference . . . . . . . . . . . . . . 1701--1712
            Sastry Kompella and   
     Jeffrey E. Wieselthier and   
         Anthony Ephremides and   
           Hanif D. Sherali and   
                  Gam D. Nguyen   On optimal SINR-based scheduling in
                                  multihop wireless networks . . . . . . . 1713--1724
              Nikhil Shetty and   
            Galina Schwartz and   
                   Jean Walrand   Internet QoS and regulations . . . . . . 1725--1737
            Young Myoung Ko and   
               Natarajan Gautam   Epidemic-based information dissemination
                                  in wireless mobile sensor networks . . . 1738--1751
                Adam Kirsch and   
           Michael Mitzenmacher   The power of one move: hashing schemes
                                  for hardware . . . . . . . . . . . . . . 1752--1765
                  Ali Tajer and   
                  Xiaodong Wang   Multiuser diversity gain in cognitive
                                  networks . . . . . . . . . . . . . . . . 1766--1779
               Ashima Gupta and   
             Debalina Ghosh and   
              Prasant Mohapatra   Scheduling prioritized services in
                                  multihop OFDMA networks  . . . . . . . . 1780--1792
                 Soumya Sen and   
                Youngmi Jin and   
         Roch Guérin and   
               Kartik Hosanagar   Modeling the dynamics of network
                                  technology adoption and the role of
                                  converters . . . . . . . . . . . . . . . 1793--1805
                 Zheng Yang and   
                 Yunhao Liu and   
                  Xiang-Yang Li   Beyond trilateration: on the
                                  localizability of wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1806--1814
                Zheng Zhang and   
                 Ying Zhang and   
              Y. Charlie Hu and   
              Z. Morley Mao and   
                     Randy Bush   iSPY: detecting IP prefix hijacking on
                                  my own . . . . . . . . . . . . . . . . . 1815--1828
                  Yong Liao and   
                  Lixin Gao and   
         Roch Guérin and   
                   Zhi-Li Zhang   Safe interdomain routing under diverse
                                  commercial agreements  . . . . . . . . . 1829--1840
         Gaurav S. Kasbekar and   
                 Saswati Sarkar   Spectrum auction framework for access
                                  allocation in cognitive radio networks   1841--1854
            Diana Berbecaru and   
            Luca Albertalli and   
                   Antonio Lioy   The ForwardDiffsig scheme for multicast
                                  authentication . . . . . . . . . . . . . 1855--1868
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Design and provisioning of WDM networks
                                  with many-to-many traffic grooming . . . 1869--1882
              Diego Lucerna and   
          Massimo Tornatore and   
              Achille Pattavina   Algorithms and models for backup
                                  reprovisioning in WDM networks . . . . . 1883--1894
              Hyang-Won Lee and   
              Eytan Modiano and   
                       Kayi Lee   Diverse routing in networks with
                                  probabilistic failures . . . . . . . . . 1895--1907
               Reuven Cohen and   
                 Guy Grebla and   
                   Liran Katzir   Cross-layer hybrid FEC/ARQ reliable
                                  multicast with adaptive modulation and
                                  coding in broadband wireless networks    1908--1920
                 Jaeok Park and   
         Mihaela Van Der Schaar   Medium access control protocols with
                                  memory . . . . . . . . . . . . . . . . . 1921--1934
                Kaidi Huang and   
               Ken R. Duffy and   
                   David Malone   On the validity of IEEE 802.11 MAC
                                  modeling hypotheses  . . . . . . . . . . 1935--1948
                Joseph Camp and   
                Edward Knightly   Modulation rate adaptation in urban and
                                  vehicular environments: cross-layer
                                  implementation and experimental
                                  evaluation . . . . . . . . . . . . . . . 1949--1962
             Hanan Shpungin and   
                  Michael Segal   Near-optimal multicriteria spanner
                                  constructions in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 1963--1976
            Domenico Ficara and   
           Andrea Di Pietro and   
           Stefano Giordano and   
          Gregorio Procissi and   
                  Fabio Vitucci   Enhancing counting bloom filters through
                                  Huffman-coded multilayer structures  . . 1977--1987
            Shrinivasa Kini and   
 Srinivasan Ramasubramanian and   
             Amund Kvalbein and   
          Audun Fosselie Hansen   Fast recovery from dual-link or
                                  single-node failures in IP networks
                                  using tunneling  . . . . . . . . . . . . 1988--1999


IEEE\slash ACM Transactions on Networking
Volume 19, Number 1, February, 2011

               Eitan Altman and   
        Francesco De Pellegrini   Forward correction and fountain codes in
                                  delay-tolerant networks  . . . . . . . . 1--13
          Pierluigi Rolando and   
             Riccardo Sisto and   
                   Fulvio Risso   SPAF: stateless FSA-based packet filters 14--27
                 Zhong Zhou and   
                 Zheng Peng and   
               Jun-Hong Cui and   
                     Zhijie Shi   Efficient multipath communication for
                                  time-critical applications in underwater
                                  acoustic sensor networks . . . . . . . . 28--41
                Yipeng Zhou and   
              Dah-Ming Chiu and   
                 John C. S. Lui   A simple model for chunk-scheduling
                                  strategies in P2P streaming  . . . . . . 42--54
             Hyunseok Chang and   
                Sugih Jamin and   
                    Wenjie Wang   Live streaming with receiver-based
                                  peer-division multiplexing . . . . . . . 55--68
               Reuven Cohen and   
                 Boris Kapchits   Continuous neighbor discovery in
                                  asynchronous sensor networks . . . . . . 69--79
            Matteo Varvello and   
            Stefano Ferrari and   
             Ernst Biersack and   
                Christophe Diot   Exploring second life  . . . . . . . . . 80--91
               Adrian E. Conway   Fast simulation of service availability
                                  in mesh networks with dynamic path
                                  restoration  . . . . . . . . . . . . . . 92--101
                     Dan Li and   
             Chuanxiong Guo and   
                  Haitao Wu and   
                    Kun Tan and   
            Yongguang Zhang and   
                  Songwu Lu and   
                    Jianping Wu   Scalable and cost-effective
                                  interconnection of data-center servers
                                  using dual server ports  . . . . . . . . 102--114
                 Lihua Yuan and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   ProgME: towards programmable network
                                  measurement  . . . . . . . . . . . . . . 115--128
            Gagan Raj Gupta and   
                 Ness B. Shroff   Delay analysis and optimality of
                                  scheduling policies for multihop
                                  wireless networks  . . . . . . . . . . . 129--141
              Andrea Bianco and   
                  David Hay and   
                     Fabio Neri   Crosstalk-preventing scheduling in
                                  single-and two-stage AWG-based cell
                                  switches . . . . . . . . . . . . . . . . 142--155
                  Tianji Li and   
              Douglas Leith and   
                   David Malone   Buffer sizing for 802.11-based networks  156--169
               Berk Canberk and   
            Ian F. Akyildiz and   
                     Sema Oktug   Primary user activity modeling using
                                  first-difference filter clustering and
                                  correlation in cognitive radio networks  170--183
              Patrick Tague and   
             Sidharth Nabar and   
            James A. Ritcey and   
               Radha Poovendran   Jamming-aware traffic allocation for
                                  multiple-path routing using portfolio
                                  selection  . . . . . . . . . . . . . . . 184--194
           Ivan Wang-Hei Ho and   
               Kin K. Leung and   
                  John W. Polak   Stochastic model and connectivity
                                  dynamics for VANETs in signalized road
                                  systems  . . . . . . . . . . . . . . . . 195--208
                      Yi Xu and   
                     Wenye Wang   The limit of information propagation
                                  speed in large-scale multihop wireless
                                  networks . . . . . . . . . . . . . . . . 209--222
                   Ruogu Li and   
            Atilla Eryilmaz and   
                   Lei Ying and   
                 Ness B. Shroff   A unified approach to optimizing
                                  performance in networks serving
                                  heterogeneous flows  . . . . . . . . . . 223--236
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Topological transformation approaches to
                                  TCAM-based packet classification . . . . 237--250
      Ossama Mohamed Younis and   
            Marwan M. Krunz and   
     Srinivasan Ramasubramanian   ROC: resilient online coverage for
                                  surveillance applications  . . . . . . . 251--264
               Yuanzhe Xuan and   
                   Chin-Tau Lea   Network-coding multicast networks with
                                  QoS guarantees . . . . . . . . . . . . . 265--274
      János Tapolcai and   
                     Bin Wu and   
                 Pin-Han Ho and   
            Lajos Rónyai   A novel approach for failure
                                  localization in all-optical mesh
                                  networks . . . . . . . . . . . . . . . . 275--285
            Jerry T. Chiang and   
                    Yih-Chun Hu   Cross-layer jamming detection and
                                  mitigation in wireless broadcast
                                  networks . . . . . . . . . . . . . . . . 286--298
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Erratum to \em Design and Provisioning
                                  of WDM Networks With Many-to-Many
                                  Traffic Grooming . . . . . . . . . . . . 299--299

IEEE\slash ACM Transactions on Networking
Volume 19, Number 2, April, 2011

                  Peng Wang and   
                Stephan Bohacek   Practical computation of optimal
                                  schedules in multihop wireless networks  305--318
                  Chi Zhang and   
                  Yang Song and   
               Yuguang Fang and   
                  Yanchao Zhang   On the price of security in large-scale
                                  wireless ad hoc networks . . . . . . . . 319--332
    Henri Dubois-Ferri\`ere and   
      Matthias Grossglauser and   
                Martin Vetterli   Valuable detours: least-cost anypath
                                  routing  . . . . . . . . . . . . . . . . 333--346
       Ashvin Lakshmikantha and   
               Carolyn Beck and   
                     R. Srikant   Impact of file arrivals and departures
                                  on buffer sizing in core routers . . . . 347--358
                 Ruhai Wang and   
          Scott C. Burleigh and   
              Paavan Parikh and   
                Che-Jen Lin and   
                         Bo Sun   Licklider transmission protocol
                                  (LTP)-based DTN for cislunar
                                  communications . . . . . . . . . . . . . 359--368
                   Cong Liu and   
                         Jie Wu   Practical routing in a cyclic MobiSpace  369--382
        Christos K. Liaskos and   
         Sophia G. Petridou and   
      Georgios I. Papadimitriou   Towards realizable, low-cost broadcast
                                  systems for dynamic environments . . . . 383--392
                Kyu-Han Kim and   
                   Kang G. Shin   Self-reconfigurable wireless mesh
                                  networks . . . . . . . . . . . . . . . . 393--404
                Bilal Sadiq and   
             Seung Jun Baek and   
             Gustavo De Veciana   Delay-optimal opportunistic scheduling
                                  and approximations: the log rule . . . . 405--418
              Stefano Secci and   
         Jean-Louis Rougier and   
          Achille Pattavina and   
         Fioravante Patrone and   
                    Guido Maier   Peering equilibrium multipath routing: a
                                  game theory framework for Internet
                                  peering settlements  . . . . . . . . . . 419--432
                    Ping Xu and   
                  Xiang-Yang Li   TOFU: semi-truthful online frequency
                                  allocation mechanism for wireless
                                  network  . . . . . . . . . . . . . . . . 433--446
            Matthew Andrews and   
                     Lisa Zhang   Scheduling algorithms for multicarrier
                                  wireless data systems  . . . . . . . . . 447--455
                    Wei Wei and   
                  Bing Wang and   
                Don Towsley and   
                     Jim Kurose   Model-based identification of dominant
                                  congested links  . . . . . . . . . . . . 456--469
         Gaurav S. Kasbekar and   
             Yigal Bejerano and   
                 Saswati Sarkar   Lifetime and coverage guarantees through
                                  distributed coordinate-free sensor
                                  activation . . . . . . . . . . . . . . . 470--483
                Joohwan Kim and   
                Xiaojun Lin and   
                 Ness B. Shroff   Optimal anycast technique for
                                  delay-sensitive energy-constrained
                                  asynchronous sensor networks . . . . . . 484--497
           Michele Flammini and   
Alberto Marchetti-Spaccamela and   
           Gianpiero Monaco and   
           Luca Moscardelli and   
                    Shmuel Zaks   On the complexity of the regenerator
                                  placement problem in optical networks    498--511
              Gautam Thatte and   
              Urbashi Mitra and   
                 John Heidemann   Parametric methods for anomaly detection
                                  in aggregate traffic . . . . . . . . . . 512--525
              Jung-Shian Li and   
            Ching-Fang Yang and   
                 Jian-Hong Chen   Star-block design in two-level
                                  survivable optical networks  . . . . . . 526--539
              Xiaoping Wang and   
                    Jun Luo and   
                 Yunhao Liu and   
                Shanshan Li and   
                     Dezun Dong   Component-based localization in sparse
                                  wireless networks  . . . . . . . . . . . 540--548
                Libin Jiang and   
          Venkat Anantharam and   
                   Jean Walrand   How bad are selfish investments in
                                  network security?  . . . . . . . . . . . 549--560
           Mohamed Elhawary and   
                Zygmunt J. Haas   Energy-efficient protocol for
                                  cooperative networks . . . . . . . . . . 561--574
                    Jian Ni and   
                 R. Srikant and   
                     Xinzhou Wu   Coloring spatial point processes with
                                  applications to peer discovery in large
                                  wireless networks  . . . . . . . . . . . 575--588
               Holger Boche and   
             Siddharth Naik and   
                Martin Schubert   Pareto boundary of utility sets for
                                  multiuser wireless systems . . . . . . . 589--601
                   Jian Qiu and   
             Mohan Gurusamy and   
            Kee Chaing Chua and   
                       Yong Liu   Local restoration with multiple spanning
                                  trees in metro Ethernet networks . . . . 602--614

IEEE\slash ACM Transactions on Networking
Volume 19, Number 3, June, 2011

        Mahesh Balakrishnan and   
               Tudor Marian and   
          Kenneth P. Birman and   
         Hakim Weatherspoon and   
                 Lakshmi Ganesh   Maelstrom: transparent error correction
                                  for communication between data centers   617--629
                Injong Rhee and   
                 Minsu Shin and   
               Seongik Hong and   
               Kyunghan Lee and   
             Seong Joon Kim and   
                     Song Chong   On the Levy-walk nature of human
                                  mobility . . . . . . . . . . . . . . . . 630--643
          Salim El Rouayheb and   
             Alex Sprintson and   
             Costas Georghiades   Robust network codes for unicast
                                  connections: a case study  . . . . . . . 644--656
                Sheng Huang and   
          Charles U. Martel and   
            Biswanath Mukherjee   Survivable multipath provisioning with
                                  differential delay constraint in telecom
                                  mesh networks  . . . . . . . . . . . . . 657--669
                    Nan Hua and   
                     Jun Xu and   
                   Bill Lin and   
                   Haiquan Zhao   BRICK: a novel exact active statistics
                                  counter architecture . . . . . . . . . . 670--682
            Domenico Ficara and   
           Andrea Di Pietro and   
           Stefano Giordano and   
          Gregorio Procissi and   
              Fabio Vitucci and   
                 Gianni Antichi   Differential encoding of DFAs for fast
                                  regular expression matching  . . . . . . 683--694
           Yu-Wei Eric Sung and   
                    Xin Sun and   
              Sanjay G. Rao and   
            Geoffrey G. Xie and   
                 David A. Maltz   Towards systematic design of enterprise
                                  networks . . . . . . . . . . . . . . . . 695--708
            Mathieu Leconte and   
                    Jian Ni and   
                     R. Srikant   Improved bounds on the throughput
                                  efficiency of greedy maximal scheduling
                                  in wireless networks . . . . . . . . . . 709--720
          Balaji Rengarajan and   
             Gustavo De Veciana   Architecture and abstractions for
                                  environment and traffic-aware
                                  system-level coordination of wireless
                                  networks . . . . . . . . . . . . . . . . 721--734
         Kostas M. Katrinis and   
                 Anna Tzanakaki   On the dimensioning of WDM optical
                                  networks with impairment-aware
                                  regeneration . . . . . . . . . . . . . . 735--746
          Xiaolan Joy Zhang and   
                 Sun-Il Kim and   
              Steven S. Lumetta   Opportunity cost analysis for dynamic
                                  wavelength routed mesh networks  . . . . 747--759
               Saumitra Das and   
   Konstantina Papagiannaki and   
             Suman Banerjee and   
                      Y. C. Tay   SWARM: the power of structure in
                                  community wireless mesh networks . . . . 760--773
            Murali Kodialam and   
             T. V. Lakshman and   
               Sudipta Sengupta   Traffic-oblivious routing in the hose
                                  model  . . . . . . . . . . . . . . . . . 774--787
            Pere Barlet-Ros and   
        Gianluca Iannaccone and   
     Josep Sanju\`as-Cuxart and   
       Josep Solé-Pareta   Predictive resource management of
                                  multiple monitoring applications . . . . 788--801
           Richard T. B. Ma and   
              Dah Ming Chiu and   
             John C. S. Lui and   
               Vishal Misra and   
                 Dan Rubenstein   On cooperative settlement between
                                  content, transit, and eyeball Internet
                                  service providers  . . . . . . . . . . . 802--815
                Libin Jiang and   
                   Jean Walrand   Approaching throughput-optimality in
                                  distributed CSMA scheduling algorithms
                                  with collisions  . . . . . . . . . . . . 816--829
             Brice Augustin and   
             Timur Friedman and   
                Renata Teixeira   Measuring multipath routing in the
                                  Internet . . . . . . . . . . . . . . . . 830--840
                   Lei Ying and   
          Sanjay Shakkottai and   
               Aneesh Reddy and   
                    Shihuan Liu   On combining shortest-path and
                                  back-pressure routing over multihop
                                  wireless networks  . . . . . . . . . . . 841--854
                 Shuyi Chen and   
          Kaustubh R. Joshi and   
          Matti A. Hiltunen and   
     Richard D. Schlichting and   
             William H. Sanders   Using link gradients to predict the
                                  impact of network latency on multitier
                                  applications . . . . . . . . . . . . . . 855--868
               Sameh Sorour and   
                Shahrokh Valaee   An adaptive network coded retransmission
                                  scheme for single-hop wireless multicast
                                  broadcast services . . . . . . . . . . . 869--878
             Sushant Sharma and   
                     Yi Shi and   
              Y. Thomas Hou and   
                Sastry Kompella   An optimal algorithm for relay node
                                  assignment in cooperative ad hoc
                                  networks . . . . . . . . . . . . . . . . 879--892
               Chi-Kin Chau and   
               Minghua Chen and   
               Soung Chang Liew   Capacity of large-scale CSMA wireless
                                  networks . . . . . . . . . . . . . . . . 893--906
      Péter Babarczi and   
      János Tapolcai and   
                     Pin-Han Ho   Adjacent link failure localization with
                                  monitoring trails in all-optical mesh
                                  networks . . . . . . . . . . . . . . . . 907--920
                   Ming Xia and   
          Massimo Tornatore and   
          Charles U. Martel and   
            Biswanath Mukherjee   Risk-aware provisioning for optical WDM
                                  mesh networks  . . . . . . . . . . . . . 921--931

IEEE\slash ACM Transactions on Networking
Volume 19, Number 4, August, 2011

            Arun Vishwanath and   
            Vijay Sivaraman and   
              George N. Rouskas   Anomalous loss performance for mixed
                                  real-time and TCP traffic in routers
                                  with very small buffers  . . . . . . . . 933--946
              Ren-Shiou Liu and   
                Kai-Wei Fan and   
               Zizhan Zheng and   
                   Prasun Sinha   Perpetual and fair data collection for
                                  environmental energy harvesting sensor
                                  networks . . . . . . . . . . . . . . . . 947--960
               Zhipeng Yang and   
                      Hongyi Wu   FINDERS: a featherlight information
                                  network with delay-endurable RFID
                                  support  . . . . . . . . . . . . . . . . 961--974
       Sherif M. ElRakabawy and   
            Christoph Lindemann   A practical adaptive pacing scheme for
                                  TCP in multihop wireless networks  . . . 975--988
         Satyajeet S. Ahuja and   
 Srinivasan Ramasubramanian and   
                   Marwan Krunz   SRLG failure localization in optical
                                  networks . . . . . . . . . . . . . . . . 989--999
                   Kayi Lee and   
              Eytan Modiano and   
                  Hyang-Won Lee   Cross-layer survivability in WDM-based
                                  networks . . . . . . . . . . . . . . . . 1000--1013
             Jingjing Zhang and   
                  Nirwan Ansari   Scheduling hybrid WDM/TDM passive
                                  optical networks with nonzero laser
                                  tuning time  . . . . . . . . . . . . . . 1014--1027
                 June Hwang and   
                 Seong-Lyun Kim   Cross-layer optimization and network
                                  coding in CSMA/CA-based wireless
                                  multihop networks  . . . . . . . . . . . 1028--1042
             Almut Burchard and   
        Jörg Liebeherr and   
                   Florin Ciucu   On superlinear scaling of network delays 1043--1056
                Shihuan Liu and   
                   Lei Ying and   
                     R. Srikant   Throughput-optimal opportunistic
                                  scheduling in the presence of flow-level
                                  dynamics . . . . . . . . . . . . . . . . 1057--1070
             Ahmed E. Kamal and   
         Aditya Ramamoorthy and   
                  Long Long and   
                    Shizheng Li   Overlay protection against link failures
                                  using network coding . . . . . . . . . . 1071--1084
             Luca Cittadini and   
       Giuseppe Di Battista and   
          Massimo Rimondini and   
             Stefano Vissicchio   Wheel $+$ ring $=$ reel: the impact of
                                  route filtering on the stability of
                                  policy routing . . . . . . . . . . . . . 1085--1096
                 Saqib Raza and   
                 Yuanbo Zhu and   
                 Chen-Nee Chuah   Graceful network state migrations  . . . 1097--1110
               Chi-Kin Chau and   
                 Prithwish Basu   Analysis of latency of stateless
                                  opportunistic forwarding in
                                  intermittently connected networks  . . . 1111--1124
 Juan José Jaramillo and   
                     R. Srikant   Optimal scheduling for fair resource
                                  allocation in ad hoc networks with
                                  elastic and inelastic traffic  . . . . . 1125--1136
            Rahul Urgaonkar and   
               Michael J. Neely   Network capacity region and minimum
                                  energy function for a delay-tolerant
                                  mobile ad hoc network  . . . . . . . . . 1137--1150
        Riccardo Giacomelli and   
        Radha Krishna Ganti and   
                 Martin Haenggi   Outage probability of general ad hoc
                                  networks in the high-reliability regime  1151--1163
            Shao-Cheng Wang and   
                    Ahmed Helmy   BEWARE: background traffic-aware rate
                                  adaptation for IEEE 802.11 . . . . . . . 1164--1177
                  Adel Aziz and   
          David Starobinski and   
                 Patrick Thiran   Understanding and tackling the root
                                  causes of instability in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 1178--1193
                   Tian Lan and   
                Xiaojun Lin and   
                Mung Chiang and   
                    Ruby B. Lee   Stability and benefits of suboptimal
                                  utility maximization . . . . . . . . . . 1194--1207
   Konstantinos Pelechrinis and   
           Ioannis Broustis and   
  Srikanth V. Krishnamurthy and   
            Christos Gkantsidis   A measurement-driven anti-jamming system
                                  for 802.11 networks  . . . . . . . . . . 1208--1222
                M. Kodialam and   
             T. V. Lakshman and   
             James B. Orlin and   
               Sudipta Sengupta   End-to-end restorable oblivious routing
                                  of hose model traffic  . . . . . . . . . 1223--1236
                 Minsik Lee and   
               Youngjip Kim and   
                  Chong-Ho Choi   Period-controlled MAC for high
                                  performance in wireless networks . . . . 1237--1250

IEEE\slash ACM Transactions on Networking
Volume 19, Number 5, October, 2011

             MyungKeun Yoon and   
                     Tao Li and   
               Shigang Chen and   
                  Jih-Kwon Peir   Fit a compact spread estimator in small
                                  high-speed memory  . . . . . . . . . . . 1253--1264
               Reuven Cohen and   
        Niloofar Fazlollahi and   
              David Starobinski   Throughput-competitive advance
                                  reservation with bounded path dispersion 1265--1275
              Ketan Rajawat and   
            Nikolaos Gatsis and   
          Georgios B. Giannakis   Cross-layer designs in coded wireless
                                  fading networks with multicast . . . . . 1276--1289
          Christina Aperjis and   
              Ramesh Johari and   
            Michael J. Freedman   Bilateral and multilateral exchanges for
                                  peer-assisted content distribution . . . 1290--1303
            Marwan Batayneh and   
         Dominic A. Schupke and   
             Marco Hoffmann and   
        Andreas Kirstaedter and   
            Biswanath Mukherjee   On routing and transmission-range
                                  determination of multi-bit-rate signals
                                  over mixed-line-rate WDM optical
                                  networks for carrier Ethernet  . . . . . 1304--1316
                   Chuan Wu and   
                 Baochun Li and   
                   Shuqiao Zhao   On dynamic server provisioning in
                                  multichannel P2P live streaming  . . . . 1317--1330
                 Melih Onus and   
         Andréa W. Richa   Minimum maximum-degree publish-subscribe
                                  overlay network design . . . . . . . . . 1331--1343
               Donghyun Kim and   
                   Wei Wang and   
              Nassim Sohaee and   
                Changcun Ma and   
                   Weili Wu and   
                 Wonjun Lee and   
                    Ding-Zhu Du   Minimum data-latency-bound $k$-sink
                                  placement problem in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1344--1353
               Xinbing Wang and   
               Wentao Huang and   
             Shangxing Wang and   
               Jinbei Zhang and   
                     Chenhui Hu   Delay and capacity tradeoff analysis for
                                  motioncast . . . . . . . . . . . . . . . 1354--1367
    Dimitrios Koutsonikolas and   
             Chih-Chun Wang and   
                  Y. Charlie Hu   Efficient network-coding-based
                                  opportunistic routing through cumulative
                                  coded acknowledgments  . . . . . . . . . 1368--1381
                      Bo Li and   
                 Cem Boyaci and   
                         Ye Xia   A refined performance characterization
                                  of longest-queue-first policy in
                                  wireless networks  . . . . . . . . . . . 1382--1395
               Joanne Treurniet   A network activity classification schema
                                  and its application to scan detection    1396--1404
                  Zhenyu Wu and   
                Mengjun Xie and   
                   Haining Wang   Design and implementation of a fast
                                  dynamic packet filter  . . . . . . . . . 1405--1419
            Amogh Dhamdhere and   
           Constantine Dovrolis   Twelve years in the evolution of the
                                  Internet ecosystem . . . . . . . . . . . 1420--1433
     Ovidiu Valentin Drugan and   
           Thomas Plagemann and   
              Ellen Munthe-Kaas   Detecting communities in sparse MANETs   1434--1447
                     Dan Li and   
                Jianping Wu and   
             Jiangchuan Liu and   
                   Yong Cui and   
                          Ke Xu   Defending against distance cheating in
                                  link-weighted application-layer
                                  multicast  . . . . . . . . . . . . . . . 1448--1457
   François Baccelli and   
            Nicholas Bambos and   
                   Nicolas Gast   Distributed delay-power control
                                  algorithms for bandwidth sharing in
                                  wireless networks  . . . . . . . . . . . 1458--1471
                  Ying Jian and   
                 Ming Zhang and   
                   Shigang Chen   Achieving MAC-layer fairness in CSMA/CA
                                  networks . . . . . . . . . . . . . . . . 1472--1484
               Qinglin Zhao and   
          Danny H. K. Tsang and   
                   Taka Sakurai   A simple critical-load-based CAC scheme
                                  for IEEE 802.11 DCF networks . . . . . . 1485--1498
              Marios Lestas and   
        Andreas Pitsillides and   
             Petros Ioannou and   
             George Hadjipollas   A new estimation scheme for the
                                  effective number of users in Internet
                                  congestion control . . . . . . . . . . . 1499--1512
                Sumit Singh and   
        Raghuraman Mudumbai and   
                Upamanyu Madhow   Interference analysis for highly
                                  directional 60-GHz mesh networks: the
                                  case for rethinking medium access
                                  control  . . . . . . . . . . . . . . . . 1513--1527
          Chandramani Singh and   
             Saswati Sarkar and   
                   Alireza Aram   Provider-customer coalitional games  . . 1528--1542
              Kin-Wah Kwong and   
                  Lixin Gao and   
         Roch Guérin and   
                   Zhi-Li Zhang   On the feasibility and efficacy of
                                  protection routing in IP networks  . . . 1543--1556
         Steven Gianvecchio and   
                Mengjun Xie and   
                  Zhenyu Wu and   
                   Haining Wang   Humans and bots in Internet chat:
                                  measurement, analysis, and automated
                                  classification . . . . . . . . . . . . . 1557--1571

IEEE\slash ACM Transactions on Networking
Volume 19, Number 6, December, 2011

   J. J. Garcia-Luna-Aceves and   
        Rolando Menchaca-Mendez   PRIME: an interest-driven approach to
                                  integrated unicast and multicast routing
                                  in MANETs  . . . . . . . . . . . . . . . 1573--1586
Frédérique Oggier and   
                   Hanane Fathi   An authentication code against pollution
                                  attacks in network coding  . . . . . . . 1587--1596
                 Loc X. Bui and   
                 R. Srikant and   
              Alexander Stolyar   A novel architecture for reduction of
                                  delay and queueing structure complexity
                                  in the back-pressure algorithm . . . . . 1597--1609
         Sebastian Neumayer and   
                Gil Zussman and   
               Reuven Cohen and   
                  Eytan Modiano   Assessing the vulnerability of the fiber
                                  infrastructure to disasters  . . . . . . 1610--1623
       Georgios Smaragdakis and   
         Nikolaos Laoutaris and   
           Vassilis Lekakis and   
             Azer Bestavros and   
              John W. Byers and   
              Mema Roussopoulos   Selfish overlay network creation and
                                  maintenance  . . . . . . . . . . . . . . 1624--1637
           Gianni Giorgetti and   
     Sandeep Kumar S. Gupta and   
               Gianfranco Manes   Understanding the limits of RF-based
                                  collaborative localization . . . . . . . 1638--1651
               Sanaz Barghi and   
           Hamid Jafarkhani and   
         Homayoun Yousefi'zadeh   MIMO-assisted MPR-aware MAC design for
                                  asynchronous WLANs . . . . . . . . . . . 1652--1665
          Andrew J. Kalafut and   
              Craig A. Shue and   
                   Minaxi Gupta   Touring DNS open houses for trends and
                                  configurations . . . . . . . . . . . . . 1666--1675
         Dragana Damjanovic and   
                  Michael Welzl   An extension of the TCP steady-state
                                  throughput equation for parallel flows
                                  and its application in MulTFRC . . . . . 1676--1689
          Balaji Rengarajan and   
             Gustavo De Veciana   Practical adaptive user association
                                  policies for wireless systems with
                                  dynamic interference . . . . . . . . . . 1690--1703
                 Chao Liang and   
                  Miao Zhao and   
                       Yong Liu   Optimal bandwidth sharing in multiswarm
                                  multiparty P2P video-conferencing
                                  systems  . . . . . . . . . . . . . . . . 1704--1716
                   Dahai Xu and   
                Mung Chiang and   
               Jennifer Rexford   Link-state routing with hop-by-hop
                                  forwarding can achieve optimal traffic
                                  engineering  . . . . . . . . . . . . . . 1717--1730
             Amitabha Ghosh and   
    Özlem Durmaz Incel and   
           V. S. Anil Kumar and   
         Bhaskar Krishnamachari   Multichannel scheduling and spanning
                                  trees: throughput-delay tradeoff for
                                  fast data collection in sensor networks  1731--1744
               Delia Ciullo and   
          Valentina Martina and   
            Michele Garetto and   
                Emilio Leonardi   Impact of correlated mobility on
                                  delay-throughput performance in mobile
                                  ad hoc networks  . . . . . . . . . . . . 1745--1758
Konstantinos Christodoulopoulos and   
        Panagiotis Kokkinos and   
     Emmanouel Manos Varvarigos   Indirect and direct multicost algorithms
                                  for online impairment-aware RWA  . . . . 1759--1772
                   Lei Ying and   
                 R. Srikant and   
                Don Towsley and   
                    Shihuan Liu   Cluster-based back-pressure routing
                                  algorithm  . . . . . . . . . . . . . . . 1773--1786
                 Dezun Dong and   
                      Mo Li and   
                 Yunhao Liu and   
              Xiang-Yang Li and   
                   Xiangke Liao   Topological detection on wormholes in
                                  wireless ad hoc and sensor networks  . . 1787--1796
             Sumit Rangwala and   
             Apoorva Jindal and   
              Ki-Young Jang and   
       Konstantinos Psounis and   
                Ramesh Govindan   Neighborhood-centric congestion control
                                  for multihop wireless mesh networks  . . 1797--1810
             Lukasz Budzisz and   
          Rade Stanojevi\'c and   
              Arieh Schlote and   
                 Fred Baker and   
                 Robert Shorten   On the fair coexistence of loss- and
                                  delay-based TCP  . . . . . . . . . . . . 1811--1824
            Murali Kodialam and   
             T. V. Lakshman and   
            Sarit Mukherjee and   
                     Limin Wang   Online scheduling of targeted
                                  advertisements for IPTV  . . . . . . . . 1825--1834
                   Kayi Lee and   
              Hyang-Won Lee and   
                  Eytan Modiano   Reliability in layered networks with
                                  random link failures . . . . . . . . . . 1835--1848
                  Meng Wang and   
               Chee Wei Tan and   
                   Weiyu Xu and   
                        Ao Tang   Cost of not splitting in routing:
                                  characterization and estimation  . . . . 1849--1859
                    Pu Wang and   
                Ian F. Akyildiz   Spatial correlation and mobility-aware
                                  traffic modeling for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1860--1873


IEEE\slash ACM Transactions on Networking
Volume 20, Number 1, February, 2012

           Neal Charbonneau and   
             Vinod M. Vokkarane   Static routing and wavelength assignment
                                  for multicast advance reservation in
                                  all-optical wavelength-routed WDM
                                  networks . . . . . . . . . . . . . . . . 1--14
             Hanan Shpungin and   
                    Zongpeng Li   Throughput and energy efficiency in
                                  wireless ad hoc networks with Gaussian
                                  channels . . . . . . . . . . . . . . . . 15--28
                Binbin Chen and   
                Ziling Zhou and   
                  Yuda Zhao and   
                     Haifeng Yu   Efficient error estimating coding:
                                  feasibility and applications . . . . . . 29--44
                 Saqib Raza and   
              Guanyao Huang and   
             Chen-Nee Chuah and   
          Srini Seetharaman and   
             Jatinder Pal Singh   MeasuRouting: a framework for routing
                                  assisted traffic monitoring  . . . . . . 45--56
                 Peilong Li and   
              Honghai Zhang and   
                Baohua Zhao and   
             Sampath Rangarajan   Scalable video multicast with adaptive
                                  modulation and coding in broadband
                                  wireless data systems  . . . . . . . . . 57--68
          Chandramani Singh and   
             Saswati Sarkar and   
               Alireza Aram and   
                   Anurag Kumar   Cooperative profit sharing in
                                  coalition-based resource allocation in
                                  wireless networks  . . . . . . . . . . . 69--83
                   Kai Chen and   
             Chuanxiong Guo and   
                  Haitao Wu and   
                  Jing Yuan and   
              Zhenqian Feng and   
                   Yan Chen and   
                  Songwu Lu and   
                      Wenfei Wu   DAC: generic and automatic address
                                  configuration for data center networks   84--99
             Arun Sridharan and   
             C. Emre Koksal and   
           Elif Uysal-Biyikoglu   A greedy link scheduler for wireless
                                  networks with Gaussian multiple-access
                                  and broadcast channels . . . . . . . . . 100--113
            Ferhat Dikbiyik and   
       Laxman Sahasrabuddhe and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Exploiting excess capacity to improve
                                  robustness of WDM mesh networks  . . . . 114--124
                  Minlan Yu and   
             Marina Thottan and   
                          Li Li   Latency equalization as a new network
                                  service primitive  . . . . . . . . . . . 125--138
               Myungjin Lee and   
              Nick Duffield and   
            Ramana Rao Kompella   Opportunistic flow-level latency
                                  estimation using consistent netflow  . . 139--152
                Sangman Cho and   
         Theodore Elhourani and   
     Srinivasan Ramasubramanian   Independent directed acyclic graphs for
                                  resilient multipath routing  . . . . . . 153--162
                Berk Birand and   
           Maria Chudnovsky and   
               Bernard Ries and   
               Paul Seymour and   
                Gil Zussman and   
                     Yori Zwols   Analyzing the performance of greedy
                                  maximal scheduling via local pooling and
                                  graph theory . . . . . . . . . . . . . . 163--176
               Hongseok Kim and   
         Gustavo De Veciana and   
             Xiangying Yang and   
         Muthaiah Venkatachalam   Distributed $ \alpha $-optimal user
                                  association and cell load balancing in
                                  wireless networks  . . . . . . . . . . . 177--190
        Giuseppe Campobello and   
        Alessandro Leonardi and   
                 Sergio Palazzo   Improving energy saving and reliability
                                  in wireless sensor networks using a
                                  simple CRT-based packet-forwarding
                                  solution . . . . . . . . . . . . . . . . 191--205
         Mosharaf Chowdhury and   
     Muntasir Raihan Rahman and   
                  Raouf Boutaba   ViNEYard: virtual network embedding
                                  algorithms with coordinated node and
                                  link mapping . . . . . . . . . . . . . . 206--219
              Craig A. Shue and   
          Andrew J. Kalafut and   
                   Minaxi Gupta   Abnormally malicious autonomous systems
                                  and their Internet connectivity  . . . . 220--230
              Julien Ridoux and   
              Darryl Veitch and   
              Timothy Broomhead   The case for feed-forward clock
                                  synchronization  . . . . . . . . . . . . 231--242
        Abhijeet A. Bhorkar and   
         Mohammad Naghshvar and   
                Tara Javidi and   
                 Bhaskar D. Rao   Adaptive opportunistic routing for
                                  wireless ad hoc networks . . . . . . . . 243--256
                 Hayang Kim and   
                  Xiaoli Ma and   
      Benjamin Russell Hamilton   Tracking low-precision clocks with
                                  time-varying drifts using Kalman
                                  filtering  . . . . . . . . . . . . . . . 257--270
                   Yihua He and   
         Michalis Faloutsos and   
  Srikanth V. Krishnamurthy and   
                  Marek Chrobak   Obtaining provably legitimate Internet
                                  topologies . . . . . . . . . . . . . . . 271--284
            Matthew Andrews and   
Antonio Fernández Anta and   
                 Lisa Zhang and   
                     Wenbo Zhao   Routing for power minimization in the
                                  speed scaling model  . . . . . . . . . . 285--294
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
                     Haoyu Song   Fast dynamic multiple-set membership
                                  testing using combinatorial Bloom
                                  filters  . . . . . . . . . . . . . . . . 295--304
                 Yunbo Wang and   
            Mehmet C. Vuran and   
                  Steve Goddard   Cross-layer analysis of the end-to-end
                                  delay distribution in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 305--318

IEEE\slash ACM Transactions on Networking
Volume 20, Number 2, April, 2012

                    Wei Wei and   
             Sharad Jaiswal and   
                 Jim Kurose and   
                Don Towsley and   
              Kyoungwon Suh and   
                      Bing Wang   Identifying 802.11 traffic from passive
                                  measurements using iterative Bayesian
                                  inference  . . . . . . . . . . . . . . . 325--338
                 Sungho Yun and   
          Constantine Caramanis   System-level optimization in wireless
                                  networks: managing interference and
                                  uncertainty via robust optimization  . . 339--352
           Justin Manweiler and   
          Naveen Santhapuri and   
                 Souvik Sen and   
        Romit Roy Choudhury and   
         Srihari Nelakuditi and   
                Kamesh Munagala   Order matters: transmission reordering
                                  in wireless networks . . . . . . . . . . 353--366
           Bridge Qiao Zhao and   
             John C. S. Lui and   
                  Dah-Ming Chiu   A mathematical framework for analyzing
                                  adaptive incentive protocols in P2P
                                  networks . . . . . . . . . . . . . . . . 367--380
                Fabio Soldo and   
          Katerina Argyraki and   
             Athina Markopoulou   Optimal source-based filtering of
                                  malicious traffic  . . . . . . . . . . . 381--395
      Mukundan Venkataraman and   
              Mainak Chatterjee   Quantifying video-QoE degradations of
                                  Internet links . . . . . . . . . . . . . 396--407
               Guoqiang Mao and   
           Brian D. O. Anderson   Towards a better understanding of
                                  large-scale network models . . . . . . . 408--421
              Michael Menth and   
                Frank Lehrieder   Performance of PCN-based admission
                                  control under challenging conditions . . 422--435
       Miklós Reiter and   
              Richard Steinberg   Congestion-dependent pricing and forward
                                  contracts for complementary segments of
                                  a communication network  . . . . . . . . 436--449
                    Rui Tan and   
              Guoliang Xing and   
                Benyuan Liu and   
              Jianping Wang and   
                    Xiaohua Jia   Exploiting data fusion to improve the
                                  coverage of wireless sensor networks . . 450--462
          Luca Chiaraviglio and   
               Marco Mellia and   
                     Fabio Neri   Minimizing ISP network energy cost:
                                  formulation and solutions  . . . . . . . 463--476
             Niv Buchbinder and   
          Liane Lewin-Eytan and   
              Ishai Menache and   
                Joseph Naor and   
                     Ariel Orda   Dynamic power allocation under arbitrary
                                  varying channels: an online approach . . 477--487
            Chad R. Meiners and   
                Alex X. Liu and   
                     Eric Torng   Bit weaving: a non-prefix approach to
                                  compressing packet classifiers in TCAMs  488--500
                  Eric Jung and   
                        Xin Liu   Opportunistic spectrum access in
                                  multiple-primary-user environments under
                                  the packet collision constraint  . . . . 501--514
               Kyunghan Lee and   
               Seongik Hong and   
             Seong Joon Kim and   
                Injong Rhee and   
                     Song Chong   SLAW: self-similar least-action human
                                  walk . . . . . . . . . . . . . . . . . . 515--529
                    Tao Shu and   
                   Marwan Krunz   Finding cheap routes in profit-driven
                                  opportunistic spectrum access networks:
                                  a truthful mechanism design approach . . 530--543
                 Souvik Sen and   
        Romit Roy Choudhury and   
             Srihari Nelakuditi   CSMA/CN: carrier sense multiple access
                                  with collision notification  . . . . . . 544--556
             Beakcheol Jang and   
             Mihail L. Sichitiu   IEEE 802.11 saturation throughput
                                  analysis in the presence of hidden
                                  terminals  . . . . . . . . . . . . . . . 557--570
           Ahmed Elmokashfi and   
             Amund Kvalbein and   
           Constantine Dovrolis   BGP churn evolution: a perspective from
                                  the core . . . . . . . . . . . . . . . . 571--584
               Ermin Kozica and   
             W. Bastiaan Kleijn   A quantization theoretic perspective on
                                  simulcast and layered multicast
                                  optimization . . . . . . . . . . . . . . 585--593
        Costas Courcoubetis and   
                  Richard Weber   Economic issues in shared
                                  infrastructures  . . . . . . . . . . . . 594--608
              Thang N. Dinh and   
                  Ying Xuan and   
                 My T. Thai and   
          Panos M. Pardalos and   
                    Taieb Znati   On new approaches of assessing network
                                  vulnerability: hardness and
                                  approximation  . . . . . . . . . . . . . 609--619
        Giovanna Carofiglio and   
               Luca Muscariello   On the impact of TCP and per-flow
                                  scheduling on Internet performance . . . 620--633

IEEE\slash ACM Transactions on Networking
Volume 20, Number 3, June, 2012

     Khandoker Nadim Parvez and   
           Carey Williamson and   
            Anirban Mahanti and   
                Niklas Carlsson   Insights on media streaming progress
                                  using BitTorrent-like protocols for
                                  on-demand streaming  . . . . . . . . . . 637--650
                   Lili Cao and   
                   Haitao Zheng   Balancing reliability and utilization in
                                  dynamic spectrum access  . . . . . . . . 651--661
            Matthew Roughan and   
                  Yin Zhang and   
           Walter Willinger and   
                       Lili Qiu   Spatio-temporal compressive sensing and
                                  Internet traffic matrices  . . . . . . . 662--676
João Luís Sobrinho and   
                  Tiago Quelhas   A theory for the connectivity discovered
                                  by routing protocols . . . . . . . . . . 677--689
                 XiaoHua Xu and   
              Xiang-Yang Li and   
               Peng-Jun Wan and   
                   ShaoJie Tang   Efficient scheduling for periodic
                                  aggregation queries in multihop sensor
                                  networks . . . . . . . . . . . . . . . . 690--698
             Masanori Bando and   
            N. Sertac Artan and   
               H. Jonathan Chao   Scalable lookahead regular expression
                                  detection system for deep packet
                                  inspection . . . . . . . . . . . . . . . 699--714
             Sanjeev Khanna and   
       Santosh S. Venkatesh and   
              Omid Fatemieh and   
                Fariba Khan and   
                 Carl A. Gunter   Adaptive selective verification: an
                                  efficient adaptive countermeasure to
                                  thwart DoS attacks . . . . . . . . . . . 715--728
                  Fong Pong and   
                Nian-Feng Tzeng   Concise lookup tables for IPv4 and IPv6
                                  longest prefix matching in scalable
                                  routers  . . . . . . . . . . . . . . . . 729--741
              Rafael Laufer and   
    Henri Dubois-Ferri\`ere and   
              Leonard Kleinrock   Polynomial-time algorithms for multirate
                                  anypath routing in wireless multihop
                                  networks . . . . . . . . . . . . . . . . 742--755
           Douglas J. Leith and   
                  Qizhi Cao and   
           Vijay G. Subramanian   Max-min fairness in 802.11 mesh networks 756--769
               Changbin Liu and   
             Ricardo Correa and   
                Xiaozhou Li and   
             Prithwish Basu and   
              Boon Thau Loo and   
                        Yun Mao   Declarative policy-based adaptive mobile
                                  ad hoc networking  . . . . . . . . . . . 770--783
             Edoardo Amaldi and   
             Antonio Capone and   
              Matteo Cesana and   
               Ilario Filippini   Design of wireless sensor networks for
                                  mobile target detection  . . . . . . . . 784--797
               Samir Sebbah and   
               Brigitte Jaumard   Differentiated quality-of-recovery in
                                  survivable optical mesh networks using
                                  $p$-structures . . . . . . . . . . . . . 798--810
        Ramana Rao Kompella and   
           Kirill Levchenko and   
            Alex C. Snoeren and   
                George Varghese   Router support for fine-grained latency
                                  measurements . . . . . . . . . . . . . . 811--824
                    Jian Ni and   
                     Bo Tan and   
                     R. Srikant   Q-CSMA: queue-length-based CSMA/CA
                                  algorithms for achieving maximum
                                  throughput and low delay in wireless
                                  networks . . . . . . . . . . . . . . . . 825--836
                   Wei Wang and   
               Kang G. Shin and   
                     Wenbo Wang   Distributed resource allocation based on
                                  queue balancing in multihop cognitive
                                  radio networks . . . . . . . . . . . . . 837--850
                     Yi Zhu and   
                   Jason P. Jue   Reliable collective communications with
                                  weighted SRLGs in optical networks . . . 851--863
                  Guang Tan and   
           Anne-Marie Kermarrec   Greedy geographic routing in large-scale
                                  sensor networks: a minimum network
                                  decomposition approach . . . . . . . . . 864--877
         Siamak Sorooshyari and   
               Chee Wei Tan and   
                    Mung Chiang   Power control for cognitive radio
                                  networks: axioms, algorithms, and
                                  analysis . . . . . . . . . . . . . . . . 878--891
    Parv Venkitasubramaniam and   
                      Lang Tong   A game-theoretic approach to anonymous
                                  networking . . . . . . . . . . . . . . . 892--905
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   On identifying additive link metrics
                                  using linearly independent cycles and
                                  paths  . . . . . . . . . . . . . . . . . 906--916
               Xinbing Wang and   
                   Luoyi Fu and   
                     Chenhui Hu   Multicast performance with hierarchical
                                  cooperation  . . . . . . . . . . . . . . 917--930
             Brian Eriksson and   
           Gautam Dasarathy and   
               Paul Barford and   
                   Robert Nowak   Efficient network tomography for
                                  Internet topology discovery  . . . . . . 931--943
                     Dan Li and   
                 Yuanjie Li and   
                Jianping Wu and   
                     Sen Su and   
                    Jiangwei Yu   ESM: efficient and scalable data center
                                  multicast routing  . . . . . . . . . . . 944--955
               Zizhan Zheng and   
               Prasun Sinha and   
                  Santosh Kumar   Sparse WiFi deployment for vehicular
                                  Internet access with bounded
                                  interconnection gap  . . . . . . . . . . 956--969
          Anat Bremler-Barr and   
                    Yaron Koral   Accelerating multipattern matching on
                                  compressed HTTP traffic  . . . . . . . . 970--983

IEEE\slash ACM Transactions on Networking
Volume 20, Number 4, August, 2012

             Cataldo Basile and   
         Alberto Cappadonia and   
                   Antonio Lioy   Network-level access control policy
                                  analysis and transformation  . . . . . . 985--998
               Diego Passos and   
        Celio V. N. Albuquerque   A joint approach to routing metrics and
                                  rate adaptation in wireless mesh
                                  networks . . . . . . . . . . . . . . . . 999--1009
             Ionut Trestian and   
         Supranamaya Ranjan and   
      Aleksandar Kuzmanovic and   
                  Antonio Nucci   Taming the mobile data deluge with drop
                                  zones  . . . . . . . . . . . . . . . . . 1010--1023
               Vicky Sharma and   
                Koushik Kar and   
         K. K. Ramakrishnan and   
         Shivkumar Kalyanaraman   A transport protocol to exploit
                                  multipath diversity in wireless networks 1024--1039
                   Hao Wang and   
               Haiquan Zhao and   
                   Bill Lin and   
                         Jun Xu   DRAM-based statistics counter array
                                  architecture with performance guarantee  1040--1053
                     Yi Shi and   
                  Y. Thomas Hou   Some fundamental results on base station
                                  movement problem for wireless sensor
                                  networks . . . . . . . . . . . . . . . . 1054--1067
              Ashwini Kumar and   
                   Kang G. Shin   DSASync: managing end-to-end connections
                                  in dynamic spectrum access wireless LANs 1068--1081
           Sharanya Eswaran and   
               Archan Misra and   
             Thomas F. La Porta   Control-theoretic utility maximization
                                  in multihop wireless networks under
                                  mission dynamics . . . . . . . . . . . . 1082--1095
        Krishna Jagannathan and   
           Mihalis Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Queue-length asymptotics for generalized
                                  max-weight scheduling in the presence of
                                  heavy-tailed traffic . . . . . . . . . . 1096--1111
                     Bin Li and   
                Atilla Eryilmaz   Exploring the throughput boundaries of
                                  randomized schedulers in wireless
                                  networks . . . . . . . . . . . . . . . . 1112--1124
           Evangelos Bampas and   
            Aris Pagourtzis and   
           George Pierrakos and   
                Katerina Potika   On a noncooperative model for wavelength
                                  assignment in multifiber optical
                                  networks . . . . . . . . . . . . . . . . 1125--1137
                   Jung Ryu and   
                   Lei Ying and   
              Sanjay Shakkottai   Timescale decoupled routing and rate
                                  control in intermittently connected
                                  networks . . . . . . . . . . . . . . . . 1138--1151
           Gabriel Y. Keung and   
                      Bo Li and   
                     Qian Zhang   The intrusion detection in mobile sensor
                                  network  . . . . . . . . . . . . . . . . 1152--1161
             Josep M. Pujol and   
            Vijay Erramilli and   
            Georgos Siganos and   
              Xiaoyuan Yang and   
         Nikolaos Laoutaris and   
          Parminder Chhabra and   
                Pablo Rodriguez   The little engine(s) that could: scaling
                                  online social networks . . . . . . . . . 1162--1175
            Frank Lehrieder and   
     György Dán and   
       Tobias Hoßfeld and   
             Simon Oechsner and   
                Vlad Singeorzan   Caching for BitTorrent-like P2P systems:
                                  a simple fluid model and its
                                  implications . . . . . . . . . . . . . . 1176--1189
               Hongbo Jiang and   
               Arun Iyengar and   
                Erich Nahum and   
         Wolfgang Segmuller and   
           Asser N. Tantawi and   
              Charles P. Wright   Design, implementation, and performance
                                  of a load balancer for SIP server
                                  clusters . . . . . . . . . . . . . . . . 1190--1202
             Apoorva Jindal and   
                    Mingyan Liu   Networked computing in wireless sensor
                                  networks for structural health
                                  monitoring . . . . . . . . . . . . . . . 1203--1216
               Charles Shen and   
                Erich Nahum and   
        Henning Schulzrinne and   
              Charles P. Wright   The impact of TLS on SIP server
                                  performance: measurement and modeling    1217--1230
              Daniel Medina and   
             Felix Hoffmann and   
         Francesco Rossetto and   
        Carl-Herbert Rokitansky   A geographic routing strategy for North
                                  Atlantic in-flight Internet access via
                                  airborne mesh networking . . . . . . . . 1231--1244
                  Zhen Ling and   
                Junzhou Luo and   
                     Wei Yu and   
                  Xinwen Fu and   
                  Dong Xuan and   
                     Weijia Jia   A new cell-counting-based attack against
                                  Tor  . . . . . . . . . . . . . . . . . . 1245--1261
             Masanori Bando and   
                  Yi-Li Lin and   
               H. Jonathan Chao   FlashTrie: beyond 100-Gb/s IP route
                                  lookup using hash-based
                                  prefix-compressed trie . . . . . . . . . 1262--1275
               Cai Hong Kai and   
               Soung Chang Liew   Applications of belief propagation in
                                  CSMA wireless networks . . . . . . . . . 1276--1289
               Guowang Miao and   
                      Ye Li and   
                Ananthram Swami   Channel-aware distributed medium access
                                  control  . . . . . . . . . . . . . . . . 1290--1303
                     Pan Li and   
                   Miao Pan and   
                   Yuguang Fang   Capacity bounds of three-dimensional
                                  wireless ad hoc networks . . . . . . . . 1304--1315
                Long Bao Le and   
              Eytan Modiano and   
                 Ness B. Shroff   Optimal control of wireless networks
                                  with finite buffers  . . . . . . . . . . 1316--1329

IEEE\slash ACM Transactions on Networking
Volume 20, Number 5, October, 2012

                 Ravi Kokku and   
            Rajesh Mahindra and   
              Honghai Zhang and   
             Sampath Rangarajan   NVS: a substrate for virtualizing
                                  wireless resources in cellular networks  1333--1346
          M. H. R. Khouzani and   
             Saswati Sarkar and   
                   Eitan Altman   Maximum damage malware attack in mobile
                                  wireless networks  . . . . . . . . . . . 1347--1360
               Alex Sherman and   
                 Jason Nieh and   
                 Clifford Stein   FairTorrent: a deficit-based distributed
                                  algorithm to ensure fairness in
                                  peer-to-peer systems . . . . . . . . . . 1361--1374
    Dimitrios Koutsonikolas and   
              Y. Charlie Hu and   
                 Chih-Chun Wang   Pacifier: high-throughput, reliable
                                  multicast without ``Crying babies'' in
                                  wireless mesh networks . . . . . . . . . 1375--1388
                   Wei Chen and   
          Khaled B. Letaief and   
                    Zhigang Cao   Buffer-aware network coding for wireless
                                  networks . . . . . . . . . . . . . . . . 1389--1401
                   Yang Qin and   
                 Lie-Liang Yang   Steady-state throughput analysis of
                                  network coding nodes employing
                                  stop-and-wait automatic repeat request   1402--1411
                 Yongkun Li and   
           Bridge Qiao Zhao and   
                 John C. S. Lui   On modeling product advertisement in
                                  large-scale online social networks . . . 1412--1425
                 Danhua Guo and   
       Laxmi Narayan Bhuyan and   
                        Bin Liu   An efficient parallelized L7-filter
                                  design for multicore servers . . . . . . 1426--1439
              Murtaza Zafer and   
             Dakshi Agrawal and   
              Mudhakar Srivatsa   Limitations of generating a secret key
                                  using wireless fading under active
                                  adversary  . . . . . . . . . . . . . . . 1440--1451
                Joseph Camp and   
              Ehsan Aryafar and   
                Edward Knightly   Coupled 802.11 flows in urban channels:
                                  model and experimental evaluation  . . . 1452--1465
                     Yi Gai and   
     Bhaskar Krishnamachari and   
                     Rahul Jain   Combinatorial network optimization with
                                  unknown variables: multi-armed bandits
                                  with linear rewards and individual
                                  observations . . . . . . . . . . . . . . 1466--1478
             Danail Traskov and   
        Michael Heindlmaier and   
       Muriel Médard and   
                   Ralf Koetter   Scheduling for network-coded multicast   1479--1488
                 Haoyu Song and   
            Murali Kodialam and   
                   Fang Hao and   
                 T. V. Lakshman   Efficient trie braiding in scalable
                                  virtual routers  . . . . . . . . . . . . 1489--1500
               Wentao Huang and   
                   Xinbing Wang   Capacity scaling of general cognitive
                                  networks . . . . . . . . . . . . . . . . 1501--1513
           Mhameed Aezladen and   
               Reuven Cohen and   
                      Danny Raz   Efficient location-based
                                  decision-supporting content distribution
                                  to mobile groups . . . . . . . . . . . . 1514--1526
          Mohammad A. Saleh and   
                 Ahmed E. Kamal   Approximation algorithms for
                                  many-to-many traffic grooming in optical
                                  WDM networks . . . . . . . . . . . . . . 1527--1540
                  Cem Tekin and   
                Mingyan Liu and   
          Richard Southwell and   
              Jianwei Huang and   
          Sahand Haji Ali Ahmad   Atomic congestion games on graphs and
                                  their applications in networking . . . . 1541--1552
                    Wei Gao and   
                 Qinghua Li and   
                    Bo Zhao and   
                    Guohong Cao   Social-aware multicast in
                                  disruption-tolerant networks . . . . . . 1553--1566
       Ramon Aparicio-Pardo and   
          Nina Skorin-Kapov and   
         Pablo Pavon-Marino and   
          Belen Garcia-Manrubia   (Non-)reconfigurable virtual topology
                                  design under multihour traffic in
                                  optical networks . . . . . . . . . . . . 1567--1580
             Khoa Tran Phan and   
                 Jaeok Park and   
         Mihaela Van Der Schaar   Near-optimal deviation-proof medium
                                  access control designs in wireless
                                  networks . . . . . . . . . . . . . . . . 1581--1594
              Honghai Zhang and   
               Yuanxi Jiang and   
         Karthik Sundaresan and   
         Sampath Rangarajan and   
                    Baohua Zhao   Wireless multicast scheduling with
                                  switched beamforming antennas  . . . . . 1595--1607
         Shreeshankar Bodas and   
          Sanjay Shakkottai and   
                   Lei Ying and   
                     R. Srikant   Low-complexity scheduling algorithms for
                                  multichannel downlink wireless networks  1608--1621
                     Tao Li and   
               Shigang Chen and   
                     Yibei Ling   Per-flow traffic measurement through
                                  randomized counter sharing . . . . . . . 1622--1634
        Eugenio Magistretti and   
              Omer Gurewitz and   
             Edward W. Knightly   Measurement-driven modeling of
                                  transmission coordination for 802.11
                                  online . . . . . . . . . . . . . . . . . 1635--1648
                   Ruogu Li and   
                Atilla Eryilmaz   Scheduling for end-to-end
                                  deadline-constrained traffic with
                                  reliability requirements in multihop
                                  networks . . . . . . . . . . . . . . . . 1649--1662
              Sandeep Yadav and   
Ashwath Kumar Krishna Reddy and   
      A. L. Narasimha Reddy and   
             Supranamaya Ranjan   Detecting algorithmically generated
                                  domain-flux attacks with DNS traffic
                                  analysis . . . . . . . . . . . . . . . . 1663--1677

IEEE\slash ACM Transactions on Networking
Volume 20, Number 6, December, 2012

               Minghua Chen and   
             Miroslav Ponec and   
           Sudipta Sengupta and   
                     Jin Li and   
                 Philip A. Chou   Utility maximization in peer-to-peer
                                  systems with applications to video
                                  conferencing . . . . . . . . . . . . . . 1681--1694
                     Bo Han and   
                 Lusheng Ji and   
              Seungjoon Lee and   
        Bobby Bhattacharjee and   
               Robert R. Miller   Are all bits equal?: experimental study
                                  of IEEE 802.11 communication bit errors  1695--1706
                   Lu Zhang and   
                    Xueyan Tang   Optimizing client assignment for
                                  enhancing interactivity in distributed
                                  interactive applications . . . . . . . . 1707--1720
           Ihsan Ayyub Qazi and   
       Lachlan L. H. Andrew and   
                    Taieb Znati   Congestion control with multipacket
                                  feedback . . . . . . . . . . . . . . . . 1721--1733
                     He Yan and   
                Lee Breslau and   
                   Zihui Ge and   
                 Dan Massey and   
                    Dan Pei and   
                 Jennifer Yates   G-RCA: a generic root cause analysis
                                  platform for service quality management
                                  in large IP networks . . . . . . . . . . 1734--1747
                Liguang Xie and   
                     Yi Shi and   
              Y. Thomas Hou and   
               Hanif D. Sherali   Making sensor networks immortal: an
                                  energy-renewal approach with wireless
                                  power transfer . . . . . . . . . . . . . 1748--1761
      János Tapolcai and   
                 Pin-Han Ho and   
        Lajos Rónyai and   
                         Bin Wu   Network-wide local unambiguous failure
                                  localization (NWL-UFL) via monitoring
                                  trails . . . . . . . . . . . . . . . . . 1762--1773
                   Fei Chen and   
                    Alex X. Liu   Privacy- and integrity-preserving range
                                  queries in sensor networks . . . . . . . 1774--1787
         Daniela Brauckhoff and   
   Xenofontas Dimitropoulos and   
                Arno Wagner and   
         Kavé Salamatian   Anomaly extraction in backbone networks
                                  using association rules  . . . . . . . . 1788--1799
                  Yong Ding and   
                  Yang Yang and   
                        Li Xiao   Multisource video on-demand streaming in
                                  wireless mesh networks . . . . . . . . . 1800--1813
                 Anduo Wang and   
                  Limin Jia and   
               Wenchao Zhou and   
                 Yiqing Ren and   
              Boon Thau Loo and   
           Jennifer Rexford and   
                Vivek Nigam and   
              Andre Scedrov and   
                Carolyn Talcott   FSR: formal analysis and implementation
                                  toolkit for safe interdomain routing . . 1814--1827
Jérôme François and   
                  Issam Aib and   
                  Raouf Boutaba   FireCol: a collaborative protection
                                  network for the detection of flooding
                                  DDoS attacks . . . . . . . . . . . . . . 1828--1841
           Laurent Vanbever and   
         Stefano Vissicchio and   
            Cristel Pelsser and   
            Pierre Francois and   
            Olivier Bonaventure   Lossless migrations of link-state IGPs   1842--1855
               Eitan Altman and   
               Anurag Kumar and   
          Chandramani Singh and   
              Rajesh Sundaresan   Spatial SINR games of base station
                                  placement and mobile association . . . . 1856--1869
         George B. Mertzios and   
                 Ignasi Sau and   
           Mordechai Shalom and   
                    Shmuel Zaks   Placing regenerators in optical networks
                                  to satisfy multiple sets of requests . . 1870--1879
          Thuy T. T. Nguyen and   
         Grenville Armitage and   
              Philip Branch and   
               Sebastian Zander   Timely and continuous
                                  machine-learning-based classification
                                  for interactive IP traffic . . . . . . . 1880--1894
             Isaac Keslassy and   
               Kirill Kogan and   
           Gabriel Scalosub and   
                  Michael Segal   Providing performance guarantees in
                                  multipass network processors . . . . . . 1895--1909
               Jeff Seibert and   
               Ruben Torres and   
               Marco Mellia and   
         Maurizio M. Munafo and   
       Cristina Nita-Rotaru and   
                     Sanjay Rao   The Internet-wide impact of P2P traffic
                                  localization on ISP profitability  . . . 1910--1923
                Weiyao Xiao and   
             Sachin Agarwal and   
          David Starobinski and   
               Ari Trachtenberg   Reliable rateless wireless broadcasting
                                  with near-zero feedback  . . . . . . . . 1924--1937
        Dominic DiPalantino and   
                  Ramesh Johari   Traffic engineering with semiautonomous
                                  users: a game-theoretic perspective  . . 1938--1949
                 Jiajia Liu and   
             Xiaohong Jiang and   
           Hiroki Nishiyama and   
                       Nei Kato   Generalized two-hop relay for flexible
                                  delay control in MANETs  . . . . . . . . 1950--1963
                  Ziqiu Yun and   
                 Xiaole Bai and   
                  Dong Xuan and   
                 Weijia Jia and   
                       Wei Zhao   Pattern mutation in wireless sensor
                                  deployment . . . . . . . . . . . . . . . 1964--1977
                     Tao Li and   
               Samuel S. Wu and   
               Shigang Chen and   
                Mark C. K. Yang   Generalized energy-efficient algorithms
                                  for the RFID estimation problem  . . . . 1978--1990
         Gaurav S. Kasbekar and   
             Yigal Bejerano and   
                 Saswati Sarkar   Generic coverage verification without
                                  location information using dimension
                                  reduction  . . . . . . . . . . . . . . . 1991--2004
                 Vinod Kone and   
                   Lei Yang and   
                   Xue Yang and   
                Ben Y. Zhao and   
                   Haitao Zheng   The effectiveness of opportunistic
                                  spectrum access: a measurement study . . 2005--2016


IEEE\slash ACM Transactions on Networking
Volume 21, Number 1, February, 2013

         Mukarram Bin Tariq and   
         Kaushik Bhandankar and   
         Vytautas Valancius and   
              Amgad Zeitoun and   
              Nick Feamster and   
                  Mostafa Ammar   Answering: techniques and deployment
                                  experience . . . . . . . . . . . . . . . 1--13
                 Yunyue Lin and   
                       Qishi Wu   Complexity analysis and algorithm design
                                  for advance bandwidth scheduling in
                                  dedicated networks . . . . . . . . . . . 14--27
                Youngmi Jin and   
             George Kesidis and   
                   Ju Wook Jang   Diffusion dynamics of network
                                  technologies with bounded rational
                                  users: aspiration-based learning . . . . 28--40
               Michael J. Neely   Delay-based network utility maximization 41--54
            Sabato Manfredi and   
         Francesco Oliviero and   
            Simon Pietro Romano   A distributed control law for load
                                  balancing in content delivery networks   55--68
        Sudarshan Vasudevan and   
                Micah Adler and   
             Dennis Goeckel and   
                    Don Towsley   Efficient algorithms for neighbor
                                  discovery in wireless networks . . . . . 69--83
                 Fangwen Fu and   
                  Ulas C. Kozat   Stochastic game for wireless network
                                  virtualization . . . . . . . . . . . . . 84--97
                 Haoyu Song and   
             Jonathan S. Turner   ABC: adaptive binary cuttings for
                                  multidimensional packet classification   98--109
                   Juan Liu and   
                   Wei Chen and   
             Ying Jun Zhang and   
                    Zhigang Cao   A utility maximization framework for
                                  fair and efficient multicasting in
                                  multicarrier wireless cellular networks  110--120
                   Ting Zhu and   
                Ziguo Zhong and   
                    Tian He and   
                   Zhi-Li Zhang   Achieving efficient flooding by
                                  utilizing link correlation in wireless
                                  sensor networks  . . . . . . . . . . . . 121--134
                  Yanhua Li and   
                   Zhi-Li Zhang   Random walks and Green's function on
                                  digraphs: a framework for estimating
                                  wireless transmission costs  . . . . . . 135--148
                    Xi Deng and   
              Yuanyuan Yang and   
                   Sangjin Hong   A flexible platform for hardware-aware
                                  network experiments and a case study on
                                  wireless network coding  . . . . . . . . 149--161
                  Miao Wang and   
                  Lisong Xu and   
               Byrav Ramamurthy   Exploring the design space of
                                  multichannel peer-to-peer live video
                                  streaming systems  . . . . . . . . . . . 162--175
             Sung Hyun Chun and   
                  Richard J. La   Secondary spectrum trading:
                                  auction-based framework for spectrum
                                  allocation and profit sharing  . . . . . 176--189
              Maxwell Young and   
                Aniket Kate and   
               Ian Goldberg and   
                 Martin Karsten   Towards practical communication in
                                  Byzantine-resistant DHTs . . . . . . . . 190--203
                    Yong He and   
                    Jie Sun and   
                 Xiaojun Ma and   
    Athanasios V. Vasilakos and   
                 Ruixi Yuan and   
                     Weibo Gong   Semi-random backoff: towards resource
                                  reservation for channel access in
                                  wireless LANs  . . . . . . . . . . . . . 204--217
                Shaolei Ren and   
                 Jaeok Park and   
         Mihaela Van Der Schaar   Entry and spectrum sharing scheme
                                  selection in femtocell communications
                                  markets  . . . . . . . . . . . . . . . . 218--232
                Yipeng Zhou and   
               Tom Z. J. Fu and   
                  Dah Ming Chiu   On replication algorithm in P2P VoD  . . 233--243
  Eleftheria Athanasopoulou and   
                 Loc X. Bui and   
               Tianxiong Ji and   
                 R. Srikant and   
              Alexander Stolyar   Back-pressure-based packet-by-packet
                                  adaptive routing in communication
                                  networks . . . . . . . . . . . . . . . . 244--257
               Urtzi Ayesta and   
           Martin Erausquin and   
        Matthieu Jonckheere and   
              Ina Maria Verloop   Scheduling in a random environment:
                                  stability and asymptotic optimality  . . 258--271
                 Shinuk Woo and   
                   Hwangnam Kim   An empirical interference modeling for
                                  link reliability assessment in wireless
                                  networks . . . . . . . . . . . . . . . . 272--285
          Bozidar Radunovic and   
            Alexandre Proutiere   On downlink capacity of cellular data
                                  networks with WLAN/WPAN relays . . . . . 286--296
     György Dán and   
                Niklas Carlsson   Centralized and distributed protocols
                                  for tracker-based dynamic swarm
                                  management . . . . . . . . . . . . . . . 297--310
               Jizhong Zhao and   
                     Wei Xi and   
                    Yuan He and   
                 Yunhao Liu and   
              Xiang-Yang Li and   
                  Lufeng Mo and   
                     Zheng Yang   Localization of wireless sensor networks
                                  in the wild: pursuit of ranging quality  311--323
             C. Emre Koksal and   
              Ozgur Ercetin and   
                 Yunus Sarikaya   Control of wireless networks with
                                  secrecy  . . . . . . . . . . . . . . . . 324--337

IEEE\slash ACM Transactions on Networking
Volume 21, Number 2, April, 2013

                  Haitao Wu and   
              Zhenqian Feng and   
             Chuanxiong Guo and   
                Yongguang Zhang   ICTCP: incast congestion control for TCP
                                  in data-center networks  . . . . . . . . 345--358
            Beatriz Lorenzo and   
                    Savo Glisic   Context-aware nanoscale modeling of
                                  multicast multihop cellular networks . . 359--372
         Victor M. Preciado and   
                  Ali Jadbabaie   Moment-based spectral analysis of
                                  large-scale networks using local
                                  structural information . . . . . . . . . 373--382
                   Ken Keys and   
                 Young Hyun and   
             Matthew Luckie and   
                     Kim Claffy   Internet-scale IPv4 alias resolution
                                  with MIDAR . . . . . . . . . . . . . . . 383--399
                  Wei Cheng and   
                  Nan Zhang and   
              Xiuzhen Cheng and   
                   Min Song and   
                   Dechang Chen   Time-bounded essential localization for
                                  wireless sensor networks . . . . . . . . 400--412
              Ammar Metnani and   
               Brigitte Jaumard   Stability of FIPP $p$-cycles under
                                  dynamic traffic in WDM networks: dynamic
                                  traffic,failure-independent
                                  path-protecting (FIPP) $p$-cycles,path
                                  protection,shared bandwidth
                                  protection,stability of protection
                                  structures . . . . . . . . . . . . . . . 413--425
                Xinyu Zhang and   
                   Kang G. Shin   Cooperative carrier signaling:
                                  harmonizing coexisting WPAN and WLAN
                                  devices  . . . . . . . . . . . . . . . . 426--439
               Xinbing Wang and   
                Xiaojun Lin and   
                Qingsi Wang and   
                    Wentao Luan   Mobility increases the connectivity of
                                  wireless networks  . . . . . . . . . . . 440--454
                  Ece Gelal and   
               Jianxia Ning and   
   Konstantinos Pelechrinis and   
                Tae-Suk Kim and   
           Ioannis Broustis and   
  Srikanth V. Krishnamurthy and   
                 Bhaskar D. Rao   Topology control for effective
                                  interference cancellation in multiuser
                                  MIMO networks  . . . . . . . . . . . . . 455--468
         Nikolaos M. Freris and   
             Cheng-Hsin Hsu and   
         Jatinder Pal Singh and   
                   Xiaoqing Zhu   Distortion-aware scalable video
                                  streaming to multinetwork clients  . . . 469--481
               Eitan Altman and   
          Amar Prakash Azad and   
                Tamer Basar and   
        Francesco De Pellegrini   Combined optimal control of activation
                                  and transmission in delay-tolerant
                                  networks . . . . . . . . . . . . . . . . 482--494
               Po-Kai Huang and   
                Xiaojun Lin and   
                 Chih-Chun Wang   A low-complexity congestion control and
                                  scheduling algorithm for multihop
                                  wireless networks with order-optimal
                                  per-flow delay . . . . . . . . . . . . . 495--508
           Brad W. Zarikoff and   
               Douglas J. Leith   Measuring pulsed interference in 802.11
                                  links  . . . . . . . . . . . . . . . . . 509--521
                   Lei Yang and   
               Hongseok Kim and   
              Junshan Zhang and   
                Mung Chiang and   
                   Chee Wei Tan   Pricing-based decentralized spectrum
                                  access control in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 522--535
               Kyunghan Lee and   
                Joohyun Lee and   
                    Yung Yi and   
                Injong Rhee and   
                     Song Chong   Mobile data offloading: how much can
                                  WiFi deliver?  . . . . . . . . . . . . . 536--550
                Alex X. Liu and   
               Amir R. Khakpour   Quantifying and verifying reachability
                                  for access controlled networks . . . . . 551--565
                     Bo Tan and   
       Laurent Massoulié   Optimal content placement for
                                  peer-to-peer video-on-demand systems . . 566--579
         Daniel S. Menasche and   
      Antonio A. De A.Rocha and   
                     Bin Li and   
                Don Towsley and   
             Arun Venkataramani   Content availability and bundling in
                                  swarming systems . . . . . . . . . . . . 580--593
                Eric Rozner and   
               Mi Kyung Han and   
                   Lili Qiu and   
                      Yin Zhang   Model-driven optimization of
                                  opportunistic routing  . . . . . . . . . 594--609
            Andrea Clementi and   
         Francesco Pasquale and   
             Riccardo Silvestri   Opportunistic MANETs: mobility can make
                                  up for low transmission power  . . . . . 610--620
                Qianhong Wu and   
                     Bo Qin and   
                  Lei Zhang and   
       Josep Domingo-Ferrer and   
  Jesús A. Manjón   Fast transmission to remote cooperative
                                  groups: a new key management paradigm    621--633
                      Bo Ji and   
               Changhee Joo and   
                 Ness B. Shroff   Throughput-optimal scheduling in
                                  multihop wireless networks without
                                  per-flow information . . . . . . . . . . 634--647
               Malati Hegde and   
                Pavan Kumar and   
              K. R. Vasudev and   
               N. N. Sowmya and   
             S. V. R. Anand and   
               Anurag Kumar and   
                       Joy Kuri   Experiences with a centralized
                                  scheduling approach for performance
                                  management of IEEE 802.11 wireless LANs  648--662
               Simon S. Lam and   
                      Chen Qian   Geographic routing in $d$-dimensional
                                  spaces with guaranteed delivery and low
                                  stretch  . . . . . . . . . . . . . . . . 663--677

IEEE\slash ACM Transactions on Networking
Volume 21, Number 3, June, 2013

                 De Wen Soh and   
               Wee Peng Tay and   
                Tony Q. S. Quek   Randomized information dissemination in
                                  dynamic environments . . . . . . . . . . 681--691
        Ioannis Pefkianakis and   
                Suk-Bok Lee and   
                      Songwu Lu   Towards MIMO-aware 802.11n rate
                                  adaptation . . . . . . . . . . . . . . . 692--705
               Chee Wei Tan and   
                Mung Chiang and   
                     R. Srikant   Fast algorithms and performance bounds
                                  for sum rate maximization in wireless
                                  networks . . . . . . . . . . . . . . . . 706--719
             Chris Y. T. Ma and   
            David K. Y. Yau and   
              Nung Kwan Yip and   
            Nageswara S. V. Rao   Privacy vulnerability of published
                                  anonymous mobility traces  . . . . . . . 720--733
             Hung X. Nguyen and   
                Matthew Roughan   Rigorous statistical analysis of
                                  Internet loss measurements . . . . . . . 734--745
                 Dajun Qian and   
                 Dong Zheng and   
              Junshan Zhang and   
             Ness B. Shroff and   
                   Changhee Joo   Distributed CSMA algorithms for link
                                  scheduling in multihop MIMO networks
                                  under SINR model . . . . . . . . . . . . 746--759
        Andréa Richa and   
       Christian Scheideler and   
              Stefan Schmid and   
                      Jin Zhang   An efficient and fair MAC protocol
                                  robust to reactive interference  . . . . 760--771
                    Ji Fang and   
                    Kun Tan and   
             Yuanyang Zhang and   
              Shouyuan Chen and   
                  Lixin Shi and   
             Jiansong Zhang and   
            Yongguang Zhang and   
                    Zhenhui Tan   Fine-grained channel access in wireless
                                  LAN  . . . . . . . . . . . . . . . . . . 772--787
             Felipe Lalanne and   
                  Stephane Maag   A formal data-centric approach for
                                  passive testing of communication
                                  protocols  . . . . . . . . . . . . . . . 788--801
             Fabio Checconi and   
                Luigi Rizzo and   
                  Paolo Valente   QFQ: efficient packet scheduling with
                                  tight guarantees . . . . . . . . . . . . 802--816
                     Tao Li and   
               Shigang Chen and   
                    Wen Luo and   
                 Ming Zhang and   
                       Yan Qiao   Spreader classification based on optimal
                                  dynamic bit sharing  . . . . . . . . . . 817--830
               Longbo Huang and   
              Scott Moeller and   
           Michael J. Neely and   
         Bhaskar Krishnamachari   LIFO-backpressure achieves near-optimal
                                  utility-delay tradeoff . . . . . . . . . 831--844
   Natalia Castro Fernandes and   
Marcelo Duffles Donato Moreira and   
Otto Carlos Muniz Bandeira Duarte   An efficient and robust addressing
                                  protocol for node autoconfiguration in
                                  ad hoc networks  . . . . . . . . . . . . 845--856
                   Fei Chen and   
      Bezawada Bruhadeshwar and   
                    Alex X. Liu   Cross-domain privacy-preserving
                                  cooperative firewall optimization  . . . 857--868
         Sriram N. Premnath and   
               Daryl Wasden and   
            Sneha K. Kasera and   
               Neal Patwari and   
      Behrouz Farhang-Boroujeny   Beyond OFDM: best-effort dynamic
                                  spectrum access using filterbank
                                  multicarrier . . . . . . . . . . . . . . 869--882
               Manuel Fogue and   
             Piedad Garrido and   
      Francisco J. Martinez and   
           Juan-Carlos Cano and   
         Carlos T. Calafate and   
                 Pietro Manzoni   An adaptive system based on roadmap
                                  profiling to enhance warning message
                                  dissemination in VANETs  . . . . . . . . 883--895
          Mustafa Y. Arslan and   
   Konstantinos Pelechrinis and   
           Ioannis Broustis and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
          Sateesh Addepalli and   
       Konstantina Papagiannaki   ACORN: an auto-configuration framework
                                  for 802.11n WLANs  . . . . . . . . . . . 896--909
                    Kai Han and   
                   Yang Liu and   
                        Jun Luo   Duty-cycle-aware minimum-energy
                                  multicasting in wireless sensor networks 910--923
             Yuanqing Zheng and   
                          Mo Li   Fast tag searching protocol for
                                  large-scale RFID systems . . . . . . . . 924--934
               Eitan Altman and   
              Philippe Nain and   
               Adam Shwartz and   
                     Yuedong Xu   Predicting the impact of measures
                                  against P2P networks: transient behavior
                                  and phase transition . . . . . . . . . . 935--949
                Tae-Suk Kim and   
           Ioannis Broustis and   
               Serdar Vural and   
         Dimitris Syrivelis and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
             Thomas F. La Porta   Realizing the benefits of wireless
                                  network coding in multirate settings . . 950--962
                 Yilin Shen and   
              Nam P. Nguyen and   
                  Ying Xuan and   
                     My T. Thai   On the discovery of critical links and
                                  nodes for assessing network
                                  vulnerability  . . . . . . . . . . . . . 963--973
     Reza Moazzez-Estanjini and   
                  Jing Wang and   
        Ioannis Ch. Paschalidis   Scheduling mobile nodes for cooperative
                                  data transport in sensor networks  . . . 974--989
         Stefano Vissicchio and   
           Laurent Vanbever and   
            Cristel Pelsser and   
             Luca Cittadini and   
            Pierre Francois and   
            Olivier Bonaventure   Improving network agility with seamless
                                  BGP reconfigurations . . . . . . . . . . 990--1002
              Stefano Paris and   
       Cristina Nita-Rotaru and   
            Fabio Martignon and   
                 Antonio Capone   Cross-layer metrics for reliable routing
                                  in wireless mesh networks  . . . . . . . 1003--1016

IEEE\slash ACM Transactions on Networking
Volume 21, Number 4, August, 2013

             Kaidi D. Huang and   
               Ken R. Duffy and   
                   David Malone   H-RCA: 802.11 collision-aware rate
                                  control  . . . . . . . . . . . . . . . . 1021--1034
              Sayandeep Sen and   
                  Tan Zhang and   
                Syed Gilani and   
           Shreesha Srinath and   
             Suman Banerjee and   
              Sateesh Addepalli   Design and implementation of an
                                  ``approximate'' communication system for
                                  wireless media applications  . . . . . . 1035--1048
           Rahul Srivastava and   
                Can Emre Koksal   Basic performance limits and tradeoffs
                                  in energy-harvesting sensor nodes with
                                  finite data and energy storage . . . . . 1049--1062
              Javad Ghaderi and   
                     R. Srikant   The impact of access probabilities on
                                  the delay performance of Q--CSMA
                                  algorithms in wireless networks  . . . . 1063--1075
           Amir R. Khakpour and   
                    Alex X. Liu   An information-theoretical approach to
                                  high-speed flow nature identification    1076--1089
              Xiaoming Wang and   
                Xiaoyong Li and   
                Dmitri Loguinov   Modeling residual-geometric flow
                                  sampling . . . . . . . . . . . . . . . . 1090--1103
             Tsern-Huei Lee and   
                  Nai-Lun Huang   A pattern-matching scheme with high
                                  throughput performance and low memory
                                  requirement  . . . . . . . . . . . . . . 1104--1116
               Longbo Huang and   
               Michael J. Neely   Utility optimal scheduling in
                                  energy-harvesting networks . . . . . . . 1117--1130
               Amin Karbasi and   
                     Sewoong Oh   Robust localization from incomplete
                                  local information  . . . . . . . . . . . 1131--1144
David López-Pérez and   
                 Xiaoli Chu and   
    Athanasios V. Vasilakos and   
                Holger Claussen   On distributed and coordinated resource
                                  allocation for interference mitigation
                                  in self-organizing LTE networks  . . . . 1145--1158
                 Rik Sarkar and   
                        Jie Gao   Differential forms for target tracking
                                  and aggregate queries in distributed
                                  networks . . . . . . . . . . . . . . . . 1159--1172
               Zhangyu Guan and   
            Tommaso Melodia and   
                  Dongfeng Yuan   Jointly optimal rate control and relay
                                  selection for cooperative wireless video
                                  streaming  . . . . . . . . . . . . . . . 1173--1186
                Liang Zhang and   
               Shigang Chen and   
                  Ying Jian and   
               Yuguang Fang and   
                        Zhen Mo   Maximizing lifetime vector in wireless
                                  sensor networks  . . . . . . . . . . . . 1187--1200
            Yeim-Kuan Chang and   
             Cheng-Chien Su and   
             Yung-Chieh Lin and   
                 Sun-Yuan Hsieh   Efficient gray-code-based range encoding
                                  schemes for packet classification in
                                  TCAM . . . . . . . . . . . . . . . . . . 1201--1214
                 Xinzhou Wu and   
          Saurabha Tavildar and   
          Sanjay Shakkottai and   
             Tom Richardson and   
                   Junyi Li and   
               Rajiv Laroia and   
             Aleksandar Jovicic   FlashLinQ: a synchronous distributed
                                  scheduler for peer-to-peer ad hoc
                                  networks . . . . . . . . . . . . . . . . 1215--1228
             Chih-Cheng Hsu and   
             Ming-Shing Kuo and   
              Cheng-Fu Chou and   
              Kate Ching-Ju Lin   The elimination of spatial-temporal
                                  uncertainty in underwater sensor
                                  networks . . . . . . . . . . . . . . . . 1229--1242
             Zhenghao Zhang and   
             Steven Bronson and   
                    Jin Xie and   
                         Wei Hu   Employing the
                                  one-sender-multiple-receiver technique
                                  in wireless LANs . . . . . . . . . . . . 1243--1255
    Subhash Lakshminarayana and   
                Atilla Eryilmaz   Multirate multicasting with intralayer
                                  network coding . . . . . . . . . . . . . 1256--1269
                Shouling Ji and   
                    Zhipeng Cai   Distributed data collection in
                                  large-scale asynchronous wireless sensor
                                  networks under the generalized physical
                                  interference model . . . . . . . . . . . 1270--1283
              Yosuke Himura and   
             Kensuke Fukuda and   
                Kenjiro Cho and   
             Pierre Borgnat and   
               Patrice Abry and   
                  Hiroshi Esaki   Synoptic graphlet: bridging the gap
                                  between supervised and unsupervised
                                  profiling of host-level network traffic  1284--1297
               Ken R. Duffy and   
          Charles Bordenave and   
               Douglas J. Leith   Decentralized constraint satisfaction    1298--1308
Jacques Lévy Véhel and   
                    Michal Rams   Large deviation multifractal analysis of
                                  a class of additive processes with
                                  correlated nonstationary increments  . . 1309--1321
        Ioannis Caragiannis and   
           Michele Flammini and   
               Luca Moscardelli   An exponential improvement on the MST
                                  heuristic for minimum energy
                                  broadcasting in ad hoc wireless networks 1322--1331
            Laura Galluccio and   
           Giacomo Morabito and   
                 Sergio Palazzo   GEographic Multicast (GEM) for dense
                                  wireless networks: protocol design and
                                  performance analysis . . . . . . . . . . 1332--1346

IEEE\slash ACM Transactions on Networking
Volume 21, Number 5, October, 2013

              Ehsan Aryafar and   
        Theodoros Salonidis and   
                 Jingpu Shi and   
                Edward Knightly   Synchronized CSMA contention: model,
                                  implementation, and evaluation . . . . . 1349--1362
                Marco Cello and   
             Giorgio Gnecco and   
             Mario Marchese and   
            Marcello Sanguineti   Optimality conditions for
                                  coordinate-convex policies in CAC with
                                  nonlinear feasibility boundaries . . . . 1363--1377
               Minghong Lin and   
               Adam Wierman and   
       Lachlan L. H. Andrew and   
                   Eno Thereska   Dynamic right-sizing for
                                  power-proportional data centers  . . . . 1378--1391
             Apoorva Jindal and   
           Konstantinos Psounis   On the efficiency of CSMA-CA scheduling
                                  in wireless multihop networks  . . . . . 1392--1406
              Xiaolan Zhang and   
            Giovanni Neglia and   
                 Jim Kurose and   
                Don Towsley and   
                  Haixiang Wang   Benefits of network coding for unicast
                                  application in disruption-tolerant
                                  networks . . . . . . . . . . . . . . . . 1407--1420
        Rubén Cuevas and   
             Michal Kryczka and   
               Angel Cuevas and   
            Sebastian Kaune and   
            Carmen Guerrero and   
                    Reza Rejaie   Unveiling the incentives for content
                                  publishing in popular BitTorrent portals 1421--1435
       Sara Gatmir-Motahari and   
                   Hui Zang and   
                Phyllis Reuther   Time-clustering-based place prediction
                                  for wireless subscribers . . . . . . . . 1436--1446
          Mustafa Y. Arslan and   
               Jongwon Yoon and   
     Karthikeyan Sundaresan and   
  Srikanth V. Krishnamurthy and   
                 Suman Banerjee   A resource management system for
                                  interference mitigation in enterprise
                                  OFDMA femtocells . . . . . . . . . . . . 1447--1460
               Reuven Cohen and   
              Ilia Nudelman and   
                   Gleb Polevoy   On the admission of dependent flows in
                                  powerful sensor networks . . . . . . . . 1461--1471
                Hazem Gomaa and   
        Geoffrey G. Messier and   
           Carey Williamson and   
                  Robert Davies   Estimating instantaneous cache hit ratio
                                  using Markov chain analysis  . . . . . . 1472--1483
           Ilario Filippini and   
                Eylem Ekici and   
                  Matteo Cesana   A new outlook on routing in cognitive
                                  radio networks: minimum-maintenance-cost
                                  routing  . . . . . . . . . . . . . . . . 1484--1498
                   Wei Wang and   
               Donghyun Kim and   
               Min Kyung An and   
                    Wei Gao and   
                 Xianyue Li and   
                 Zhao Zhang and   
                       Weili Wu   On construction of quality
                                  fault-tolerant virtual backbone in
                                  wireless networks  . . . . . . . . . . . 1499--1510
               Yongjun Liao and   
                     Wei Du and   
              Pierre Geurts and   
                      Guy Leduc   DMFSGD: a decentralized matrix
                                  factorization algorithm for network
                                  distance prediction  . . . . . . . . . . 1511--1524
          Pankaj K. Agarwal and   
                 Alon Efrat and   
  Shashidhara K. Ganjugunte and   
                  David Hay and   
   Swaminathan Sankararaman and   
                    Gil Zussman   The resilience of WDM networks to
                                  probabilistic geographical failures  . . 1525--1538
                      Bo Ji and   
               Changhee Joo and   
                 Ness B. Shroff   Delay-based back-pressure scheduling in
                                  multihop wireless networks . . . . . . . 1539--1552
              Albert Banchs and   
     Andres Garcia-Saavedra and   
              Pablo Serrano and   
                   Joerg Widmer   A game-theoretic approach to distributed
                                  opportunistic scheduling . . . . . . . . 1553--1566
               Myungjin Lee and   
              Nick Duffield and   
            Ramana Rao Kompella   High-fidelity per-flow delay
                                  measurements with reference latency
                                  interpolation  . . . . . . . . . . . . . 1567--1580
         Rajasekhar Sappidi and   
        André Girard and   
            Catherine Rosenberg   Maximum achievable throughput in a
                                  wireless sensor network using in-network
                                  computation for statistical functions    1581--1594
              Ehsan Aryafar and   
  Mohammad Ali Khojastepour and   
         Karthik Sundaresan and   
         Sampath Rangarajan and   
                Edward Knightly   ADAM: an adaptive beamforming system for
                                  multicasting in wireless LANs  . . . . . 1595--1608
       Faryad Darabi Sahneh and   
           Caterina Scoglio and   
               Piet Van Mieghem   Generalized epidemic mean-field model
                                  for spreading processes over multilayer
                                  complex networks . . . . . . . . . . . . 1609--1620
               Kyunghan Lee and   
                  Yoora Kim and   
                 Song Chong and   
                Injong Rhee and   
                    Yung Yi and   
                 Ness B. Shroff   On the critical delays of mobile
                                  networks under Lévy walks and Lévy flights 1621--1635
               Tae Hyun Kim and   
                    Jian Ni and   
                 R. Srikant and   
                Nitin H. Vaidya   Throughput-optimal CSMA with imperfect
                                  carrier sensing  . . . . . . . . . . . . 1636--1650
              Ramin Khalili and   
               Nicolas Gast and   
           Miroslav Popovic and   
            Jean-Yves Le Boudec   MPTCP is not Pareto-optimal: performance
                                  issues and a possible solution . . . . . 1651--1665
               Ji-Yong Shin and   
              Emin Gn Sirer and   
         Hakim Weatherspoon and   
                 Darko Kirovski   On the feasibility of completely
                                  wireless datacenters . . . . . . . . . . 1666--1679

IEEE\slash ACM Transactions on Networking
Volume 21, Number 6, December, 2013

           Horia Vlad Balan and   
               Ryan Rogalin and   
     Antonios Michaloliakos and   
       Konstantinos Psounis and   
                 Giuseppe Caire   AirSync: enabling distributed multiuser
                                  MIMO with full spatial multiplexing  . . 1681--1695
                Dongyue Xue and   
                    Eylem Ekici   Delay-guaranteed cross-layer scheduling
                                  in multihop wireless networks  . . . . . 1696--1707
              Mehmet Karaca and   
               Karim Khalil and   
                Eylem Ekici and   
                  Ozgur Ercetin   Optimal scheduling and power allocation
                                  in cooperate-to-join cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1708--1721
                  Liu Xiang and   
                    Jun Luo and   
            Catherine Rosenberg   Compressed data aggregation:
                                  energy-efficient and high-fidelity data
                                  collection . . . . . . . . . . . . . . . 1722--1735
           Piotr H. Srebrny and   
           Thomas Plagemann and   
                Vera Goebel and   
                 Andreas Mauthe   No more Déj\`a Vu: eliminating redundancy
                                  with cachecast: feasibility and
                                  performance gains  . . . . . . . . . . . 1736--1749
            Enzo Baccarelli and   
           Nicola Cordeschi and   
                Valentina Polli   Optimal self-adaptive QoS resource
                                  management in interference-affected
                                  multicast wireless networks  . . . . . . 1750--1759
              Derek Leonard and   
                Dmitri Loguinov   Demystifying Internet-wide service
                                  discovery  . . . . . . . . . . . . . . . 1760--1773
        Osameh M. Al-Kofahi and   
                 Ahmed E. Kamal   Scalable redundancy for sensors-to-sink
                                  communication  . . . . . . . . . . . . . 1774--1784
            Carlee Joe-Wong and   
                 Soumya Sen and   
                   Tian Lan and   
                    Mung Chiang   Multiresource allocation:
                                  fairness-efficiency tradeoffs in a
                                  unifying framework . . . . . . . . . . . 1785--1798
                  Zhijun Li and   
                     Guang Gong   On the node clone detection in wireless
                                  sensor networks  . . . . . . . . . . . . 1799--1811
          Chandramani Singh and   
               Eitan Altman and   
               Anurag Kumar and   
              Rajesh Sundaresan   Optimal forwarding in delay-tolerant
                                  networks with multiple destinations  . . 1812--1826
                Ming Ouyang and   
                       Lei Ying   Approaching throughput optimality with
                                  limited feedback in multichannel
                                  wireless downlink networks . . . . . . . 1827--1838
           Masaki Fukushima and   
             Kohei Sugiyama and   
          Teruyuki Hasegawa and   
              Toru Hasegawa and   
                  Akihiro Nakao   Minimum disclosure routing for network
                                  virtualization and its experimental
                                  evaluation . . . . . . . . . . . . . . . 1839--1851
         Nikolaos Laoutaris and   
       Georgios Smaragdakis and   
            Rade Stanojevic and   
            Pablo Rodriguez and   
                  Ravi Sundaram   Delay-tolerant bulk data transfers on
                                  the Internet . . . . . . . . . . . . . . 1852--1865
           Richard T. B. Ma and   
                   Vishal Misra   The public option: a nonregulatory
                                  alternative to network neutrality  . . . 1866--1879
                   Yin Wang and   
                    Yuan He and   
                  Xufei Mao and   
                 Yunhao Liu and   
                  Xiang-Yang Li   Exploiting constructive interference for
                                  scalable flooding in wireless networks   1880--1889
                 Joan Triay and   
Cristina Cervelló-Pastor and   
             Vinod M. Vokkarane   Analytical blocking probability model
                                  for hybrid immediate and advance
                                  reservations in optical WDM networks . . 1890--1903
                  Huasen Wu and   
                 Chenxi Zhu and   
              Richard J. La and   
                    Xin Liu and   
                 Youguang Zhang   FASA: accelerated S-ALOHA using access
                                  history for event-driven M2M
                                  communications . . . . . . . . . . . . . 1904--1917
       William Wei-Liang Li and   
                  Yuan Shen and   
             Ying Jun Zhang and   
                     Moe Z. Win   Robust power allocation for
                                  energy-efficient location-aware networks 1918--1930
                Tilman Wolf and   
           Sriram Natarajan and   
           Kamlesh T. Vasudevan   High-performance capabilities for
                                  $1$-hop containment of network attacks   1931--1946
                 Dejun Yang and   
               Guoliang Xue and   
                    Xi Fang and   
          Satyajayant Misra and   
                      Jin Zhang   A game-theoretic approach to stable
                                  routing in max-min fair networks . . . . 1947--1959
           M. Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
                       Jia Wang   Large-scale measurement and
                                  characterization of cellular
                                  machine-to-machine traffic . . . . . . . 1960--1973
                     Tao Li and   
               Shigang Chen and   
                     Yibei Ling   Efficient protocols for identifying the
                                  missing tags in a large RFID system  . . 1974--1987
               Guanhong Pei and   
   Srinivasan Parthasarathy and   
         Aravind Srinivasan and   
       Anil Kumar S. Vullikanti   Approximation algorithms for throughput
                                  maximization in wireless networks with
                                  delay constraints  . . . . . . . . . . . 1988--2000
       S. Shunmuga Krishnan and   
            Ramesh K. Sitaraman   Video stream quality impacts viewer
                                  behavior: inferring causality using
                                  quasi-experimental designs . . . . . . . 2001--2014


IEEE\slash ACM Transactions on Networking
Volume 22, Number 1, February, 2014

               Shan-Hung Wu and   
             Ming-Syan Chen and   
                 Chung-Min Chen   Optimally Adaptive Power-Saving
                                  Protocols for Ad Hoc Networks Using the
                                  Hyper Quorum System  . . . . . . . . . . 1--15
                Junbeom Hur and   
                  Kyungtae Kang   Secure Data Retrieval for Decentralized
                                  Disruption-Tolerant Military Networks    16--26
                   Jian Tan and   
                     Swapna and   
                         Shroff   Retransmission Delays With Bounded
                                  Packets: Power-Law Body and Exponential
                                  Tail . . . . . . . . . . . . . . . . . . 27--38
                 Eyal Zohar and   
               Israel Cidon and   
                   Osnat Mokryn   PACK: Prediction-Based Cloud Bandwidth
                                  and Cost Reduction System  . . . . . . . 39--51
                    Yan Cai and   
               Xiaolin Wang and   
                 Weibo Gong and   
                    Don Towsley   A Study on the Performance of a
                                  Three-Stage Load-Balancing Switch  . . . 52--65
               Jinbei Zhang and   
                   Luoyi Fu and   
                   Xinbing Wang   Asymptotic Analysis on Secrecy Capacity
                                  in Large-Scale Wireless Networks . . . . 66--79
           Md. Forkan Uddin and   
        Catherine Rosenberg and   
              Weihua Zhuang and   
             Patrick Mitran and   
                   Andre Girard   Joint Routing and Medium Access Control
                                  in Fixed Random Access Wireless Multihop
                                  Networks . . . . . . . . . . . . . . . . 80--93
            Chad R. Meiners and   
              Jignesh Patel and   
                Eric Norige and   
                Alex X. Liu and   
                     Eric Torng   Fast Regular Expression Matching Using
                                  Small TCAM . . . . . . . . . . . . . . . 94--109
             Raffaele Bolla and   
            Roberto Bruschi and   
         Alessandro Carrega and   
                  Franco Davoli   Green Networking With Packet Processing
                                  Engines: Modeling and Optimization . . . 110--123
                    Wei Ren and   
                  Qing Zhao and   
                Ananthram Swami   Temporal Traffic Dynamics Improve the
                                  Connectivity of Ad Hoc Cognitive Radio
                                  Networks . . . . . . . . . . . . . . . . 124--136
               Supratim Deb and   
       Pantelis Monogioudis and   
              Jerzy Miernik and   
               James P. Seymour   Algorithms for Enhanced Inter-Cell
                                  Interference Coordination (eICIC) in LTE
                                  HetNets  . . . . . . . . . . . . . . . . 137--150
         Srikanth Hariharan and   
                 Ness B. Shroff   On Sample-Path Optimal Dynamic
                                  Scheduling for Sum-Queue Minimization in
                                  Forests  . . . . . . . . . . . . . . . . 151--164
          Marcin Bienkowski and   
              Anja Feldmann and   
          Johannes Grassler and   
          Gregor Schaffrath and   
                  Stefan Schmid   The Wide-Area Virtual Service Migration
                                  Problem: a Competitive Analysis Approach 165--178
                Onur Turkcu and   
             Suresh Subramaniam   Optimal Wavebanding in WDM Ring Networks 179--190
                     Wei Li and   
             Shengling Wang and   
                   Yong Cui and   
              Xiuzhen Cheng and   
                    Ran Xin and   
        Mznah A. Al-Rodhaan and   
            Abdullah Al-Dhelaan   AP Association for Proportional Fairness
                                  in Multirate WLANs . . . . . . . . . . . 191--202
           Leonardo Goratti and   
                 Ece Yaprak and   
            Stefano Savazzi and   
           Carlos Pomalaza-Raez   An Urn Occupancy Approach for Modeling
                                  the Energy Consumption of Distributed
                                  Beaconing  . . . . . . . . . . . . . . . 203--216
            Vinod Ramaswamy and   
               Vinith Reddy and   
        Srinivas Shakkottai and   
             Alex Sprintson and   
               Natarajan Gautam   Multipath Wireless Network Coding: an
                                  Augmented Potential Game Perspective . . 217--229
         Christian Esposito and   
             Marco Platania and   
                Roberto Beraldi   Reliable and Timely Event Notification
                                  for Publish/Subscribe Services Over the
                                  Internet . . . . . . . . . . . . . . . . 230--243
           Nazanin Magharei and   
                Reza Rejaie and   
                Ivica Rimac and   
                Volker Hilt and   
                 Markus Hofmann   ISP-Friendly Live P2P Streaming  . . . . 244--256
        Mihalis G. Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Max-Weight Scheduling in Queueing
                                  Networks With Heavy-Tailed Traffic . . . 257--270
              Eric Anderson and   
             Caleb Phillips and   
             Douglas Sicker and   
                  Dirk Grunwald   Optimization Decomposition for
                                  Scheduling and System Configuration in
                                  Wireless Networks  . . . . . . . . . . . 271--284
               Shurui Huang and   
             Aditya Ramamoorthy   On the Multiple-Unicast Capacity of
                                  $3$-Source, $3$-Terminal Directed
                                  Acyclic Networks . . . . . . . . . . . . 285--299
              Francois Clad and   
            Pascal Merindol and   
       Jean-Jacques Pansiot and   
            Pierre Francois and   
            Olivier Bonaventure   Graceful Convergence in Link-State IP
                                  Networks: a Lightweight Algorithm
                                  Ensuring Minimal Operational Impact  . . 300--312
          Bernardetta Addis and   
             Antonio Capone and   
           Giuliana Carello and   
            Luca G. Gianoli and   
                 Brunilde Sanso   Energy Management Through Optimized
                                  Routing and Device Powering for Greener
                                  Communication Networks . . . . . . . . . 313--325
              Junchen Jiang and   
                 Vyas Sekar and   
                      Hui Zhang   Improving Fairness, Efficiency, and
                                  Stability in HTTP-Based Adaptive Video
                                  Streaming With Festive . . . . . . . . . 326--340

IEEE\slash ACM Transactions on Networking
Volume 22, Number 2, April, 2014

     Andrés Ferragut and   
              Fernando Paganini   Network resource allocation for users
                                  with multiple connections: fairness and
                                  stability  . . . . . . . . . . . . . . . 349--362
              Rafael Laufer and   
        Theodoros Salonidis and   
            Henrik Lundgren and   
              Pascal Le Guyadec   A cross-layer backpressure architecture
                                  for wireless multihop networks . . . . . 363--376
                Faisal Khan and   
            Nicholas Hosein and   
              Soheil Ghiasi and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Streaming solutions for fine-grained
                                  network traffic measurements and
                                  analysis . . . . . . . . . . . . . . . . 377--390
              Nejc Skoberne and   
               Olaf Maennel and   
              Iain Phillips and   
                 Randy Bush and   
                   Jan Zorz and   
                 Mojca Ciglaric   IPv4 address sharing mechanism
                                  classification and tradeoff analysis . . 391--404
                 Amir Nahir and   
                 Ariel Orda and   
                     Ari Freund   Topology design of communication
                                  networks: a game-theoretic perspective   405--414
          Anat Bremler-Barr and   
                  David Hay and   
                    Yaron Koral   CompactDFA: Scalable pattern matching
                                  using longest prefix match solutions . . 415--428
             Mohit Chamania and   
                   Admela Jukan   A comparative analysis of the effects of
                                  dynamic optical circuit provisioning on
                                  IP routing . . . . . . . . . . . . . . . 429--442
                Hyesook Lim and   
                   Nara Lee and   
                Geumdan Jin and   
                Jungwon Lee and   
               Youngju Choi and   
                  Changhoon Yim   Boundary cutting for packet
                                  classification . . . . . . . . . . . . . 443--456
            Vinod Ramaswamy and   
          Diganto Choudhury and   
            Srinivas Shakkottai   Which protocol? Mutual interaction of
                                  heterogeneous congestion controllers . . 457--469
               Guoliang Xue and   
               Ravi Gottapu and   
                    Xi Fang and   
                 Dejun Yang and   
       Krishnaiyan Thulasiraman   A polynomial-time algorithm for
                                  computing disjoint lightpath pairs in
                                  minimum isolated-failure-immune WDM
                                  optical networks . . . . . . . . . . . . 470--483
           Ralf Lübben and   
              Markus Fidler and   
            Jörg Liebeherr   Stochastic bandwidth estimation in
                                  networks with random service . . . . . . 484--497
                   Kai Chen and   
               Ankit Singla and   
                 Atul Singh and   
       Kishore Ramachandran and   
                     Lei Xu and   
              Yueping Zhang and   
                  Xitao Wen and   
                       Yan Chen   OSA: an optical switching architecture
                                  for data center networks with
                                  unprecedented flexibility  . . . . . . . 498--511
           Vojislav Gaji\'c and   
              Jianwei Huang and   
                  Bixio Rimoldi   Competition of wireless providers for
                                  atomic users . . . . . . . . . . . . . . 512--525
              Luca De Cicco and   
                Saverio Mascolo   An adaptive video streaming control
                                  system: modeling, validation, and
                                  performance evaluation . . . . . . . . . 526--539
                  Franck Le and   
João Luís Sobrinho   Interconnecting routing instances  . . . 540--553
                Hongyi Zeng and   
            Peyman Kazemian and   
            George Varghese and   
                   Nick McKeown   Automatic test packet generation . . . . 554--566
                    Feng Li and   
                  Chi Zhang and   
                    Jun Luo and   
               Shi-Qing Xin and   
                        Ying He   LBDP: localized boundary detection and
                                  parametrization for $3$-D sensor
                                  networks . . . . . . . . . . . . . . . . 567--579
          Veeraruna Kavitha and   
               Eitan Altman and   
               R. El-Azouzi and   
              Rajesh Sundaresan   Fair scheduling in cellular systems in
                                  the presence of noncooperative mobiles   580--594
         Elliot Anshelevich and   
             Bugra Caskurlu and   
                Koushik Kar and   
                     Hang Zhang   Capacity allocation games for
                                  network-coded multicast streaming  . . . 595--607
               Qingjun Xiao and   
                   Bin Xiao and   
                     Kai Bu and   
                   Jiannong Cao   Iterative localization of wireless
                                  sensor networks: an accurate and robust
                                  approach . . . . . . . . . . . . . . . . 608--621
                  Yixuan Li and   
                 Qiuyu Peng and   
                   Xinbing Wang   Multicast capacity with max-min fairness
                                  for heterogeneous networks . . . . . . . 622--635
                 Rami Cohen and   
                      Danny Raz   Cost-effective resource allocation of
                                  overlay routing relay nodes  . . . . . . 636--646
            Patrick Loiseau and   
            Galina Schwartz and   
             John Musacchio and   
               Saurabh Amin and   
              S. Shankar Sastry   Incentive mechanisms for Internet
                                  congestion management: fixed-budget
                                  rebate versus time-of-day pricing  . . . 647--661
               Changhee Joo and   
                 Ness B. Shroff   On the delay performance of in-network
                                  aggregation in lossy wireless sensor
                                  networks . . . . . . . . . . . . . . . . 662--673
               Sem C. Borst and   
        Mihalis G. Markakis and   
                    Iraj Saniee   Nonconcave utility maximization in
                                  locally coupled systems, with
                                  applications to wireless and wireline
                                  networks . . . . . . . . . . . . . . . . 674--687

IEEE\slash ACM Transactions on Networking
Volume 22, Number 3, June, 2014

      Mukundan Venkataraman and   
              Mainak Chatterjee   Effects of Internet path selection on
                                  video-QoE: analysis and improvements . . 689--702
                  Shuqin Li and   
                  Jianwei Huang   Price differentiation for communication
                                  networks . . . . . . . . . . . . . . . . 703--716
             Shaoquan Zhang and   
                  Ziyu Shao and   
               Minghua Chen and   
                    Libin Jiang   Optimal distributed P2P streaming under
                                  node degree bounds . . . . . . . . . . . 717--730
              Jeong-Woo Cho and   
                        Yung Yi   On the payoff mechanisms in
                                  peer-assisted services with multiple
                                  content providers: rationality and
                                  fairness . . . . . . . . . . . . . . . . 731--744
          Olga Goussevskaia and   
Magnús M. Halldórsson and   
              Roger Wattenhofer   Algorithms for wireless capacity . . . . 745--755
     Karthikeyan Sundaresan and   
             Sampath Rangarajan   Cooperation versus multiplexing:
                                  multicast scheduling algorithms for
                                  OFDMA relay networks . . . . . . . . . . 756--769
        Hisham M. Almasaeid and   
                 Ahmed E. Kamal   Exploiting multichannel diversity for
                                  cooperative multicast in cognitive radio
                                  mesh networks  . . . . . . . . . . . . . 770--783
    Dulanjalie C. Dhanapala and   
            Anura P. Jayasumana   Topology preserving maps: extracting
                                  layout maps of wireless sensor networks
                                  from virtual coordinates . . . . . . . . 784--797
               Jeff Seibert and   
              Sheila Becker and   
       Cristina Nita-Rotaru and   
                     Radu State   Newton: securing virtual coordinates by
                                  enforcing physical laws  . . . . . . . . 798--811
                    Ning Lu and   
                Tom H. Luan and   
                  Miao Wang and   
                Xuemin Shen and   
                        Fan Bai   Bounds of asymptotic performance limits
                                  of social-proximity vehicular networks   812--825
                    Yang Xu and   
               Chenguang Yu and   
               Jingjiang Li and   
                       Yong Liu   Video telephony for end-consumers:
                                  measurement study of Google+, iChat and
                                  Skype  . . . . . . . . . . . . . . . . . 826--839
    Chaitanya S. K. Vadrevu and   
                   Rui Wang and   
          Massimo Tornatore and   
          Charles U. Martel and   
            Biswanath Mukherjee   Degraded service provisioning in
                                  mixed-line-rate WDM backbone networks
                                  using multipath routing  . . . . . . . . 840--849
            Ahmad R. Dhaini and   
                 Pin-Han Ho and   
             Gangxiang Shen and   
                  Basem Shihada   Energy efficiency in TDMA-based
                                  next-generation passive optical access
                                  networks . . . . . . . . . . . . . . . . 850--863
              Navid Abedini and   
            Srinivas Shakkottai   Content caching and scheduling in
                                  wireless networks with elastic and
                                  inelastic traffic  . . . . . . . . . . . 864--874
      Addisu Tadesse Eshete and   
                   Yuming Jiang   On the transient behavior of CHOKe . . . 875--888
                Yifan Zhang and   
                   Gexin Yu and   
                     Qun Li and   
               Haodong Wang and   
                Xiaojun Zhu and   
                  Baosheng Wang   Channel-hopping-based communication
                                  rendezvous in cognitive radio networks   889--902
                    Hui Lin and   
               Halit Üster   Exact and heuristic algorithms for
                                  data-gathering cluster-based wireless
                                  sensor network design problem  . . . . . 903--916
       Georgios Smaragdakis and   
         Nikolaos Laoutaris and   
     Konstantinos Oikonomou and   
        Ioannis Stavrakakis and   
                 Azer Bestavros   Distributed server migration for
                                  scalable Internet service deployment . . 917--930
                    Kuai Xu and   
                  Feng Wang and   
                         Lin Gu   Behavior analysis of Internet traffic
                                  via bipartite graphs and one-mode
                                  projections  . . . . . . . . . . . . . . 931--942
         Michael Butkiewicz and   
       Harsha V. Madhyastha and   
                     Vyas Sekar   Characterizing Web page complexity and
                                  its impact . . . . . . . . . . . . . . . 943--956
                 Layong Luo and   
                Gaogang Xie and   
                 Yingke Xie and   
              Laurent Mathy and   
         Kavé Salamatian   A hybrid hardware architecture for
                                  high-speed IP lookups and fast route
                                  updates  . . . . . . . . . . . . . . . . 957--969
               Chengchen Hu and   
                    Bin Liu and   
                Hongbo Zhao and   
                   Kai Chen and   
                   Yan Chen and   
                   Yu Cheng and   
                         Hao Wu   Discount counting for fast flow
                                  statistics on flow size and flow volume  970--981
                    Yang Xu and   
                 Zhaobo Liu and   
             Zhuoyuan Zhang and   
               H. Jonathan Chao   High-throughput and memory-efficient
                                  multimatch packet classification based
                                  on distributed and pipelined hash tables 982--995
             Wouter Minnebo and   
                Benny Van Houdt   A fair comparison of pull and push
                                  strategies in large distributed networks 996--1006
            Paul T. Congdon and   
          Prasant Mohapatra and   
            Matthew Farrens and   
               Venkatesh Akella   Simultaneously reducing latency and
                                  power consumption in OpenFlow switches   1007--1020

IEEE\slash ACM Transactions on Networking
Volume 22, Number 4, August, 2014

         Ítalo Cunha and   
            Renata Teixeira and   
              Darryl Veitch and   
                Christophe Diot   DTRACK: a system to predict and track
                                  Internet path changes  . . . . . . . . . 1025--1038
      Andrés Altieri and   
          Leonardo Rey Vega and   
           Pablo Piantanida and   
             Cecilia G. Galarza   Analysis of a cooperative strategy for a
                                  large decentralized wireless network . . 1039--1051
              Hyang-Won Lee and   
                   Kayi Lee and   
                  Eytan Modiano   Maximizing reliability in WDM networks
                                  through lightpath routing  . . . . . . . 1052--1066
      János Tapolcai and   
                 Pin-Han Ho and   
      Péter Babarczi and   
            Lajos Rónyai   On signaling-free failure dependent
                                  restoration in all-optical mesh networks 1067--1078
                    Wen Luo and   
               Shigang Chen and   
                   Yan Qiao and   
                         Tao Li   Missing-tag detection and energy-time
                                  tradeoff in large-scale RFID systems
                                  with unreliable channels . . . . . . . . 1079--1091
          Ori Rottenstreich and   
               Yossi Kanizo and   
                 Isaac Keslassy   The variable-increment counting Bloom
                                  filter . . . . . . . . . . . . . . . . . 1092--1105
               Yishuai Chen and   
              Baoxian Zhang and   
              Changjia Chen and   
                  Dah Ming Chiu   Performance modeling and evaluation of
                                  peer-to-peer live streaming systems
                                  under flash crowds . . . . . . . . . . . 1106--1120
        Hamed Mohsenian-Rad and   
              Jianwei Huang and   
         Vincent W. S. Wong and   
                 Robert Schober   Repeated intersession network coding
                                  games: efficiency and min-max bargaining
                                  solution . . . . . . . . . . . . . . . . 1121--1135
               Myungjin Lee and   
            Sharon Goldberg and   
        Ramana Rao Kompella and   
                George Varghese   FineComb: measuring microscopic latency
                                  and loss in the presence of reordering   1136--1149
               Shizhen Zhao and   
                   Xinbing Wang   Node density and delay in large-scale
                                  wireless networks with unreliable links  1150--1163
                    Hao Yue and   
                  Chi Zhang and   
                   Miao Pan and   
               Yuguang Fang and   
                   Shigang Chen   Unknown-target information collection in
                                  sensor-enabled RFID systems  . . . . . . 1164--1175
              Frank Aurzada and   
     Martin Lévesque and   
               Martin Maier and   
               Martin Reisslein   FiWi access networks based on
                                  next-generation PON and gigabit-class
                                  WLAN technologies: a capacity and delay
                                  analysis . . . . . . . . . . . . . . . . 1176--1189
            Shang-Pin Sheng and   
                    Mingyan Liu   Profit incentive in trading nonexclusive
                                  access on a secondary spectrum market
                                  through contract design  . . . . . . . . 1190--1203
              Jin-Ghoo Choi and   
               Changhee Joo and   
              Junshan Zhang and   
                 Ness B. Shroff   Distributed link scheduling under SINR
                                  model in multihop wireless networks  . . 1204--1217
                  Xin Zhang and   
                 Fanfu Zhou and   
                  Xinyu Zhu and   
                Haiyang Sun and   
              Adrian Perrig and   
    Athanasios V. Vasilakos and   
                   Haibing Guan   DFL: secure and practical fault
                                  localization for datacenter networks . . 1218--1231
            Amir Houmansadr and   
             Negar Kiyavash and   
                 Nikita Borisov   Non-blind watermarking of network flows  1232--1244
                  Shuang Li and   
               Zizhan Zheng and   
                Eylem Ekici and   
                    Ness Shroff   Maximizing system throughput by
                                  cooperative sensing in cognitive radio
                                  networks . . . . . . . . . . . . . . . . 1245--1256
                Zvi Rosberg and   
                    Yu Peng and   
                    Jing Fu and   
                    Jun Guo and   
            Eric W. M. Wong and   
                 Moshe Zukerman   Insensitive job assignment with
                                  throughput and energy criteria for
                                  processor-sharing server farms . . . . . 1257--1270
                   Wei Dong and   
           Swati Rallapalli and   
               Rittwik Jana and   
                   Lili Qiu and   
         K. K. Ramakrishnan and   
               Leo Razoumov and   
                  Yin Zhang and   
                    Tae Won Cho   iDEAL: incentivized dynamic cellular
                                  offloading via auctions  . . . . . . . . 1271--1284
                   Jin Teng and   
               Boying Zhang and   
                  Junda Zhu and   
                 Xinfeng Li and   
                  Dong Xuan and   
                  Yuan F. Zheng   EV-Loc: integrating electronic and
                                  visual signals for accurate localization 1285--1296
            Hulya Seferoglu and   
             Athina Markopoulou   Network coding-aware queue management
                                  for TCP flows over coded wireless
                                  networks . . . . . . . . . . . . . . . . 1297--1310
                  Peng Yang and   
                  Juan Shao and   
                    Wen Luo and   
                  Lisong Xu and   
            Jitender Deogun and   
                        Ying Lu   TCP congestion avoidance algorithm
                                  identification . . . . . . . . . . . . . 1311--1324
               Shengbo Chen and   
               Prasun Sinha and   
             Ness B. Shroff and   
                   Changhee Joo   A simple asymptotically optimal joint
                                  energy allocation and routing scheme in
                                  rechargeable sensor networks . . . . . . 1325--1336
                  Yuan Shen and   
                 Wenhan Dai and   
                     Moe Z. Win   Power optimization for network
                                  localization . . . . . . . . . . . . . . 1337--1350
                   Liang Ma and   
                    Ting He and   
               Kin K. Leung and   
            Ananthram Swami and   
                    Don Towsley   Inferring link metrics from end-to-end
                                  path measurements: identifiability and
                                  monitor placement  . . . . . . . . . . . 1351--1368

IEEE\slash ACM Transactions on Networking
Volume 22, Number 5, October, 2014

            Abishek Gopalan and   
     Srinivasan Ramasubramanian   On the maximum number of linearly
                                  independent cycles and paths in a
                                  network  . . . . . . . . . . . . . . . . 1373--1388
                     Bo Han and   
                    Jian Li and   
             Aravind Srinivasan   Your friends have more friends than you
                                  do: identifying influential mobile users
                                  through random-walk sampling . . . . . . 1389--1400
             Chao-Chih Chen and   
                 Lihua Yuan and   
           Albert Greenberg and   
             Chen-Nee Chuah and   
              Prasant Mohapatra   Routing-as-a-service (RaaS): a framework
                                  for tenant-directed route control in
                                  data center  . . . . . . . . . . . . . . 1401--1414
             Ignacio Castro and   
            Rade Stanojevic and   
                Sergey Gorinsky   Using tuangou to reduce IP transit costs 1415--1428
           P. M. Van De Ven and   
  Augustus J. E. M. Janssen and   
       J. S. H. Van Leeuwaarden   Balancing exposed and hidden nodes in
                                  linear wireless networks . . . . . . . . 1429--1443
             Hasti Ahlehagh and   
                      Sujit Dey   Video-aware scheduling and caching in
                                  the radio access network . . . . . . . . 1444--1462
          Markku Antikainen and   
                Tuomas Aura and   
         Mikko Särelä   Denial-of-service attacks in
                                  Bloom-filter-based forwarding  . . . . . 1463--1476
                Shihuan Liu and   
                Eylem Ekici and   
                       Lei Ying   Scheduling in multihop wireless networks
                                  without back-pressure  . . . . . . . . . 1477--1488
                   Jin Xiao and   
                  Raouf Boutaba   Reconciling the overlay and underlay
                                  tussle . . . . . . . . . . . . . . . . . 1489--1502
                     Dan Li and   
                Hongze Zhao and   
                 Mingwei Xu and   
                    Xiaoming Fu   Revisiting the design of mega data
                                  centers: considering heterogeneity among
                                  containers . . . . . . . . . . . . . . . 1503--1515
            Vinod Muthusamy and   
             Hans-Arno Jacobsen   Infrastructure-free content-based
                                  publish/subscribe  . . . . . . . . . . . 1516--1530
               Jongwon Yoon and   
              Honghai Zhang and   
             Suman Banerjee and   
             Sampath Rangarajan   Video multicast with joint resource
                                  allocation and adaptive modulation and
                                  coding in 4G networks  . . . . . . . . . 1531--1544
                  Kang Chen and   
                   Haiying Shen   SMART: utilizing distributed social map
                                  for lightweight routing in
                                  delay-tolerant networks  . . . . . . . . 1545--1558
            Van Minh Nguyen and   
            Chung Shue Chen and   
                 Laurent Thomas   A unified stochastic model of handover
                                  measurement in mobile networks . . . . . 1559--1576
                  Stepan Kucera   Enabling co-channel small-cell
                                  deployments in SINR-constraint networks
                                  by distributed monitoring of normalized
                                  network capacity . . . . . . . . . . . . 1577--1590
             Chris Develder and   
                Jens Buysse and   
                Bart Dhoedt and   
               Brigitte Jaumard   Joint dimensioning of server and network
                                  infrastructure for resilient optical
                                  grids/clouds . . . . . . . . . . . . . . 1591--1606
                     Sen Su and   
             Zhongbao Zhang and   
                Alex X. Liu and   
                Xiang Cheng and   
                 Yiwen Wang and   
                   Xinchao Zhao   Energy-aware virtual network embedding   1607--1620
                 Rahul Vaze and   
                Rachit Garg and   
                 Neetish Pathak   Dynamic power allocation for maximizing
                                  throughput in energy-harvesting
                                  communication system . . . . . . . . . . 1621--1630
                     I-Hong Hou   Scheduling heterogeneous real-time
                                  traffic over fading wireless channels    1631--1644
         Claudio Cicconetti and   
            Luciano Lenzini and   
                Andrea Lodi and   
           Silvano Martello and   
              Enzo Mingozzi and   
                 Michele Monaci   Efficient two-dimensional data
                                  allocation in IEEE 802.16 OFDMA  . . . . 1645--1658
                  Lei Zhang and   
                   Dongning Guo   Virtual full duplex wireless
                                  broadcasting via compressed sensing  . . 1659--1671
                    Hao Han and   
                 Yunxin Liu and   
                Guobin Shen and   
            Yongguang Zhang and   
                     Qun Li and   
                    Chiu C. Tan   Design, realization, and evaluation of
                                  DozyAP for power-efficient Wi-Fi
                                  tethering  . . . . . . . . . . . . . . . 1672--1685
       Soroush Jahromizadeh and   
              Veselin Rakocevic   Joint rate control and scheduling for
                                  providing bounded delay with high
                                  efficiency in multihop wireless networks 1686--1698

IEEE\slash ACM Transactions on Networking
Volume 22, Number 6, December, 2014

              Jignesh Patel and   
                Alex X. Liu and   
                     Eric Torng   Bypassing space explosion in high-speed
                                  regular expression matching  . . . . . . 1701--1714
                     Amy Fu and   
           Parastoo Sadeghi and   
           Muriel Médard   Dynamic rate adaptation for improved
                                  throughput and delay in wireless network
                                  coded broadcast  . . . . . . . . . . . . 1715--1728
       Cristiano Tapparello and   
            Osvaldo Simeone and   
                  Michele Rossi   Dynamic compression-transmission for
                                  energy-harvesting multihop networks with
                                  correlated sources . . . . . . . . . . . 1729--1741
            Masoud Akhoondi and   
                  Curtis Yu and   
           Harsha V. Madhyastha   LASTor: a low-latency AS-aware Tor
                                  client . . . . . . . . . . . . . . . . . 1742--1755
            Sastry Kompella and   
              Gam D. Nguyen and   
                Clement Kam and   
     Jeffrey E. Wieselthier and   
             Anthony Ephremides   Cooperation in cognitive underlay
                                  networks: stable throughput tradeoffs    1756--1768
              Chiara Orsini and   
             Enrico Gregori and   
            Luciano Lenzini and   
                Dmitri Krioukov   Evolution of the Internet $k$-dense
                                  structure  . . . . . . . . . . . . . . . 1769--1780
               Shannon Chen and   
                Cing-Yu Chu and   
                Su-Ling Yeh and   
                Hao-Hua Chu and   
                    Polly Huang   Modeling the QoE of rate changes in
                                  Skype/SILK VoIP calls  . . . . . . . . . 1781--1793
           Kostas Stamatiou and   
                 Martin Haenggi   Delay characterization of multihop
                                  transmission in a Poisson field of
                                  interference . . . . . . . . . . . . . . 1794--1807
            Somayeh Sojoudi and   
              Steven H. Low and   
                  John C. Doyle   Buffering dynamics and stability of
                                  Internet congestion controllers  . . . . 1808--1818
                 I-Hong Hou and   
                   Piyush Gupta   Proportionally fair distributed resource
                                  allocation in multiband wireless systems 1819--1830
          Douglas M. Blough and   
                Paolo Santi and   
               Ramya Srinivasan   On the feasibility of unilateral
                                  interference cancellation in MIMO
                                  networks . . . . . . . . . . . . . . . . 1831--1844
        Eugenio Magistretti and   
              Omer Gurewitz and   
             Edward W. Knightly   802.11ec: collision avoidance without
                                  control messages . . . . . . . . . . . . 1845--1858
                 Sungsu Lim and   
                Kyomin Jung and   
                Matthew Andrews   Stability of the max-weight protocol in
                                  adversarial wireless networks  . . . . . 1859--1872
          Mahmoud Al-Ayyoub and   
                 Himanshu Gupta   Truthful spectrum auctions with
                                  approximate social-welfare or revenue    1873--1885
             Yuanqing Zheng and   
                          Mo Li   Towards more efficient cardinality
                                  estimation for large-scale RFID systems  1886--1896
               Changbin Liu and   
             Ricardo Correa and   
                Harjot Gill and   
               Tanveer Gill and   
                Xiaozhou Li and   
       Shivkumar Muthukumar and   
                Taher Saeed and   
              Boon Thau Loo and   
                 Prithwish Basu   PUMA: policy-based unified multiradio
                                  architecture for agile mesh networking   1897--1910
                      Bo Ji and   
             Gagan R. Gupta and   
                Xiaojun Lin and   
                 Ness B. Shroff   Low-complexity scheduling policies for
                                  achieving throughput and asymptotic
                                  delay optimality in multichannel
                                  wireless networks  . . . . . . . . . . . 1911--1924
                      Qi Li and   
                 Mingwei Xu and   
                  Yuan Yang and   
                  Lixin Gao and   
                   Yong Cui and   
                    Jianping Wu   Safe and practical energy-efficient
                                  detour routing in IP networks  . . . . . 1925--1937
        Siva Theja Maguluri and   
                     R. Srikant   Scheduling jobs with unknown duration in
                                  clouds . . . . . . . . . . . . . . . . . 1938--1951
                   Wei Dong and   
                 Yunhao Liu and   
                    Yuan He and   
                   Tong Zhu and   
                      Chun Chen   Measurement and analysis on the packet
                                  delivery performance in a large-scale
                                  sensor network . . . . . . . . . . . . . 1952--1963
           Alberto Dainotti and   
         Claudio Squarcella and   
                 Emile Aben and   
         Kimberly C. Claffy and   
               Marco Chiesa and   
              Michele Russo and   
         Antonio Pescapé   Analysis of country-wide Internet
                                  outages caused by censorship . . . . . . 1964--1977
                 Hongyi Yao and   
               Danilo Silva and   
             Sidharth Jaggi and   
               Michael Langberg   Network codes resilient to jamming and
                                  eavesdropping  . . . . . . . . . . . . . 1978--1987
                Shaxun Chen and   
                   Kai Zeng and   
              Prasant Mohapatra   Efficient data capturing for network
                                  forensics in cognitive radio networks    1988--2000
              Thang N. Dinh and   
              Huiyuan Zhang and   
            Dzung T. Nguyen and   
                     My T. Thai   Cost-effective viral marketing for
                                  time-critical campaigns in large-scale
                                  social networks  . . . . . . . . . . . . 2001--2011
             Guanfeng Liang and   
                  Ulas C. Kozat   Fast cloud: pushing the envelope on
                                  delay performance of cloud storage with
                                  coding . . . . . . . . . . . . . . . . . 2012--2025
          Maximilian Kriegleder   A correction to algorithm A2 in
                                  ``Asynchronous distributed averaging on
                                  communication networks'' . . . . . . . . 2026--2027


IEEE\slash ACM Transactions on Networking
Volume 23, Number 1, February, 2015

              Wanchun Jiang and   
               Fengyuan Ren and   
                     Chuang Lin   Phase plane analysis of quantized
                                  congestion notification for data center
                                  Ethernet . . . . . . . . . . . . . . . . 1--14
               Hongbo Jiang and   
                Tianlong Yu and   
                  Chen Tian and   
                  Guang Tan and   
                 Chonggang Wang   Connectivity-based segmentation in
                                  large-scale $2$-D/$3$-D sensor networks:
                                  algorithm and applications . . . . . . . 15--27
             Cataldo Basile and   
                   Antonio Lioy   Analysis of application-layer filtering
                                  policies with application to HTTP  . . . 28--41
            Marco Leogrande and   
               Fulvio Risso and   
                Luigi Ciminiera   Modeling complex packet filters with
                                  finite state automata  . . . . . . . . . 42--55
          Alberto Rabbachin and   
               Andrea Conti and   
                     Moe Z. Win   Wireless network intrinsic secrecy . . . 56--69
               Haiying Shen and   
                          Ze Li   A hierarchical account-aided reputation
                                  management system for MANETs . . . . . . 70--84
           Richard T. B. Ma and   
             John C. S. Lui and   
                   Vishal Misra   Evolution of the Internet economic
                                  ecosystem  . . . . . . . . . . . . . . . 85--98
 Güner D. Çelik and   
                  Eytan Modiano   Scheduling in networks with time-varying
                                  channels and reconfiguration delay . . . 99--113
               Reuven Cohen and   
                     Guy Grebla   Joint scheduling and fast cell selection
                                  in OFDMA wireless networks . . . . . . . 114--125
                  Yang Yang and   
                 Ness B. Shroff   Throughput of rateless codes over
                                  broadcast erasure channels . . . . . . . 126--137
               Gabi Nakibly and   
               Reuven Cohen and   
                   Liran Katzir   Optimizing data plane resources for
                                  multipath flows  . . . . . . . . . . . . 138--147
          Alessandro Checco and   
               Douglas J. Leith   Fair virtualization of 802.11 networks   148--160
            Fabio Martignon and   
              Stefano Paris and   
           Ilario Filippini and   
                   Lin Chen and   
                 Antonio Capone   Efficient and truthful bandwidth
                                  allocation in wireless mesh community
                                  networks . . . . . . . . . . . . . . . . 161--174
               Bahar Partov and   
           Douglas J. Leith and   
                 Rouzbeh Razavi   Utility fair optimization of antenna
                                  tilt angles in LTE networks  . . . . . . 175--185
               Jiliang Wang and   
                   Wei Dong and   
                Zhichao Cao and   
                     Yunhao Liu   On the delay performance in a
                                  large-scale wireless sensor network:
                                  measurement, analysis, and implications  186--197
    Fragkiskos Papadopoulos and   
        Constantinos Psomas and   
                Dmitri Krioukov   Network mapping by replaying hyperbolic
                                  growth . . . . . . . . . . . . . . . . . 198--211
                  Kang Chen and   
                   Haiying Shen   DTN-FLOW: inter-landmark data flow for
                                  high-throughput routing in DTNs  . . . . 212--226
         Stefano Vissicchio and   
             Luca Cittadini and   
           Giuseppe Di Battista   On iBGP routing policies . . . . . . . . 227--240
           Muhammad Shahzad and   
                    Alex X. Liu   Fast and accurate estimation of RFID
                                  tags . . . . . . . . . . . . . . . . . . 241--254
             Yuan-Cheng Lai and   
             Ling-Yen Hsiao and   
                   Bor-Shen Lin   Optimal slot assignment for binary
                                  tracking tree protocol in RFID tag
                                  identification . . . . . . . . . . . . . 255--268
          Karumbu Premkumar and   
               Xiaomin Chen and   
               Douglas J. Leith   Proportional fair coding for wireless
                                  mesh networks  . . . . . . . . . . . . . 269--281
        P. Brighten Godfrey and   
             Matthew Caesar and   
                  Ian Haken and   
               Yaron Singer and   
              Scott Shenker and   
                     Ion Stoica   Stabilizing route selection in BGP . . . 282--299
                Xinghua Sun and   
                        Lin Dai   Backoff design for IEEE 802.11 DCF
                                  networks: fundamental tradeoff and
                                  design criterion . . . . . . . . . . . . 300--316
    Didem Gözüpek and   
           Mordechai Shalom and   
              Fatih Alagöz   A graph-theoretic approach to scheduling
                                  in cognitive radio networks  . . . . . . 317--328

IEEE\slash ACM Transactions on Networking
Volume 23, Number 2, April, 2015

           Alberto Dainotti and   
              Alistair King and   
            Kimberly Claffy and   
          Ferdinando Papale and   
         Antonio Pescapé   Analysis of a ``/0'' stealth scan from a
                                  botnet . . . . . . . . . . . . . . . . . 341--354
            Carlee Joe-Wong and   
                 Soumya Sen and   
                     Sangtae Ha   Offering supplementary network
                                  technologies: adoption behavior and
                                  offloading benefits  . . . . . . . . . . 355--368
              Lieven Tytgat and   
                Opher Yaron and   
               Sofie Pollin and   
             Ingrid Moerman and   
                 Piet Demeester   Analysis and experimental verification
                                  of frequency-based interference
                                  avoidance mechanisms in IEEE 802.15.4    369--382
          Mukundan Madhavan and   
           Harish Ganapathy and   
            Malolan Chetlur and   
         Shivkumar Kalyanaraman   Adapting cellular networks to
                                  whitespaces spectrum . . . . . . . . . . 383--397
               Supratim Deb and   
           Pantelis Monogioudis   Learning-based uplink interference
                                  management in $4$G LTE cellular systems  398--411
        George Papageorgiou and   
           Shailendra Singh and   
  Srikanth V. Krishnamurthy and   
            Ramesh Govindan and   
                   Tom La Porta   A distortion-resistant routing framework
                                  for video traffic in wireless multihop
                                  networks . . . . . . . . . . . . . . . . 412--425
               Reuven Cohen and   
                     Guy Grebla   Efficient allocation of periodic
                                  feedback channels in broadband wireless
                                  networks . . . . . . . . . . . . . . . . 426--436
                Liguang Xie and   
                     Yi Shi and   
              Y. Thomas Hou and   
                Wenjing Lou and   
           Hanif D. Sherali and   
               Scott F. Midkiff   Multi-node wireless energy charging in
                                  sensor networks  . . . . . . . . . . . . 437--450
           Chih-Chuan Cheng and   
                  Pi-Cheng Hsiu   Extend your journey: considering signal
                                  strength and fluctuation in
                                  location-based applications  . . . . . . 451--464
                   Yong Cui and   
                  Lian Wang and   
                   Xin Wang and   
                Hongyi Wang and   
                    Yining Wang   FMTCP: a fountain code-based multipath
                                  transmission control protocol  . . . . . 465--478
               Sanaz Barghi and   
               Hamid Jafarkhani   Exploiting asynchronous
                                  amplify-and-forward relays to enhance
                                  the performance of IEEE 802.11 networks  479--490
                    Tong Ye and   
                Tony T. Lee and   
                    Weisheng Hu   AWG-based non-blocking Clos networks . . 491--504
               Po-Kai Huang and   
                    Xiaojun Lin   Achieving optimal throughput utility and
                                  low delay with CSMA-like algorithms: a
                                  virtual multichannel approach  . . . . . 505--518
                Dongyue Xue and   
            Robert Murawski and   
                    Eylem Ekici   Capacity achieving distributed
                                  scheduling with finite buffers . . . . . 519--532
               Tung-Wei Kuo and   
          Kate Ching-Ju Lin and   
                  Ming-Jer Tsai   Maximizing submodular set function with
                                  connectivity constraint: theory and
                                  application to networks  . . . . . . . . 533--546
              Lorenzo Rossi and   
           Jacob Chakareski and   
            Pascal Frossard and   
             Stefania Colonnese   A Poisson hidden Markov model for
                                  multiview video traffic  . . . . . . . . 547--558
               Armin Banaei and   
          Daren B. H. Cline and   
      Costas N. Georghiades and   
                   Shuguang Cui   On asymptotic statistics for geometric
                                  routing schemes in wireless ad hoc
                                  networks . . . . . . . . . . . . . . . . 559--573
    Sucha Supittayapornpong and   
               Michael J. Neely   Quality of information maximization for
                                  wireless networks via a fully separable
                                  quadratic policy . . . . . . . . . . . . 574--586
               Andreea Picu and   
       Thrasyvoulos Spyropoulos   DTN-meteo: forecasting the performance
                                  of DTN protocols under heterogeneous
                                  mobility . . . . . . . . . . . . . . . . 587--602
                  Zhenyu Wu and   
                   Zhang Xu and   
                   Haining Wang   Whispers in the hyper-space:
                                  high-bandwidth and reliable covert
                                  channel attacks inside the cloud . . . . 603--614
               Chih-Ping Li and   
                  Eytan Modiano   Receiver-based flow control for networks
                                  in overload  . . . . . . . . . . . . . . 616--630
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   On the optimal convergence speed of
                                  wireless scheduling for fair resource
                                  allocation . . . . . . . . . . . . . . . 631--643
                  Qiang Liu and   
                   Xin Wang and   
            Nageswara S. V. Rao   Fusion of state estimates over long-haul
                                  sensor networks with random loss and
                                  delay  . . . . . . . . . . . . . . . . . 644--656
                Zhenhua Liu and   
               Minghong Lin and   
               Adam Wierman and   
                 Steven Low and   
           Lachlan L. H. Andrew   Greening geographical load balancing . . 657--671
             Daniele Riboni and   
            Antonio Villani and   
            Domenico Vitali and   
            Claudio Bettini and   
               Luigi V. Mancini   Obfuscation of sensitive data for
                                  incremental release of network flows . . 672--686

IEEE\slash ACM Transactions on Networking
Volume 23, Number 3, June, 2015

                      Yu Wu and   
                   Chuan Wu and   
                      Bo Li and   
              Linquan Zhang and   
                Zongpeng Li and   
              Francis C. M. Lau   Scaling social media applications into
                                  geo-distributed clouds . . . . . . . . . 689--702
          Ori Rottenstreich and   
                 Isaac Keslassy   The Bloom paradox: when not to use a
                                  Bloom filter . . . . . . . . . . . . . . 703--716
           Christoph Lenzen and   
             Philipp Sommer and   
              Roger Wattenhofer   PulseSync: an efficient and scalable
                                  clock synchronization protocol . . . . . 717--727
                     I-Hong Hou   Broadcasting delay-constrained traffic
                                  over unreliable wireless links with
                                  network coding . . . . . . . . . . . . . 728--740
           Stefano Traverso and   
                 Luca Abeni and   
               Robert Birke and   
               Csaba Kiraly and   
            Emilio Leonardi and   
            Renato Lo Cigno and   
                   Marco Mellia   Neighborhood filtering strategies for
                                  overlay construction in P2P-TV systems:
                                  design and experimental comparison . . . 741--754
               Zhongmei Yao and   
          Daren B. H. Cline and   
                Dmitri Loguinov   Unstructured P2P link lifetimes redux    755--767
               Zizhan Zheng and   
                  Zhixue Lu and   
               Prasun Sinha and   
                  Santosh Kumar   Ensuring predictable contact opportunity
                                  for scalable vehicular Internet access
                                  on the go  . . . . . . . . . . . . . . . 768--781
                 Jihwan Kim and   
              Hyang-Won Lee and   
                     Song Chong   CSMA-based robust AP throughput
                                  guarantee under user distribution
                                  uncertainty  . . . . . . . . . . . . . . 782--795
           Muhammad Shahzad and   
                    Alex X. Liu   Probabilistic optimal tree hopping for
                                  RFID identification  . . . . . . . . . . 796--809
                 Yanjun Yao and   
                   Qing Cao and   
        Athanasios V. Vasilakos   EDAL: an energy-efficient, delay-aware,
                                  and lifetime-balancing data collection
                                  protocol for heterogeneous wireless
                                  sensor networks  . . . . . . . . . . . . 810--823
                   Xia Zhou and   
              Zengbin Zhang and   
                  Gang Wang and   
                Xiaoxiao Yu and   
                Ben Y. Zhao and   
                   Haitao Zheng   Practical conflict graphs in the wild    824--835
          George Athanasiou and   
Pradeep Chathuranga Weeraddana and   
            Carlo Fischione and   
             Leandros Tassiulas   Optimizing client association for load
                                  balancing and fairness in
                                  millimeter-wave wireless networks  . . . 836--850
             Corentin Briat and   
           Emre Altug Yavuz and   
    Håkan Hjalmarsson and   
      Karl Henrik Johansson and   
        Ulf T. Jönsson and   
            Gunnar Karlsson and   
                Henrik Sandberg   The conservation of information, towards
                                  an axiomatized modular modeling approach
                                  to congestion control  . . . . . . . . . 851--865
            Maricica Nistor and   
           Daniel E. Lucani and   
             João Barros   Hardware abstraction and protocol
                                  optimization for coded sensor networks   866--879
                      Bo Ji and   
             Gagan R. Gupta and   
                Manu Sharma and   
                Xiaojun Lin and   
                 Ness B. Shroff   Achieving optimal throughput and
                                  near-optimal asymptotic delay
                                  performance in multichannel wireless
                                  networks with low complexity: a
                                  practical greedy scheduling policy . . . 880--893
                     Hu Jin and   
             Bang Chul Jung and   
             Victor C. M. Leung   Fundamental limits of CDF-based
                                  scheduling: throughput, fairness, and
                                  feedback overhead  . . . . . . . . . . . 894--907
         Stojan Trajanovski and   
        Fernando A. Kuipers and   
          Aleksandar Ili\'c and   
              Jon Crowcroft and   
               Piet Van Mieghem   Finding critical regions and
                                  region-disjoint paths in a network . . . 908--921
                Zhichao Cao and   
                    Yuan He and   
                   Qiang Ma and   
                     Yunhao Liu   $ L^2 $: lazy forwarding in
                                  low-duty-cycle wireless sensor network   922--930
        Leonidas Georgiadis and   
        Georgios S. Paschos and   
                Lavy Libman and   
             Leandros Tassiulas   Minimal evacuation times and stability   931--945
                   Fei Chen and   
      Bruhadeshwar Bezawada and   
                    Alex X. Liu   Privacy-preserving quantification of
                                  cross-domain network reachability  . . . 946--958
                 Yunbae Kim and   
                   Ganguk Hwang   Design and analysis of medium access
                                  protocol: throughput and short-term
                                  fairness perspective . . . . . . . . . . 959--972
        Kianoosh Mokhtarian and   
             Hans-Arno Jacobsen   Minimum-delay multicast algorithms for
                                  mesh overlays  . . . . . . . . . . . . . 973--986
               Haiying Shen and   
                  Yuhua Lin and   
                         Jin Li   A social-network-aided efficient
                                  peer-to-peer live streaming system . . . 987--1000
              Thang N. Dinh and   
                     My T. Thai   Network under joint node and link
                                  attacks: vulnerability assessment
                                  methods and analysis . . . . . . . . . . 1001--1011
            Abdallah Jarray and   
                 Ahmed Karmouch   Decomposition approaches for virtual
                                  network embedding with one-shot node and
                                  link mapping . . . . . . . . . . . . . . 1012--1025

IEEE\slash ACM Transactions on Networking
Volume 23, Number 4, August, 2015

    Mohammad Ali Maddah-Ali and   
                     Urs Niesen   Decentralized coded caching attains
                                  order-optimal memory-rate tradeoff . . . 1029--1040
                    Kai Han and   
                    Jun Luo and   
                  Liu Xiang and   
               Mingjun Xiao and   
                 Liusheng Huang   Achieving energy efficiency and
                                  reliability for data dissemination in
                                  duty-cycled WSNs . . . . . . . . . . . . 1041--1052
              Qingkai Liang and   
               Xinbing Wang and   
               Xiaohua Tian and   
                     Fan Wu and   
                     Qian Zhang   Two-dimensional route switching in
                                  cognitive radio networks: a
                                  game-theoretical framework . . . . . . . 1053--1066
               Ali Khanafer and   
            Murali Kodialam and   
       Krishna P. N. Puttaswamy   To rent or to buy in the presence of
                                  statistical information: the constrained
                                  ski-rental problem . . . . . . . . . . . 1067--1077
           Majid Khabbazian and   
          Stephane Durocher and   
       Alireza Haghnegahdar and   
                    Fabian Kuhn   Bounding interference in wireless ad hoc
                                  networks with nodes in random position   1078--1091
           Marcello Caleffi and   
            Ian F. Akyildiz and   
                    Luigi Paura   On the solution of the Steiner tree
                                  NP-hard problem via \bionamePhysarum
                                  BioNetwork . . . . . . . . . . . . . . . 1092--1106
               Joerg Widmer and   
             Andrea Capalbo and   
Antonio Fernández Anta and   
                  Albert Banchs   Efficient interlayer network codes for
                                  fair layered multicast streaming . . . . 1107--1120
        G. Enrico Santagati and   
            Tommaso Melodia and   
            Laura Galluccio and   
                 Sergio Palazzo   Medium access control and rate
                                  adaptation for ultrasonic intrabody
                                  sensor networks  . . . . . . . . . . . . 1121--1134
                 Yu-Sian Li and   
             Trang Minh Cao and   
              Shu-Ting Wang and   
                  Xin Huang and   
             Cheng-Hsin Hsu and   
                   Po-Ching Lin   A resource-constrained asymmetric
                                  redundancy elimination algorithm . . . . 1135--1148
                  Yang Yang and   
                   Miao Jin and   
                   Yao Zhao and   
                      Hongyi Wu   Distributed information storage and
                                  retrieval in $3$-D sensor networks with
                                  general topologies . . . . . . . . . . . 1149--1162
                Yipeng Zhou and   
               Tom Z. J. Fu and   
                  Dah Ming Chiu   A unifying model and analysis of P2P VoD
                                  replication and scheduling . . . . . . . 1163--1175
               Jianhang Gao and   
                  Qing Zhao and   
                Ananthram Swami   The thinnest path problem  . . . . . . . 1176--1189
                Hazem Gomaa and   
        Geoffrey G. Messier and   
                  Robert Davies   Hierarchical cache performance analysis
                                  under TTL-based consistency  . . . . . . 1190--1201
     Andres Garcia-Saavedra and   
          Balaji Rengarajan and   
              Pablo Serrano and   
           Daniel Camps-Mur and   
      Xavier Costa-Pérez   SOLOR: self-optimizing WLANs with
                                  legacy-compatible opportunistic relays   1202--1215
           Matthew Johnston and   
              Hyang-Won Lee and   
                  Eytan Modiano   A robust optimization approach to backup
                                  network design with random failures  . . 1216--1228
    Spyridon Antonakopoulos and   
             Yigal Bejerano and   
                  Pramod Koppol   Full protection made easy: the DisPath
                                  IP fast reroute scheme . . . . . . . . . 1229--1242
              Pablo Serrano and   
     Andres Garcia-Saavedra and   
           Giuseppe Bianchi and   
              Albert Banchs and   
                 Arturo Azcorra   Per-frame energy consumption in 802.11
                                  devices and its implication on modeling
                                  and design . . . . . . . . . . . . . . . 1243--1256
                  Jun Zhang and   
                  Xiao Chen and   
                 Yang Xiang and   
                Wanlei Zhou and   
                         Jie Wu   Robust network traffic classification    1257--1270
                     Fan Wu and   
               Qianyi Huang and   
                  Yixin Tao and   
                    Guihai Chen   Towards privacy preservation in
                                  strategy-proof spectrum auction
                                  mechanisms for noncooperative wireless
                                  networks . . . . . . . . . . . . . . . . 1271--1285
        Hisham M. Almasaeid and   
                 Ahmed E. Kamal   Receiver-based channel allocation in
                                  cognitive radio wireless mesh networks   1286--1299
          Matteo Dell'Amico and   
         Maurizio Filippone and   
           Pietro Michiardi and   
                   Yves Roudier   On user availability prediction and
                                  network applications . . . . . . . . . . 1300--1313
             Enrico Gregori and   
         Alessandro Improta and   
            Luciano Lenzini and   
              Lorenzo Rossi and   
                      Luca Sani   A novel methodology to address the
                                  Internet AS-level data incompleteness    1314--1327
                  Chao Yang and   
                   Scott Jordan   A novel coordinated connection access
                                  control and resource allocation
                                  framework for $4$G wireless networks . . 1328--1341
                   Yu Cheng and   
                 Hongkun Li and   
      Devu Manikantan Shila and   
                   Xianghui Cao   A systematic study of maximal scheduling
                                  algorithms in multiradio multichannel
                                  wireless networks  . . . . . . . . . . . 1342--1355
             Yuanqing Zheng and   
                          Mo Li   P-MTI: physical-layer missing tag
                                  identification via compressive sensing   1356--1366
                  Fan Zhang and   
                  Yewen Cao and   
                   Deqiang Wang   Comments and corrections: a note on
                                  ``Low-complexity distributed scheduling
                                  algorithms for wireless networks'' . . . 1367--1369

IEEE\slash ACM Transactions on Networking
Volume 23, Number 5, October, 2015

              Francois Clad and   
         Stefano Vissicchio and   
     Pascal Mérindol and   
            Pierre Francois and   
           Jean-Jacques Pansiot   Computing minimal update sequences for
                                  graceful router-wide reconfigurations    1373--1386
             Anne Bouillard and   
                  Giovanni Stea   Exact worst-case delay in
                                  FIFO-multiplexing feed-forward networks  1387--1400
       Sk Kajal Arefin Imon and   
                 Adnan Khan and   
         Mario Di Francesco and   
                   Sajal K. Das   Energy-efficient randomized switching
                                  for maximizing lifetime in tree-based
                                  wireless sensor networks . . . . . . . . 1401--1415
                    Yi-Sheng Su   Topology-transparent scheduling via the
                                  Chinese remainder theorem  . . . . . . . 1416--1429
                   Lei Yang and   
           Yalin E. Sagduyu and   
              Junshan Zhang and   
                    Jason H. Li   Deadline-aware scheduling with adaptive
                                  network coding for real-time traffic . . 1430--1443
              Barlas O\uguz and   
          Venkat Anantharam and   
                   Ilkka Norros   Stable distributed P2P protocols based
                                  on random peer sampling  . . . . . . . . 1444--1456
             Yunus Sarikaya and   
              Ozgur Ercetin and   
                Can Emre Koksal   Confidentiality-preserving control of
                                  uplink cellular wireless networks using
                                  hybrid ARQ . . . . . . . . . . . . . . . 1457--1470
                    Xu Chen and   
               Brian Proulx and   
               Xiaowen Gong and   
                  Junshan Zhang   Exploiting social ties for cooperative
                                  D$2$D communications: a mobile social
                                  networking case  . . . . . . . . . . . . 1471--1484
           Mina Yazdanpanah and   
                 Chadi Assi and   
               Samir Sebbah and   
                  Yousef Shayan   Does network coding combined with
                                  interference cancellation bring any gain
                                  to a wireless network? . . . . . . . . . 1485--1500
               Sergi Abadal and   
             Mario Iannazzo and   
           Mario Nemirovsky and   
   Albert Cabellos-Aparicio and   
                Heekwan Lee and   
          Eduard Alarcón   On the area and energy scalability of
                                  wireless network-on-chip: a model-based
                                  benchmarked design space exploration . . 1501--1513
                 Chenxi Qiu and   
               Haiying Shen and   
            Sohraab Soltani and   
                Karan Sapra and   
                  Hao Jiang and   
             Jason O. Hallstrom   CEDAR: a low-latency and distributed
                                  strategy for packet recovery in wireless
                                  networks . . . . . . . . . . . . . . . . 1514--1527
    Ioannis Ch. Paschalidis and   
               Fuzhuo Huang and   
                        Wei Lai   A message-passing algorithm for wireless
                                  network scheduling . . . . . . . . . . . 1528--1541
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   Throughput-optimal scheduling design
                                  with regular service guarantees in
                                  wireless networks  . . . . . . . . . . . 1542--1552
               Sameh Sorour and   
                Shahrokh Valaee   Completion delay minimization for
                                  instantly decodable network codes  . . . 1553--1567
               Timothy Wood and   
         K. K. Ramakrishnan and   
            Prashant Shenoy and   
      Jacobus Van Der Merwe and   
                Jinho Hwang and   
                  Guyue Liu and   
             Lucas Chaufournier   CloudNet: dynamic pooling of cloud
                                  resources by live WAN migration of
                                  virtual machines . . . . . . . . . . . . 1568--1583
            Sharayu Moharir and   
              Sanjay Shakkottai   Max weight versus back pressure: routing
                                  and scheduling in multichannel relay
                                  networks . . . . . . . . . . . . . . . . 1584--1598
            Ferhat Dikbiyik and   
          Massimo Tornatore and   
            Biswanath Mukherjee   Exploiting excess capacity, part II:
                                  differentiated services under traffic
                                  growth . . . . . . . . . . . . . . . . . 1599--1609
András Gulyás and   
Gábor Rétvári and   
    Zalán Heszberger and   
                 Rachit Agarwal   On the scalability of routing with
                                  policies . . . . . . . . . . . . . . . . 1610--1618
            Enrique Mallada and   
              Xiaoqiao Meng and   
                Michel Hack and   
                   Li Zhang and   
                        Ao Tang   Skewless network clock synchronization
                                  without discontinuity: convergence and
                                  performance  . . . . . . . . . . . . . . 1619--1633
           George Iosifidis and   
                    Lin Gao and   
              Jianwei Huang and   
             Leandros Tassiulas   A double-auction mechanism for mobile
                                  data-offloading markets  . . . . . . . . 1634--1647
                     Dan Li and   
                   Jing Zhu and   
                Jianping Wu and   
                Junjie Guan and   
                     Ying Zhang   Guaranteeing heterogeneous bandwidth
                                  demand in multitenant data center
                                  networks . . . . . . . . . . . . . . . . 1648--1660
                     Wei Du and   
               Yongjun Liao and   
                 Narisu Tao and   
              Pierre Geurts and   
                Xiaoming Fu and   
                      Guy Leduc   Rating network paths for locality-aware
                                  overlay construction and routing . . . . 1661--1673
                 Virag Shah and   
             Gustavo De Veciana   High-performance centralized content
                                  delivery infrastructure: models and
                                  asymptotics  . . . . . . . . . . . . . . 1674--1687
                    Tao Shu and   
              Yingying Chen and   
                       Jie Yang   Protecting multi-lateral localization
                                  privacy in pervasive environments  . . . 1688--1701
                   Dahai Xu and   
                Mung Chiang and   
               Jennifer Rexford   Corrections to ``Link-state routing with
                                  hop-by-hop forwarding can achieve
                                  optimal traffic engineering''  . . . . . 1702--1703


IEEE\slash ACM Transactions on Networking
Volume 24, Number 1, February, 2016

               Reza Abdolee and   
               Benoit Champagne   Diffusion LMS strategies in sensor
                                  networks with noisy input data . . . . . 3--14
           Nikolaos Chrysos and   
                 Lydia Chen and   
       Christoforos Kachris and   
              Manolis Katevenis   Discharging the network from its flow
                                  control headaches: packet drops and HOL
                                  blocking . . . . . . . . . . . . . . . . 15--28
         Emir Kavurmacioglu and   
             Murat Alanyali and   
              David Starobinski   Competition in private commons: price
                                  war or market sharing? . . . . . . . . . 29--42
                 Hongyu Gao and   
          Vinod Yegneswaran and   
                 Jian Jiang and   
                   Yan Chen and   
             Phillip Porras and   
              Shalini Ghosh and   
                    Haixin Duan   Reexamining DNS from a global recursive
                                  resolver perspective . . . . . . . . . . 43--57
                   Can Zhao and   
                Xiaojun Lin and   
                       Chuan Wu   The streaming capacity of sparsely
                                  connected P2P systems with distributed
                                  control  . . . . . . . . . . . . . . . . 58--71
               Xiaohan Kang and   
                 Weina Wang and   
 Juan José Jaramillo and   
                       Lei Ying   On the performance of
                                  largest-deficit-first for scheduling
                                  real-time traffic in wireless networks   72--84
               Chih-Yu Wang and   
                Chun-Han Ko and   
                Hung-Yu Wei and   
        Athanasios V. Vasilakos   A voting-based femtocell downlink
                                  cell-breathing control mechanism . . . . 85--98
                   Lei Jiao and   
                     Jun Li and   
                 Tianyin Xu and   
                     Wei Du and   
                    Xiaoming Fu   Optimizing cost for online social
                                  networks on geo-distributed clouds . . . 99--112
             Mohamed Kashef and   
             Anthony Ephremides   Optimal partial relaying for
                                  energy-harvesting wireless networks  . . 113--122
               Ted H. Szymanski   An ultra-low-latency guaranteed-rate
                                  Internet for cloud services  . . . . . . 123--136
    Eunice Adjarath Lemamou and   
          Philippe Galinier and   
             Steven Chamberland   A hybrid iterated local search algorithm
                                  for the global planning problem of
                                  survivable 4G wireless networks  . . . . 137--148
Gábor Rétvári and   
      János Tapolcai and   
       Attila K\Horösi and   
András Majdán and   
        Zalán Heszberger   Compressing IP forwarding tables:
                                  towards entropy bounds and beyond  . . . 149--162
         Parinaz Naghizadeh and   
                    Mingyan Liu   Perceptions and truth: a mechanism
                                  design approach to crowd-sourcing
                                  reputation . . . . . . . . . . . . . . . 163--176
                Zhoujia Mao and   
            Can Emre Koksal and   
                 Ness B. Shroff   Optimal online scheduling with arbitrary
                                  hard deadlines in multihop communication
                                  networks . . . . . . . . . . . . . . . . 177--189
                 Weina Wang and   
                    Kai Zhu and   
                   Lei Ying and   
                   Jian Tan and   
                       Li Zhang   MapTask scheduling in MapReduce with
                                  data locality: throughput and
                                  heavy-traffic optimality . . . . . . . . 190--203
         Hussein Al-Zubaidy and   
        Jörg Liebeherr and   
                 Almut Burchard   Network-layer performance analysis of
                                  multihop fading channels . . . . . . . . 204--217
          Marcin Bienkowski and   
         Leszek G\kasieniec and   
            Marek Klonowski and   
      Miroslaw Korzeniowski and   
               Bernard Mans and   
              Stefan Schmid and   
              Roger Wattenhofer   Distributed alarming in the on-duty and
                                  off-duty models  . . . . . . . . . . . . 218--230
                  Chen Qian and   
                   Simon S. Lam   A scalable and resilient layer-2 network
                                  with Ethernet compatibility  . . . . . . 231--244
                 Eleni Stai and   
       Symeon Papavassiliou and   
                  John S. Baras   Performance-aware cross-layer design in
                                  wireless multihop networks via a
                                  weighted backpressure approach . . . . . 245--258
               Xiaowen Gong and   
              Junshan Zhang and   
            Douglas Cochran and   
                       Kai Xing   Optimal placement for barrier coverage
                                  in bistatic radar sensor networks  . . . 259--271
                  Feng Wang and   
             Jiangchuan Liu and   
               Minghua Chen and   
                   Haiyang Wang   Migration towards cloud-assisted live
                                  media streaming  . . . . . . . . . . . . 272--282
              Soheil Eshghi and   
          M. H. R. Khouzani and   
             Saswati Sarkar and   
           Santosh S. Venkatesh   Optimal patching in clustered malware
                                  epidemics  . . . . . . . . . . . . . . . 283--298
               Giusi Alfano and   
            Michele Garetto and   
                Emilio Leonardi   Content-centric wireless networks with
                                  limited buffers: when mobility hurts . . 299--311
                Ziling Zhou and   
                Binbin Chen and   
                     Haifeng Yu   Understanding RFID counting protocols    312--327
                  Guang Tan and   
                Zhimeng Yin and   
                   Hongbo Jiang   Trap array: a unified model for
                                  scalability evaluation of geometric
                                  routing  . . . . . . . . . . . . . . . . 328--341
           Jeremy M. Plante and   
               Arush Gadkar and   
             Vinod M. Vokkarane   Manycast overlay in split-incapable
                                  networks for supporting
                                  bandwidth-intensive applications . . . . 342--354
           Robert Margolies and   
           Ashwin Sridharan and   
            Vaneet Aggarwal and   
               Rittwik Jana and   
    N. K. Shankaranarayanan and   
      Vinay A. Vaishampayan and   
                    Gil Zussman   Exploiting mobility in proportional fair
                                  cellular scheduling: measurements and
                                  algorithms . . . . . . . . . . . . . . . 355--367
         Pedro E. Santacruz and   
            Vaneet Aggarwal and   
             Ashutosh Sabharwal   Leveraging physical-layer capabilities:
                                  distributed scheduling in interference
                                  networks with local views  . . . . . . . 368--382
            Kundan Kandhway and   
                       Joy Kuri   Campaigning in heterogeneous social
                                  networks: optimal control of SI
                                  information epidemics  . . . . . . . . . 383--396
                    Wen Luo and   
                   Yan Qiao and   
               Shigang Chen and   
                       Min Chen   An efficient protocol for RFID
                                  multigroup threshold-based
                                  classification based on sampling and
                                  logical bitmap . . . . . . . . . . . . . 397--407
                    Kai Zhu and   
                       Lei Ying   Information source detection in the SIR
                                  model: a sample-path-based approach  . . 408--421
                  Chen Chen and   
         Hans-Arno Jacobsen and   
                Roman Vitenberg   Algorithms based on divide and conquer
                                  for topic-based publish/subscribe
                                  overlay design . . . . . . . . . . . . . 422--436
         Valentino Pacifici and   
            Frank Lehrieder and   
         György Dán   Cache bandwidth allocation for P2P
                                  file-sharing systems to minimize
                                  inter-ISP traffic  . . . . . . . . . . . 437--448
                  Qiang Liu and   
                   Xin Wang and   
        Nageswara S. V. Rao and   
          Katharine Brigham and   
          B. V. K. Vijaya Kumar   Effect of retransmission and
                                  retrodiction on estimation and fusion in
                                  long-haul sensor networks  . . . . . . . 449--461
                 Fengyu Gao and   
                   Hongyan Qian   Efficient, real-world token bucket
                                  configuration for residential gateways   462--475
        Sophia Athanasiadou and   
           Marios Gatzianas and   
        Leonidas Georgiadis and   
             Leandros Tassiulas   Stable XOR-based policies for the
                                  broadcast erasure channel with feedback  476--491
              Albert Banchs and   
                Jorge Ortin and   
     Andres Garcia-Saavedra and   
           Douglas J. Leith and   
                  Pablo Serrano   Thwarting selfish behavior in 802.11
                                  WLANs  . . . . . . . . . . . . . . . . . 492--505
               Florin Coras and   
      Jordi Domingo-Pascual and   
               Darrel Lewis and   
       Albert Cabellos-Aparicio   An analytical model for Loc/ID mappings
                                  caches . . . . . . . . . . . . . . . . . 506--516
                     Yi Gao and   
                   Wei Dong and   
                  Chun Chen and   
                  Jiajun Bu and   
                  Wenbin Wu and   
                        Xue Liu   iPath: path inference in wireless sensor
                                  networks . . . . . . . . . . . . . . . . 517--528
          Jayakrishnan Nair and   
          Martin Andreasson and   
       Lachlan L. H. Andrew and   
              Steven H. Low and   
                  John C. Doyle   On channel failures, file fragmentation
                                  policies, and heavy-tailed completion
                                  times  . . . . . . . . . . . . . . . . . 529--541
    Mohammad Hadi Afrasiabi and   
             Roch Guérin   Exploring user-provided connectivity . . 542--554
          Ori Rottenstreich and   
             Isaac Keslassy and   
          Avinatan Hassidim and   
                Haim Kaplan and   
                      Ely Porat   Optimal in/out TCAM encodings of ranges  555--568
            Flavio Esposito and   
            Donato Di Paola and   
                  Ibrahim Matta   On distributed virtual network embedding
                                  with guarantees  . . . . . . . . . . . . 569--582
               Xiaochun Yun and   
                Yipeng Wang and   
            Yongzheng Zhang and   
                        Yu Zhou   A semantics-aware approach to the
                                  automated network protocol
                                  identification . . . . . . . . . . . . . 583--595
                 Qiuyu Peng and   
                Anwar Walid and   
              Jaehyun Hwang and   
                  Steven H. Low   Multipath TCP: analysis, design, and
                                  implementation . . . . . . . . . . . . . 596--609
                 James Daly and   
                Alex X. Liu and   
                     Eric Torng   A difference resolution approach to
                                  compressing access control lists . . . . 610--623
         Ahmed Farhan Hanif and   
            Hamidou Tembine and   
             Mohamad Assaad and   
               Djamal Zeghlache   Mean-field games for resource sharing in
                                  cloud-based networks . . . . . . . . . . 624--637

IEEE\slash ACM Transactions on Networking
Volume 24, Number 2, April, 2016

                  Dong Zhao and   
              Xiang-Yang Li and   
                     Huadong Ma   Budget-feasible online incentive
                                  mechanisms for crowdsourcing tasks
                                  truthfully . . . . . . . . . . . . . . . 647--661
                  Daibo Liu and   
                Mengshu Hou and   
                Zhichao Cao and   
               Jiliang Wang and   
                    Yuan He and   
                     Yunhao Liu   Duplicate detectable opportunistic
                                  forwarding in duty-cycled wireless
                                  sensor networks  . . . . . . . . . . . . 662--673
              Joaquim Oller and   
             Ilker Demirkol and   
           Jordi Casademont and   
            Josep Paradells and   
           Gerd Ulrich Gamm and   
                Leonhard Reindl   Has time come to switch from duty-cycled
                                  MAC protocols to wake-up radio for
                                  wireless sensor networks?  . . . . . . . 674--687
            Abhishek Mishra and   
        Parv Venkitasubramaniam   Anonymity and fairness in packet
                                  scheduling: a quantitative tradeoff  . . 688--702
                   Min Chen and   
                    Wen Luo and   
                    Zhen Mo and   
               Shigang Chen and   
                   Yuguang Fang   An efficient tag search protocol in
                                  large-scale RFID systems with noisy
                                  channel  . . . . . . . . . . . . . . . . 703--716
      Alireza Shams Shafigh and   
            Beatriz Lorenzo and   
                Savo Glisic and   
  Jordi Pérez-Romero and   
            Luiz A. DaSilva and   
         Allen B. MacKenzie and   
               Juha Röning   A framework for dynamic network
                                  architecture and topology optimization   717--730
           Zakaria Al-Qudah and   
              Eamon Johnson and   
         Michael Rabinovich and   
              Oliver Spatscheck   Internet with transient
                                  destination-controlled addressing  . . . 731--744
                  Zhi Zhang and   
             Yigal Bejerano and   
        Spyridon Antonakopoulos   Energy-efficient IP core network
                                  configuration under general traffic
                                  demands  . . . . . . . . . . . . . . . . 745--758
               Michael J. Neely   Distributed stochastic optimization via
                                  correlated scheduling  . . . . . . . . . 759--772
            Sazzadur Rahman and   
             Ting-Kai Huang and   
       Harsha V. Madhyastha and   
             Michalis Faloutsos   Detecting malicious Facebook
                                  applications . . . . . . . . . . . . . . 773--787
                Xudong Wang and   
                   Wenguang Mao   Analog network coding without
                                  restrictions on superimposed frames  . . 788--805
                  Tong Meng and   
                     Fan Wu and   
                    Guihai Chen   Code-based neighbor discovery protocols
                                  in mobile wireless networks  . . . . . . 806--819
               Vinay Joseph and   
                  Sem Borst and   
               Martin I. Reiman   Optimal rate allocation for video
                                  streaming in wireless networks with user
                                  dynamics . . . . . . . . . . . . . . . . 820--835
           Ramtin Pedarsani and   
    Mohammad Ali Maddah-Ali and   
                     Urs Niesen   Online coded caching . . . . . . . . . . 836--845
                Jinsong Han and   
                  Chen Qian and   
               Panlong Yang and   
                     Dan Ma and   
              Zhiping Jiang and   
                     Wei Xi and   
                   Jizhong Zhao   GenePrint: generic and accurate
                                  physical-layer identification for UHF
                                  RFID tags  . . . . . . . . . . . . . . . 846--858
                    Kun Xie and   
                   Xin Wang and   
                 Jigang Wen and   
                   Jiannong Cao   Cooperative routing with relay
                                  assignment in multiradio multihop
                                  wireless networks  . . . . . . . . . . . 859--872
                   Jian Guo and   
               Fangming Liu and   
             John C. S. Lui and   
                        Hai Jin   Fair network bandwidth allocation in
                                  IaaS datacenters via a cooperative game
                                  approach . . . . . . . . . . . . . . . . 873--886
               Hongkun Yang and   
                   Simon S. Lam   Real-time verification of network
                                  properties using atomic predicates . . . 887--900
          Mustafa Y. Arslan and   
     Karthikeyan Sundaresan and   
  Srikanth V. Krishnamurthy and   
             Sampath Rangarajan   iBUS: an integrated beamformer and
                                  uplink scheduler for OFDMA small cells   901--914
     Karthikeyan Sundaresan and   
          Mustafa Y. Arslan and   
           Shailendra Singh and   
         Sampath Rangarajan and   
      Srikanth V. Krishnamurthy   FluidNet: a flexible cloud-based radio
                                  access network for small cells . . . . . 915--928
              Huiyuan Zhang and   
             Dung T. Nguyen and   
              Huiling Zhang and   
                     My T. Thai   Least cost influence maximization across
                                  multiple social networks . . . . . . . . 929--939
                   Chee Wei Tan   Optimal power control in Rayleigh-fading
                                  heterogeneous wireless networks  . . . . 940--953
                   Ying Cui and   
              Edmund M. Yeh and   
                        Ran Liu   Enhancing the delay performance of
                                  dynamic backpressure algorithms  . . . . 954--967
                  Rihua Wei and   
                    Yang Xu and   
               H. Jonathan Chao   Finding nonequivalent classifiers in
                                  Boolean space to reduce TCAM usage . . . 968--981
          Jayakrishnan Nair and   
        Krishna Jagannathan and   
                   Adam Wierman   When heavy-tailed and light-tailed flows
                                  compete: the response time tail under
                                  generalized max-weight scheduling  . . . 982--995
          Hasti A. Pedersen and   
                      Sujit Dey   Enhancing mobile video capacity and
                                  quality using rate adaptation, RAN
                                  caching and processing . . . . . . . . . 996--1010
              Mingchen Zhao and   
               Wenchao Zhou and   
     Alexander J. T. Gurney and   
          Andreas Haeberlen and   
                Micah Sherr and   
                  Boon Thau Loo   Private and verifiable interdomain
                                  routing decisions  . . . . . . . . . . . 1011--1024
                    Han Cai and   
               Irem Koprulu and   
                 Ness B. Shroff   Exploiting double opportunities for
                                  latency-constrained content propagation
                                  in wireless networks . . . . . . . . . . 1025--1037
                    Tao Han and   
                  Nirwan Ansari   A traffic load balancing framework for
                                  software-defined radio access networks
                                  powered by hybrid energy sources . . . . 1038--1051
                   Wei Gong and   
           Ivan Stojmenovic and   
                Amiya Nayak and   
                  Kebin Liu and   
                   Haoxiang Liu   Fast and scalable counterfeits
                                  estimation for large-scale RFID systems  1052--1064
          Chandramani Singh and   
               Anurag Kumar and   
              Rajesh Sundaresan   Combined base station association and
                                  power control in multichannel cellular
                                  networks . . . . . . . . . . . . . . . . 1065--1080
             Dong-Hoon Shin and   
                   Shibo He and   
                  Junshan Zhang   Robust and cost-effective design of
                                  cyber-physical systems: an optimal
                                  middleware deployment approach . . . . . 1081--1094
            Sang-Yoon Chang and   
                Yih-Chun Hu and   
                Nicola Laurenti   SimpleMAC: a simple wireless MAC-layer
                                  countermeasure to intelligent and
                                  insider jammers  . . . . . . . . . . . . 1095--1108
             Gaurav Agrawal and   
                     Deep Medhi   Embedding IP unique shortest path
                                  topology on a wavelength-routed network:
                                  normal and survivable design . . . . . . 1109--1124
             Dao-Yuan Chang and   
                  Pi-Chung Wang   TCAM-based multi-match packet
                                  classification using multidimensional
                                  rule layering  . . . . . . . . . . . . . 1125--1138
                 Xuanyu Cao and   
               Jinbei Zhang and   
                   Luoyi Fu and   
                  Weijie Wu and   
                   Xinbing Wang   Optimal secrecy capacity-delay tradeoff
                                  in large-scale mobile ad hoc networks    1139--1152
               Zhangyu Guan and   
            Tommaso Melodia and   
               Gesualdo Scutari   To transmit or not to transmit?:
                                  distributed queueing games in
                                  infrastructureless wireless networks . . 1153--1166
           Abhijeet Bhorkar and   
         Mohammad Naghshvar and   
                    Tara Javidi   Opportunistic routing with congestion
                                  diversity in wireless ad hoc networks    1167--1180
             Yunus Sarikaya and   
             C. Emre Koksal and   
                  Ozgur Ercetin   Dynamic network control for confidential
                                  multi-hop communications . . . . . . . . 1181--1195
            Majed Alresaini and   
         Kwame-Lante Wright and   
     Bhaskar Krishnamachari and   
               Michael J. Neely   Backpressure delay enhancement for
                                  encounter-based mobile networks while
                                  sustaining throughput optimality . . . . 1196--1208
                Guan-Hua Tu and   
                 Yuanjie Li and   
                Chunyi Peng and   
                  Chi-Yu Li and   
                      Songwu Lu   Detecting problematic control-plane
                                  protocol interactions in mobile networks 1209--1222
                Ashok Anand and   
        Athula Balachandran and   
              Aditya Akella and   
                 Vyas Sekar and   
              Srinivasan Seshan   Enhancing video accessibility and
                                  availability using information-bound
                                  references . . . . . . . . . . . . . . . 1223--1236
                 Andra Lutu and   
            Marcelo Bagnulo and   
            Cristel Pelsser and   
               Olaf Maennel and   
               Jesus Cid-Sueiro   The BGP visibility toolkit: detecting
                                  anomalous Internet routing behavior  . . 1237--1250
               Kirill Kogan and   
        Sergey I. Nikolenko and   
          Ori Rottenstreich and   
            William Culhane and   
                Patrick Eugster   Exploiting order independence for
                                  scalable and expressive packet
                                  classification . . . . . . . . . . . . . 1251--1264
               Shizhen Zhao and   
                    Xiaojun Lin   Design of scheduling algorithms for
                                  end-to-end backlog minimization in
                                  wireless multi-hop networks under
                                  $k$-hop interference models  . . . . . . 1265--1278
                Qingsi Wang and   
                    Mingyan Liu   Learning in hide-and-seek  . . . . . . . 1279--1292

IEEE\slash ACM Transactions on Networking
Volume 24, Number 3, June, 2016

                Alex X. Liu and   
            Chad R. Meiners and   
                     Eric Torng   Packet classification using binary
                                  content addressable memory . . . . . . . 1295--1307
           M. Zubair Shafiq and   
                 Lusheng Ji and   
                Alex X. Liu and   
               Jeffrey Pang and   
        Shobha Venkataraman and   
                       Jia Wang   Characterizing and optimizing cellular
                                  network performance during crowded
                                  events . . . . . . . . . . . . . . . . . 1308--1321
              Soongeol Kwon and   
               Natarajan Gautam   Time-stable performance in parallel
                                  queues with non-homogeneous and
                                  multi-class workloads  . . . . . . . . . 1322--1335
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   IP fast rerouting and disjoint multipath
                                  routing with three edge-independent
                                  spanning trees . . . . . . . . . . . . . 1336--1349
                     Yi Qin and   
               Xiaohua Tian and   
                  Weijie Wu and   
                   Xinbing Wang   Mobility weakens the distinction between
                                  multicast and unicast  . . . . . . . . . 1350--1363
                      Yu Lu and   
               Mehul Motani and   
                Wai-Choong Wong   A QoE-aware resource distribution
                                  framework incentivizing context sharing
                                  and moderate competition . . . . . . . . 1364--1377
                  Richard J. La   Interdependent security with strategic
                                  agents and cascades of infection . . . . 1378--1391
                     Yi Gao and   
                   Wei Dong and   
                  Wenbin Wu and   
                  Chun Chen and   
              Xiang-Yang Li and   
                      Jiajun Bu   Scalpel: scalable preferential link
                                  tomography based on graph trimming . . . 1392--1403
                    Jia Liu and   
             Ness B. Shroff and   
               Cathy H. Xia and   
               Hanif D. Sherali   Joint congestion control and routing
                                  optimization: an efficient second-order
                                  distributed approach . . . . . . . . . . 1404--1420
              Stefan Schmid and   
                  Chen Avin and   
       Christian Scheideler and   
        Michael Borokhovich and   
          Bernhard Haeupler and   
                     Zvi Lotker   SplayNet: towards locally self-adjusting
                                  networks . . . . . . . . . . . . . . . . 1421--1433
                    Wei Dai and   
                   Scott Jordan   ISP service tier design  . . . . . . . . 1434--1447
                   Tian Pan and   
                 Ting Zhang and   
                Junxiao Shi and   
                    Yang Li and   
                Linxiao Jin and   
                 Fuliang Li and   
                Jiahai Yang and   
             Beichuan Zhang and   
                Xueren Yang and   
               Mingui Zhang and   
                Huichen Dai and   
                        Bin Liu   Towards zero-time wakeup of line cards
                                  in power-aware routers . . . . . . . . . 1448--1461
                    Kai Han and   
                  Chi Zhang and   
                        Jun Luo   Taming the uncertainty: budget limited
                                  robust crowdsensing through online
                                  learning . . . . . . . . . . . . . . . . 1462--1475
               Changhee Joo and   
                Xiaojun Lin and   
                   Jiho Ryu and   
                 Ness B. Shroff   Distributed greedy approximation to
                                  maximum weighted independent set for
                                  scheduling with fading channels  . . . . 1476--1488
            Matti Siekkinen and   
    Mohammad Ashraful Hoque and   
              Jukka K. Nurminen   Using viewing statistics to control
                                  energy and traffic overhead in mobile
                                  video streaming  . . . . . . . . . . . . 1489--1503
                  Huasen Wu and   
                Xiaojun Lin and   
                    Xin Liu and   
                 Youguang Zhang   Application-level scheduling with
                                  probabilistic deadline constraints . . . 1504--1517
              Rafael Laufer and   
              Leonard Kleinrock   The capacity of wireless CSMA/CA
                                  networks . . . . . . . . . . . . . . . . 1518--1532
            Morteza Mardani and   
          Georgios B. Giannakis   Estimating traffic and anomaly maps via
                                  network tomography . . . . . . . . . . . 1533--1547
                   Yan Qiao and   
               Shigang Chen and   
                     Tao Li and   
                   Shiping Chen   Tag-ordering polling protocols in RFID
                                  systems  . . . . . . . . . . . . . . . . 1548--1561
             Sachin Kadloor and   
             Negar Kiyavash and   
        Parv Venkitasubramaniam   Mitigating timing side channel in shared
                                  schedulers . . . . . . . . . . . . . . . 1562--1573
             Pouya Ostovari and   
                     Jie Wu and   
         Abdallah Khreishah and   
                 Ness B. Shroff   Scalable video streaming with helper
                                  nodes using random linear network coding 1574--1587
              Ahmad Beirami and   
             Mohsen Sardari and   
                 Faramarz Fekri   Packet-level network compression:
                                  realization and scaling of the
                                  network-wide benefits  . . . . . . . . . 1588--1604
                Jinsong Han and   
                  Chen Qian and   
                  Xing Wang and   
                     Dan Ma and   
               Jizhong Zhao and   
                     Wei Xi and   
              Zhiping Jiang and   
                       Zhi Wang   Twins: device-free object tracking using
                                  passive tags . . . . . . . . . . . . . . 1605--1617
                    Hang Li and   
                Chuan Huang and   
                 Ping Zhang and   
               Shuguang Cui and   
                  Junshan Zhang   Distributed opportunistic scheduling for
                                  energy harvesting based wireless
                                  networks: a two-stage probing approach   1618--1631
              Yongmin Zhang and   
                   Shibo He and   
                    Jiming Chen   Data gathering optimization by dynamic
                                  sensing and routing in rechargeable
                                  sensor networks  . . . . . . . . . . . . 1632--1646
               Jeongho Kwak and   
               Okyoung Choi and   
                 Song Chong and   
              Prasant Mohapatra   Processor-network speed scaling for
                                  energy: delay tradeoff in smartphone
                                  applications . . . . . . . . . . . . . . 1647--1660
                 Jongho Won and   
             Chris Y. T. Ma and   
            David K. Y. Yau and   
            Nageswara S. V. Rao   Privacy-assured aggregation protocol for
                                  smart metering: a proactive
                                  fault-tolerant approach  . . . . . . . . 1661--1674
               Zhangyu Guan and   
            Tommaso Melodia and   
              Dongfeng Yuan and   
              Dimitris A. Pados   Distributed resource management for
                                  cognitive ad hoc networks with
                                  cooperative relays . . . . . . . . . . . 1675--1689
            Sharayu Moharir and   
             Sujay Sanghavi and   
              Sanjay Shakkottai   Online load balancing under graph
                                  constraints  . . . . . . . . . . . . . . 1690--1703
              Matteo Avalle and   
               Fulvio Risso and   
                 Riccardo Sisto   Scalable algorithms for NFA
                                  multi-striding and NFA-based deep packet
                                  inspection on GPUs . . . . . . . . . . . 1704--1717
                 Kobi Cohen and   
                    Amir Leshem   Distributed game-theoretic optimization
                                  and management of multichannel ALOHA
                                  networks . . . . . . . . . . . . . . . . 1718--1731
                 Dejun Yang and   
               Guoliang Xue and   
                    Xi Fang and   
                      Jian Tang   Incentive mechanisms for crowdsensing:
                                  crowdsourcing with smartphones . . . . . 1732--1744
                Jinsung Lee and   
                  Hojin Lee and   
                    Yung Yi and   
                 Song Chong and   
         Edward W. Knightly and   
                    Mung Chiang   Making 802.11 DCF near-optimal: design,
                                  implementation, and evaluation . . . . . 1745--1758
                    Kai Liu and   
            Joseph K. Y. Ng and   
           Victor C. S. Lee and   
                Sang H. Son and   
               Ivan Stojmenovic   Cooperative data scheduling in hybrid
                                  vehicular ad hoc networks: VANET as a
                                  software defined network . . . . . . . . 1759--1773
             Seon Yeong Han and   
       Nael B. Abu-Ghazaleh and   
                    Dongman Lee   Efficient and consistent path loss model
                                  for mobile network simulation  . . . . . 1774--1786
            Hulya Seferoglu and   
                  Eytan Modiano   Separation of routing and scheduling in
                                  backpressure: based wireless networks    1787--1800
             Wenzhuo Ouyang and   
            Atilla Eryilmaz and   
                 Ness B. Shroff   Downlink scheduling over Markovian
                                  fading channels  . . . . . . . . . . . . 1801--1812
           Roberto Gonzalez and   
               Ruben Cuevas and   
              Reza Motamedi and   
                Reza Rejaie and   
                   Angel Cuevas   Assessing the evolution of Google+ in
                                  its first two years  . . . . . . . . . . 1813--1826
                Hongxing Li and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   Virtual machine trading in a federation
                                  of clouds: individual profit and social
                                  welfare maximization . . . . . . . . . . 1827--1840
                   Xun Gong and   
                 Negar Kiyavash   Quantifying the information leakage in
                                  timing side channels in deterministic
                                  work-conserving schedulers . . . . . . . 1841--1852
               Jose Yallouz and   
          Ori Rottenstreich and   
                     Ariel Orda   Tunable survivable spanning trees  . . . 1853--1866
                     Bin Li and   
                   Ruogu Li and   
                Atilla Eryilmaz   Wireless scheduling design for
                                  optimizing both service regularity and
                                  mean delay in heavy-traffic regimes  . . 1867--1880
               Qianyi Huang and   
                   Yang Gui and   
                     Fan Wu and   
                Guihai Chen and   
                     Qian Zhang   A general privacy-preserving auction
                                  mechanism for secondary spectrum markets 1881--1893
                Arnob Ghosh and   
                 Saswati Sarkar   Quality-sensitive price competition in
                                  secondary market spectrum oligopoly:
                                  single location game . . . . . . . . . . 1894--1907
                Zizhong Cao and   
            Murali Kodialam and   
                 T. V. Lakshman   Joint static and dynamic traffic
                                  scheduling in data center networks . . . 1908--1918
              Zhenzhe Zheng and   
                     Fan Wu and   
               Shaojie Tang and   
                    Guihai Chen   AEGIS: an unknown combinatorial auction
                                  mechanism framework for heterogeneous
                                  spectrum redistribution in
                                  noncooperative wireless networks . . . . 1919--1932

IEEE\slash ACM Transactions on Networking
Volume 24, Number 4, August, 2016

         Hamlet Medina Ruiz and   
             Michel Kieffer and   
       Beatrice Pesquet-Popescu   TCP and Network Coding: Equilibrium and
                                  Dynamic Properties . . . . . . . . . . . 1935--1947
                 Zhidan Liu and   
               Zhenjiang Li and   
                      Mo Li and   
                   Wei Xing and   
                    Dongming Lu   Path Reconstruction in Dynamic Wireless
                                  Sensor Networks Using Compressive
                                  Sensing  . . . . . . . . . . . . . . . . 1948--1960
               Gaurav Raina and   
      Sreelakshmi Manjunath and   
                 Sai Prasad and   
         Krishnamurthy Giridhar   Stability and Performance Analysis of
                                  Compound TCP With REM and Drop-Tail
                                  Queue Management . . . . . . . . . . . . 1961--1974
               Jianxia Ning and   
           Shailendra Singh and   
   Konstantinos Pelechrinis and   
                    Bin Liu and   
  Srikanth V. Krishnamurthy and   
                Ramesh Govindan   Forensic Analysis of Packet Losses in
                                  Wireless Networks  . . . . . . . . . . . 1975--1988
                     Yi Qin and   
                 Riheng Jia and   
               Jinbei Zhang and   
                  Weijie Wu and   
                   Xinbing Wang   Impact of Social Relation and Group Size
                                  in Multicast Ad Hoc Networks . . . . . . 1989--2004
     Ahmed Osama Fathy Atya and   
           Ioannis Broustis and   
           Shailendra Singh and   
         Dimitris Syrivelis and   
  Srikanth V. Krishnamurthy and   
             Thomas F. La Porta   A Policy-Aware Enforcement Logic for
                                  Appropriately Invoking Network Coding    2005--2018
            Pooja Vyavahare and   
               Nutan Limaye and   
                   D. Manjunath   Optimal Embedding of Functions for
                                  In-Network Computation: Complexity
                                  Analysis and Algorithms  . . . . . . . . 2019--2032
         Prasanna Chaporkar and   
           Stefan Magureanu and   
            Alexandre Proutiere   Optimal Distributed Scheduling in
                                  Wireless Networks Under the SINR
                                  Interference Model . . . . . . . . . . . 2033--2045
        Mihalis G. Markakis and   
              Eytan Modiano and   
             John N. Tsitsiklis   Delay Stability of Back-Pressure
                                  Policies in the Presence of Heavy-Tailed
                                  Traffic  . . . . . . . . . . . . . . . . 2046--2059
                 Weijie Shi and   
              Linquan Zhang and   
                   Chuan Wu and   
                Zongpeng Li and   
              Francis C. M. Lau   An Online Auction Framework for Dynamic
                                  Resource Provisioning in Cloud Computing 2060--2073
               Reuven Cohen and   
                   Gabi Nakibly   Restorable Logical Topology in the Face
                                  of No or Partial Traffic Demand
                                  Knowledge  . . . . . . . . . . . . . . . 2074--2085
            Jeffrey Wildman and   
                   Steven Weber   On Characterizing the Local Pooling
                                  Factor of Greedy Maximal Scheduling in
                                  Random Graphs  . . . . . . . . . . . . . 2086--2099
                  Chen Qian and   
                   Simon S. Lam   Greedy Routing by Network Distance
                                  Embedding  . . . . . . . . . . . . . . . 2100--2113
            David Applegate and   
               Aaron Archer and   
       Vijay Gopalakrishnan and   
              Seungjoon Lee and   
             K. K. Ramakrishnan   Optimal Content Placement for a
                                  Large-Scale VoD System . . . . . . . . . 2114--2127
               Xiaofei Liao and   
                     Li Lin and   
                  Guang Tan and   
                    Hai Jin and   
               Xiaobin Yang and   
                  Wei Zhang and   
                          Bo Li   LiveRender: a Cloud Gaming System Based
                                  on Compressed Graphics Streaming . . . . 2128--2139
               Bassel Saleh and   
                     Dongyu Qiu   Performance Analysis of
                                  Network-Coding-Based P2P Live Streaming
                                  Systems  . . . . . . . . . . . . . . . . 2140--2153
                Luwei Cheng and   
              Francis C. M. Lau   Revisiting TCP Congestion Control in a
                                  Virtual Cluster Environment  . . . . . . 2154--2167
             Guanfeng Liang and   
                  Ulas C. Kozat   On Throughput-Delay Optimal Access to
                                  Storage Clouds via Load Adaptive Coding
                                  and Chunking . . . . . . . . . . . . . . 2168--2181
                     Anh Le and   
         Athina Markopoulou and   
          Alexandros G. Dimakis   Auditing for Distributed Storage Systems 2182--2195
                Zain Shamsi and   
             Ankur Nandwani and   
              Derek Leonard and   
                Dmitri Loguinov   Hershel: Single-Packet OS Fingerprinting 2196--2209
                  Yang Peng and   
                   Kai Chen and   
                Guohui Wang and   
                    Wei Bai and   
              Yangming Zhao and   
                   Hao Wang and   
                Yanhui Geng and   
                Zhiqiang Ma and   
                         Lin Gu   Towards Comprehensive Traffic
                                  Forecasting in Cloud Computing: Design
                                  and Application  . . . . . . . . . . . . 2210--2222
               Michael J. Neely   Energy-Aware Wireless Scheduling With
                                  Near-Optimal Backlog and Convergence
                                  Time Tradeoffs . . . . . . . . . . . . . 2223--2236
               Longbo Huang and   
             Shaoquan Zhang and   
               Minghua Chen and   
                        Xin Liu   When Backpressure Meets Predictive
                                  Scheduling . . . . . . . . . . . . . . . 2237--2250
             Joachim Fabini and   
                    Tanja Zseby   The Right Time: Reducing Effective
                                  End-to-End Delay in Time-Slotted
                                  Packet-Switched Networks . . . . . . . . 2251--2263
                Xiaohan Wei and   
               Michael J. Neely   Power-Aware Wireless File Downloading: a
                                  Lyapunov Indexing Approach to a
                                  Constrained Restless Bandit Problem  . . 2264--2277
               Jaewook Kwak and   
                Chul-Ho Lee and   
                   Do Young Eun   A High-Order Markov-Chain-Based
                                  Scheduling Algorithm for Low Delay in
                                  CSMA Networks  . . . . . . . . . . . . . 2278--2290
              Mehdi Nikkhah and   
                    Roch Guerin   Migrating the Internet to IPv6: an
                                  Exploration of the When and Why  . . . . 2291--2304
                     Rui Li and   
                Alex X. Liu and   
                Ann L. Wang and   
          Bezawada Bruhadeshwar   Fast and Scalable Range Query Processing
                                  With Strong Privacy Protection for Cloud
                                  Computing  . . . . . . . . . . . . . . . 2305--2318
              Joongheon Kim and   
             Giuseppe Caire and   
             Andreas F. Molisch   Quality-Aware Streaming and Scheduling
                                  for Device-to-Device Video Delivery  . . 2319--2331
   Mohammad Javad Hajikhani and   
                Thomas Kunz and   
                Howard Schwartz   A Recursive Method for Clock
                                  Synchronization in Asymmetric
                                  Packet-Based Networks  . . . . . . . . . 2332--2342
          Cheng-Shang Chang and   
               Wanjiun Liao and   
                  Tsung-Ying Wu   Tight Lower Bounds for Channel Hopping
                                  Schemes in Cognitive Radio Networks  . . 2343--2356
               John Tadrous and   
            Atilla Eryilmaz and   
                Hesham El Gamal   Joint Smart Pricing and Proactive
                                  Content Caching for Mobile Services  . . 2357--2371
                   Wei Dong and   
                     Jie Yu and   
               Jiliang Wang and   
              Xuefeng Zhang and   
                     Yi Gao and   
                  Chun Chen and   
                      Jiajun Bu   Accurate and Robust Time Reconstruction
                                  for Deployed Sensor Networks . . . . . . 2372--2385
                Guibin Tian and   
                       Yong Liu   Towards Agile and Smooth Video
                                  Adaptation in HTTP Adaptive Streaming    2386--2399
                Alex X. Liu and   
                     Eric Torng   Overlay Automata and Algorithms for Fast
                                  and Scalable Regular Expression Matching 2400--2415
             Jaeseong Jeong and   
                    Yung Yi and   
              Jeong-Woo Cho and   
               Do Young Eun and   
                     Song Chong   Energy-Efficient Wi-Fi Sensing Policy
                                  Under Generalized Mobility Patterns With
                                  Aging  . . . . . . . . . . . . . . . . . 2416--2428
        Gianfranco Nencioni and   
            Nishanth Sastry and   
               Gareth Tyson and   
       Vijay Badrinarayanan and   
           Dmytro Karamshuk and   
            Jigna Chandaria and   
                  Jon Crowcroft   SCORE: Exploiting Global Broadcasts to
                                  Create Offline Personal Channels for
                                  On-Demand Access . . . . . . . . . . . . 2429--2442
                   Yu Xiang and   
                   Tian Lan and   
            Vaneet Aggarwal and   
               Yih-Farn R. Chen   Joint Latency and Cost Optimization for
                                  Erasure-Coded Data Center Storage  . . . 2443--2457
         Srikanth Hariharan and   
                 Ness B. Shroff   On Sample-Path Optimal Dynamic
                                  Scheduling for Sum-Queue Minimization in
                                  Trees Under the $K$-Hop Interference
                                  Model  . . . . . . . . . . . . . . . . . 2458--2471
                  Chen Wang and   
               Hongbo Jiang and   
                Tianlong Yu and   
                 John C. S. Lui   SLICE: Enabling Greedy Routing in High
                                  Genus $3$-D WSNs With General Topologies 2472--2484
                   Wei Dong and   
           Swati Rallapalli and   
                   Lili Qiu and   
         K. K. Ramakrishnan and   
                      Yin Zhang   Double Auctions for Dynamic Spectrum
                                  Allocation . . . . . . . . . . . . . . . 2485--2497
                     Wan Du and   
               Zhenjiang Li and   
    Jansen Christian Liando and   
                          Mo Li   From Rateless to Distanceless: Enabling
                                  Sparse Sensor Network Deployment in
                                  Large Areas  . . . . . . . . . . . . . . 2498--2511
        Felix Ming Fai Wong and   
               Zhenming Liu and   
                    Mung Chiang   On the Efficiency of Social Recommender
                                  Networks . . . . . . . . . . . . . . . . 2512--2524
              Lidia Donvito and   
            Laura Galluccio and   
             Alfio Lombardo and   
               Giacomo Morabito   $ \mu $-NET: a Network for Molecular
                                  Biology Applications in Microfluidic
                                  Chips  . . . . . . . . . . . . . . . . . 2525--2538
             Mehdi Malboubi and   
                   Cuong Vu and   
             Chen-Nee Chuah and   
                  Puneet Sharma   Decentralizing Network Inference
                                  Problems With Multiple-Description
                                  Fusion Estimation MDFE . . . . . . . . . 2539--2552
               Tobias Harks and   
              Martin Hoefer and   
             Kevin Schewior and   
             Alexander Skopalik   Routing Games With Progressive Filling   2553--2562
               Richard T. B. Ma   Subsidization Competition: Vitalizing
                                  the Neutral Internet . . . . . . . . . . 2563--2576

IEEE\slash ACM Transactions on Networking
Volume 24, Number 5, October, 2016

                  Huasen Wu and   
                Xiaojun Lin and   
                    Xin Liu and   
                    Kun Tan and   
                Yongguang Zhang   CoSchd: Coordinated Scheduling With
                                  Channel and Load Awareness for
                                  Alleviating Cellular Congestion  . . . . 2579--2592
                     Di Niu and   
                 Baochun Li and   
                     Di Niu and   
                     Baochun Li   An Asynchronous Fixed-Point Algorithm
                                  for Resource Sharing With Coupled
                                  Objectives . . . . . . . . . . . . . . . 2593--2606
                   Can Zhao and   
                  Jian Zhao and   
                Xiaojun Lin and   
                       Chuan Wu   Capacity of P2P On-Demand Streaming With
                                  Simple, Robust, and Decentralized
                                  Control  . . . . . . . . . . . . . . . . 2607--2620
          Luis Amaral Lopes and   
                 Rute Sofia and   
               Huseyin Haci and   
                    Huiling Zhu   A Proposal for Dynamic Frequency Sharing
                                  in Wireless Networks . . . . . . . . . . 2621--2633
            Karla Kvaternik and   
               Jaime Llorca and   
              Daniel Kilper and   
                    Lacra Pavel   A Methodology for the Design of
                                  Self-Optimizing, Decentralized
                                  Content-Caching Strategies . . . . . . . 2634--2647
          Shravan Garlapati and   
             Teja Kuruganti and   
         Michael R. Buehrer and   
            Jeffrey H. Reed and   
          Shravan Garlapati and   
             Teja Kuruganti and   
         Michael R. Buehrer and   
                Jeffrey H. Reed   SMAC: a Soft MAC to Reduce Control
                                  Overhead and Latency in CDMA-Based AMI
                                  Networks . . . . . . . . . . . . . . . . 2648--2662
        Angelos Chatzipapas and   
               Vincenzo Mancuso   An M/G/1 Model for Gigabit Energy
                                  Efficient Ethernet Links With Coalescing
                                  and Real-Trace-Based Evaluation  . . . . 2663--2675
               Victor Valls and   
               Douglas J. Leith   Max-Weight Revisited: Sequences of
                                  Nonconvex Optimizations Solving Convex
                                  Optimizations  . . . . . . . . . . . . . 2676--2689
                    Bei Liu and   
                   Wei Wang and   
               Donghyun Kim and   
                  Deying Li and   
                Jingyi Wang and   
            Alade O. Tokuta and   
                   Yaolin Jiang   On Approximating Minimum $3$-Connected
                                  $m$-Dominating Set Problem in Unit Disk
                                  Graph  . . . . . . . . . . . . . . . . . 2690--2701
                 Yuxiao Hou and   
                  Jiajue Ou and   
             Yuanqing Zheng and   
                          Mo Li   PLACE: Physical Layer Cardinality
                                  Estimation for Large-Scale RFID Systems  2702--2714
               John Tadrous and   
                Atilla Eryilmaz   On Optimal Proactive Caching for Mobile
                                  Networks With Demand Uncertainties . . . 2715--2727
            Matteo Varvello and   
              Rafael Laufer and   
             Feixiong Zhang and   
                 T. V. Lakshman   Multilayer Packet Classification With
                                  Graphics Processing Units  . . . . . . . 2728--2741
                   Sen Wang and   
                     Jun Bi and   
                Jianping Wu and   
        Athanasios V. Vasilakos   CPHR: In-Network Caching for
                                  Information-Centric Networking With
                                  Partitioning and Hash-Routing  . . . . . 2742--2755
                   Wei Gong and   
               Haoxiang Liu and   
                   Lei Chen and   
                  Kebin Liu and   
                     Yunhao Liu   Fast Composite Counting in RFID Systems  2756--2767
                 Shuihai Hu and   
                   Kai Chen and   
                  Haitao Wu and   
                    Wei Bai and   
                  Chang Lan and   
                   Hao Wang and   
                Hongze Zhao and   
                 Chuanxiong Guo   Explicit Path Control in Commodity Data
                                  Centers: Design and Applications . . . . 2768--2781
                Guodong Shi and   
                      Bo Li and   
           Mikael Johansson and   
          Karl Henrik Johansson   Finite-Time Convergent Gossiping . . . . 2782--2794
                    Xu Chen and   
                   Lei Jiao and   
                Wenzhong Li and   
                    Xiaoming Fu   Efficient Multi-User Computation
                                  Offloading for Mobile-Edge Cloud
                                  Computing  . . . . . . . . . . . . . . . 2795--2808
              Johannes Dams and   
              Martin Hoefer and   
              Thomas Kesselheim   Jamming-Resistant Learning in Wireless
                                  Networks . . . . . . . . . . . . . . . . 2809--2818
             Mingyang Zhang and   
             Changsheng You and   
                     Zuqing Zhu   On the Parallelization of Spectrum
                                  Defragmentation Reconfigurations in
                                  Elastic Optical Networks . . . . . . . . 2819--2833
               Jinxue Zhang and   
                  Rui Zhang and   
               Jingchao Sun and   
              Yanchao Zhang and   
                  Chi Zhang and   
               Jinxue Zhang and   
                  Rui Zhang and   
               Jingchao Sun and   
              Yanchao Zhang and   
                      Chi Zhang   TrueTop: a Sybil-Resilient System for
                                  User Influence Measurement on Twitter    2834--2846
                Donggyu Yun and   
              Dongmyung Lee and   
               Se-Young Yun and   
                Jinwoo Shin and   
                        Yung Yi   Delay Optimal CSMA With Linear Virtual
                                  Channels Under a General Topology  . . . 2847--2857
                Xiaoyong Li and   
          Daren B. H. Cline and   
                Dmitri Loguinov   On Sample-Path Staleness in Lazy Data
                                  Replication  . . . . . . . . . . . . . . 2858--2871
              Stepan Kucera and   
              David Lopez-Perez   Inter-Cell Interference Coordination for
                                  Control Channels in LTE Heterogeneous
                                  Networks . . . . . . . . . . . . . . . . 2872--2884
                Jinsong Han and   
                   Han Ding and   
                  Chen Qian and   
                     Wei Xi and   
                   Zhi Wang and   
              Zhiping Jiang and   
          Longfei Shangguan and   
               Jizhong Zhao and   
                Jinsong Han and   
                   Han Ding and   
                  Chen Qian and   
                     Wei Xi and   
                   Zhi Wang and   
              Zhiping Jiang and   
          Longfei Shangguan and   
                   Jizhong Zhao   CBID: a Customer Behavior Identification
                                  System Using Passive Tags  . . . . . . . 2885--2898
              Ulas C. Kozat and   
             Guanfeng Liang and   
               Koray Kokten and   
                 Janos Tapolcai   On Optimal Topology Verification and
                                  Failure Localization for Software
                                  Defined Networks . . . . . . . . . . . . 2899--2912
                     Dan Li and   
                  Yirong Yu and   
                Junxiao Shi and   
                 Beichuan Zhang   PALS: Saving Network Power With Low
                                  Overhead to ISPs and Applications  . . . 2913--2925
                 Xiang Wang and   
                  Weiqi Shi and   
                 Yang Xiang and   
                         Jun Li   Efficient Network Security Policy
                                  Enforcement With Policy Space Analysis   2926--2938
           Sonia A. Bhaskar and   
               Sonia A. Bhaskar   Localization From Connectivity: a
                                  $1$-bit Maximum Likelihood Approach  . . 2939--2953
        Arpan Chattopadhyay and   
         Marceau Coupechoux and   
                   Anurag Kumar   Sequential Decision Algorithms for
                                  Measurement-Based Impromptu Deployment
                                  of a Wireless Relay Network Along a Line 2954--2968
                  Yang Song and   
         Arun Venkataramani and   
                      Lixin Gao   Identifying and Addressing Reachability
                                  and Policy Attacks in ``Secure'' BGP . . 2969--2982
                     Anh Le and   
             Lorenzo Keller and   
            Hulya Seferoglu and   
                Blerim Cici and   
         Christina Fragouli and   
             Athina Markopoulou   MicroCast: Cooperative Video Streaming
                                  Using Cellular and Local Connections . . 2983--2999
               Se-Young Yun and   
                Jinwoo Shin and   
                        Yung Yi   Distributed Medium Access Over
                                  Time-Varying Channels  . . . . . . . . . 3000--3013
         Theodore Elhourani and   
            Abishek Gopalan and   
 Srinivasan Ramasubramanian and   
         Theodore Elhourani and   
            Abishek Gopalan and   
     Srinivasan Ramasubramanian   IP Fast Rerouting for Multi-Link
                                  Failures . . . . . . . . . . . . . . . . 3014--3025
               Nirmalya Roy and   
               Archan Misra and   
               Sajal K. Das and   
               Christine Julien   Determining Quality- and Energy-Aware
                                  Multiple Contexts in Pervasive Computing
                                  Environments . . . . . . . . . . . . . . 3026--3042
        Georgios S. Paschos and   
               Chih-Ping Li and   
              Eytan Modiano and   
             Kostas Choumas and   
               Thanasis Korakis   In-Network Congestion Control for
                                  Multirate Multicast  . . . . . . . . . . 3043--3055
          Salim El Rouayheb and   
        Sreechakra Goparaju and   
               Han Mao Kiah and   
              Olgica Milenkovic   Synchronization and Deduplication in
                                  Coded Distributed Storage Networks . . . 3056--3069
                 Reaz Ahmed and   
                Faizul Bari and   
  Shihabur Rahman Chowdhury and   
              Golam Rabbani and   
              Raouf Boutaba and   
           Bertrand Mathieu and   
                 Reaz Ahmed and   
                Faizul Bari and   
  Shihabur Rahman Chowdhury and   
              Golam Rabbani and   
              Raouf Boutaba and   
               Bertrand Mathieu   $ \alpha $Route: Routing on Names  . . . 3070--3083
               Richard T. B. Ma   Usage-Based Pricing and Competition in
                                  Congestible Network Service Markets  . . 3084--3097
             Yuanqing Zheng and   
                      Mo Li and   
             Yuanqing Zheng and   
                          Mo Li   Read Bulk Data From Computational RFIDs  3098--3108
               Zhangyu Guan and   
        G. Enrico Santagati and   
                Tommaso Melodia   Distributed Algorithms for Joint Channel
                                  Access and Rate Control in Ultrasonic
                                  Intra-Body Networks  . . . . . . . . . . 3109--3122
                   Lin Chen and   
                   Wei Wang and   
                  Hua Huang and   
                   Shan Lin and   
                   Lin Chen and   
                   Wei Wang and   
                  Hua Huang and   
                       Shan Lin   On Time-Constrained Data Harvesting in
                                  Wireless Sensor Networks: Approximation
                                  Algorithm Design . . . . . . . . . . . . 3123--3135
                 Virag Shah and   
         Gustavo de Veciana and   
                 George Kesidis   A Stable Approach for Routing Queries in
                                  Unstructured P2P Networks  . . . . . . . 3136--3147
                   Lin Chen and   
                Kaigui Bian and   
                     Meng Zheng   Never Live Without Neighbors: From
                                  Single- to Multi-Channel Neighbor
                                  Discovery for Mobile Sensing
                                  Applications . . . . . . . . . . . . . . 3148--3161
                     Yi Xie and   
                    Yu Wang and   
                  Haitao He and   
                 Yang Xiang and   
               Shunzheng Yu and   
                   Xincheng Liu   A General Collaborative Framework for
                                  Modeling and Perceiving Distributed
                                  Network Behavior . . . . . . . . . . . . 3162--3176
                    Jia Liu and   
                   Min Chen and   
                   Bin Xiao and   
                   Feng Zhu and   
               Shigang Chen and   
                     Lijun Chen   Efficient RFID Grouping Protocols  . . . 3177--3190
               DaeHun Nyang and   
                    DongOh Shin   Recyclable Counter With Confinement for
                                  Real-Time Per-Flow Measurement . . . . . 3191--3203
            Kundan Kandhway and   
                       Joy Kuri   Optimal Resource Allocation Over Time
                                  and Degree Classes for Maximizing
                                  Information Dissemination in Social
                                  Networks . . . . . . . . . . . . . . . . 3204--3217
                Sara Ayoubi and   
                Yiheng Chen and   
                     Chadi Assi   Towards Promoting Backup-Sharing in
                                  Survivable Virtual Network Design  . . . 3218--3231
              Huiyuan Zhang and   
             Dung T. Nguyen and   
                  Soham Das and   
              Huiling Zhang and   
                     My T. Thai   Corrections to ``Least Cost Influence
                                  Maximization Across Multiple Social
                                  Networks'' [Apr 16 929--939] . . . . . . 3232--3232

IEEE\slash ACM Transactions on Networking
Volume 24, Number 6, December, 2016

                   Wei Wang and   
                     Qian Zhang   Privacy Preservation for Context Sensing
                                  on Smartphone  . . . . . . . . . . . . . 3235--3247
             Benjamin Baron and   
          Promethee Spathis and   
               Herve Rivano and   
         Marcelo Dias de Amorim   Offloading Massive Data Onto Passenger
                                  Vehicles: Topology Simplification and
                                  Traffic Assignment . . . . . . . . . . . 3248--3261
                Yehuda Afek and   
          Anat Bremler-Barr and   
              Yotam Harchol and   
                  David Hay and   
                    Yaron Koral   Making DPI Engines Resilient to
                                  Algorithmic Complexity Attacks . . . . . 3262--3275
                Xinlei Wang and   
                 Amit Pande and   
                 Jindan Zhu and   
              Prasant Mohapatra   STAMP: Enabling Privacy-Preserving
                                  Location Proofs for Mobile Users . . . . 3276--3289
                   Le Zhang and   
                Shahrokh Valaee   Congestion Control for Vehicular
                                  Networks With Safety-Awareness . . . . . 3290--3299
                Wenping Liu and   
              Tianping Deng and   
                       Yang and   
               Hongbo Jiang and   
               Xiaofei Liao and   
             Jiangchuan Liu and   
                      Bo Li and   
                   Guoyin Jiang   Towards Robust Surface Skeleton
                                  Extraction and Its Applications in $3$D
                                  Wireless Sensor Networks . . . . . . . . 3300--3313
                   Wei Gong and   
               Haoxiang Liu and   
                   Xin Miao and   
                  Kebin Liu and   
                   Wenbo He and   
                  Lan Zhang and   
                     Yunhao Liu   Fast and Adaptive Continuous Scanning in
                                  Large-Scale RFID Systems . . . . . . . . 3314--3325
                   Yan Qiao and   
               Shigang Chen and   
                    Zhen Mo and   
                 Myungkeun Yoon   When Bloom Filters Are No Longer
                                  Compact: Multi-Set Membership Lookup for
                                  Network Applications . . . . . . . . . . 3326--3339
                Huazi Zhang and   
                 Kairan Sun and   
              Qiuyuan Huang and   
               Yonggang Wen and   
                      Dapeng Wu   FUN Coding: Design and Analysis  . . . . 3340--3353
           Pavlos Sermpezis and   
       Thrasyvoulos Spyropoulos   Effects of Content Popularity on the
                                  Performance of Content-Centric
                                  Opportunistic Networking: an Analytical
                                  Approach and Applications  . . . . . . . 3354--3368
              Endadul Hoque and   
               Hyojeong Lee and   
            Rahul Potharaju and   
            Charles Killian and   
           Cristina Nita-Rotaru   Automated Adversarial Testing of
                                  Unmodified Wireless Routing
                                  Implementations  . . . . . . . . . . . . 3369--3382
                Osman Yagan and   
             Armand M. Makowski   Wireless Sensor Networks Under the
                                  Random Pairwise Key Predistribution
                                  Scheme: Can Resiliency Be Achieved With
                                  Small Key Rings? . . . . . . . . . . . . 3383--3396
             Dongmyoung Kim and   
                Taejun Park and   
               Seongwon Kim and   
                  Hyoil Kim and   
                  Sunghyun Choi   Load Balancing in Two-Tier Cellular
                                  Networks With Open and Hybrid Access
                                  Femtocells . . . . . . . . . . . . . . . 3397--3411
                Tal Mizrahi and   
                   Efi Saat and   
                    Yoram Moses   Timed Consistent Network Updates in
                                  Software-Defined Networks  . . . . . . . 3412--3425
               Jiliang Wang and   
                  Shuo Lian and   
                   Wei Dong and   
              Xiang-Yang Li and   
                     Yunhao Liu   Every Packet Counts: Loss and Reordering
                                  Identification and Its Application in
                                  Delay Measurement  . . . . . . . . . . . 3426--3438
                Wenping Liu and   
               Hongbo Jiang and   
             Jiangchuan Liu and   
               Xiaofei Liao and   
                Hongzhi Lin and   
                  Tianping Deng   On the Distance-Sensitive and
                                  Load-Balanced Information Storage and
                                  Retrieval for $3$D Sensor Networks . . . 3439--3449
               Bong-Hwan Oh and   
                    Jaiyong Lee   Feedback-Based Path Failure Detection
                                  and Buffer Blocking Protection for MPTCP 3450--3461
         Joao Luis Sobrinho and   
           Laurent Vanbever and   
                  Franck Le and   
                Andre Sousa and   
               Jennifer Rexford   Scaling the Internet Routing System
                                  Through Distributed Route Aggregation    3462--3476
           Muhammad Shahzad and   
                    Alex X. Liu   Accurate and Efficient Per-Flow Latency
                                  Measurement Without Probing and Time
                                  Stamping . . . . . . . . . . . . . . . . 3477--3492
               Gideon Blocq and   
                     Ariel Orda   How Good is Bargained Routing? . . . . . 3493--3507
                    Xin Sun and   
                Geoffrey G. Xie   An Integrated Systematic Approach to
                                  Designing Enterprise Access Control  . . 3508--3522
                Shouling Ji and   
                 Weiqing Li and   
          Mudhakar Srivatsa and   
                   Raheem Beyah   Structural Data De-Anonymization: Theory
                                  and Practice . . . . . . . . . . . . . . 3523--3536
                   Ming Zhu and   
                     Dan Li and   
               Fangxin Wang and   
                    Anke Li and   
         K. K. Ramakrishnan and   
                   Ying Liu and   
                Jianping Wu and   
                    Nan Zhu and   
                        Xue Liu   CCDN: Content-Centric Data Center
                                  Networks . . . . . . . . . . . . . . . . 3537--3550
                   Saiyu Qi and   
             Yuanqing Zheng and   
                      Mo Li and   
                 Yunhao Liu and   
                      Jinli Qiu   Scalable Industry Data Access Control in
                                  RFID-Enabled Supply Chain  . . . . . . . 3551--3564
                    Bing Hu and   
              Kwan L. Yeung and   
                  Qian Zhou and   
                     Chunzhi He   On Iterative Scheduling for Input-Queued
                                  Switches With a Speedup of $ 2 - 1 / N $ 3565--3577
          Emile Archambault and   
              Nabih Alloune and   
              Marija Furdek and   
                  Zhenyu Xu and   
         Christine Tremblay and   
             Ajmal Muhammad and   
                Jiajia Chen and   
              Lena Wosinska and   
            Paul Littlewood and   
             Michel P. Belanger   Routing and Spectrum Assignment in
                                  Elastic Filterless Optical Networks  . . 3578--3592
                    Xu Chen and   
               Xiaowen Gong and   
                   Lei Yang and   
                  Junshan Zhang   Exploiting Social Tie Structure for
                                  Cooperative Wireless Networking: a
                                  Social Group Utility Maximization
                                  Framework  . . . . . . . . . . . . . . . 3593--3606
                  Qing Wang and   
           Domenico Giustiniano   Intra-Frame Bidirectional Transmission
                                  in Networks of Visible LEDs  . . . . . . 3607--3619
                 Zhao Zhang and   
              James Willson and   
                  Zaixin Lu and   
                   Weili Wu and   
                 Xuding Zhu and   
                    Ding-Zhu Du   Approximating Maximum Lifetime
                                  $k$-Coverage Through Minimizing Weighted
                                  $k$-Cover in Homogeneous Wireless Sensor
                                  Networks . . . . . . . . . . . . . . . . 3620--3633
                      Di Wu and   
                  Qiang Liu and   
                    Yong Li and   
            Julie A. McCann and   
            Amelia C. Regan and   
      Nalini Venkatasubramanian   Adaptive Lookup of Open WiFi Using
                                  Crowdsensing . . . . . . . . . . . . . . 3634--3647
                  Long Gong and   
               Huihui Jiang and   
               Yixiang Wang and   
                     Zuqing Zhu   Novel Location-Constrained Virtual
                                  Network Embedding LC-VNE Algorithms
                                  Towards Integrated Node and Link Mapping 3648--3661
                  Simon Oya and   
    Fernando Perez-Gonzalez and   
               Carmela Troncoso   Design of Pool Mixes Against Profiling
                                  Attacks in Real Conditions . . . . . . . 3662--3675
                 Long Cheng and   
                Jianwei Niu and   
                      Yu Gu and   
               Chengwen Luo and   
                        Tian He   Achieving Efficient Reliable Flooding in
                                  Low-Duty-Cycle Wireless Sensor Networks  3676--3689
         Valentino Pacifici and   
                     Gyorgy Dan   Coordinated Selfish Distributed Caching
                                  for Peering Content-Centric Networks . . 3690--3701
             Agostinho Agra and   
             Amaro de Sousa and   
           Mahdi Doostmohammadi   The Minimum Cost Design of Transparent
                                  Optical Networks Combining Grooming,
                                  Routing, and Wavelength Assignment . . . 3702--3713
               Chi-Kin Chau and   
               Majid Khonji and   
                 Muhammad Aftab   Online Algorithms for Information
                                  Aggregation From Distributed and
                                  Correlated Sources . . . . . . . . . . . 3714--3725
      Victor Berrocal-Plaza and   
   Miguel A. Vega-Rodriguez and   
          Juan M. Sanchez-Perez   An Efficient Way of Assigning Paging
                                  Areas by Using Mobility Models . . . . . 3726--3739
                 Zhenhua Li and   
                Zhiyang Guo and   
                  Yuanyuan Yang   BCCC: an Expandable Network for Data
                                  Centers  . . . . . . . . . . . . . . . . 3740--3755
  Carla-Fabiana Chiasserini and   
            Michele Garetto and   
                Emilio Leonardi   Social Network De-Anonymization Under
                                  Scale-Free User Relations  . . . . . . . 3756--3769
           Muhammad Shahzad and   
                    Alex X. Liu   Fast and Reliable Detection and
                                  Identification of Missing RFID Tags in
                                  the Wild . . . . . . . . . . . . . . . . 3770--3784
               Wan-Seon Lim and   
                   Kang G. Shin   POEM: Minimizing Energy Consumption for
                                  WiFi Tethering Service . . . . . . . . . 3785--3797
                Jungseul Ok and   
                Youngmi Jin and   
                Jinwoo Shin and   
                        Yung Yi   On Maximizing Diffusion Speed Over
                                  Social Networks With Strategic Users . . 3798--3811
          Maialen Larrnaaga and   
               Urtzi Ayesta and   
              Ina Maria Verloop   Dynamic Control of Birth-and-Death
                                  Restless Bandits: Application to
                                  Resource-Allocation Problems . . . . . . 3812--3825
                Varun Gupta and   
             Yigal Bejerano and   
            Craig Gutterman and   
             Jaime Ferragut and   
              Katherine Guo and   
          Thyaga Nandagopal and   
                    Gil Zussman   Light-Weight Feedback Mechanism for WiFi
                                  Multicast to Very Large Groups ---
                                  Experimental Evaluation  . . . . . . . . 3826--3840
                     Li Yan and   
               Haiying Shen and   
                      Kang Chen   TSearch: Target-Oriented Low-Delay Node
                                  Searching in DTNs With Social Network
                                  Properties . . . . . . . . . . . . . . . 3841--3855
               Tiantian Zhu and   
                 Hongyu Gao and   
                    Yi Yang and   
                     Kai Bu and   
                   Yan Chen and   
                Doug Downey and   
                  Kathy Lee and   
              Alok N. Choudhary   Beating the Artificial Chaos: Fighting
                                  OSN Spam Using Its Own Templates . . . . 3856--3869


IEEE\slash ACM Transactions on Networking
Volume 25, Number 1, February, 2017

                    Jian Li and   
     Rajarshi Bhattacharyya and   
                 Suman Paul and   
        Srinivas Shakkottai and   
              Vijay Subramanian   Incentivizing Sharing in Realtime D2D
                                  Streaming Networks: a Mean Field Game
                                  Perspective  . . . . . . . . . . . . . . 3--17
                   Wei Wang and   
                    Bei Liu and   
               Donghyun Kim and   
                  Deying Li and   
                Jingyi Wang and   
                        Wei Gao   A New Constant Factor Approximation to
                                  Construct Highly Fault-Tolerant
                                  Connected Dominating Set in Unit Disk
                                  Graph  . . . . . . . . . . . . . . . . . 18--28
                   Longbo Huang   The Value-of-Information in Matching
                                  With Queues  . . . . . . . . . . . . . . 29--42
                    Zhuo Lu and   
                     Cliff Wang   Enabling Network Anti-Inference via
                                  Proactive Strategies: a Fundamental
                                  Perspective  . . . . . . . . . . . . . . 43--55
               Joe Kornycky and   
          Omar Abdul-Hameed and   
               Ahmet Kondoz and   
                Brian C. Barber   Radio Frequency Traffic Classification
                                  Over WLAN  . . . . . . . . . . . . . . . 56--68
               Zhenjiang Li and   
                     Wan Du and   
             Yuanqing Zheng and   
                      Mo Li and   
                      Dapeng Wu   From Rateless to Hopless . . . . . . . . 69--82
           Mays F. AL-Naday and   
            Nikolaos Thomos and   
                 Martin J. Reed   Information-Centric Multilayer
                                  Networking: Improving Performance
                                  Through an ICN/WDM Architecture  . . . . 83--97
           Ashwin Pananjady and   
        Vivek Kumar Bagaria and   
                     Rahul Vaze   Optimally Approximating the Coverage
                                  Lifetime of Wireless Sensor Networks . . 98--111
               Guangmo Tong and   
                   Weili Wu and   
               Shaojie Tang and   
                    Ding-Zhu Du   Adaptive Influence Maximization in
                                  Dynamic Social Networks  . . . . . . . . 112--125
         Neshat Etemadi Rad and   
              Yariv Ephraim and   
                  Brian L. Mark   Delay Network Tomography Using a
                                  Partially Observable Bivariate Markov
                                  Chain  . . . . . . . . . . . . . . . . . 126--138
               Jose Yallouz and   
                     Ariel Orda   Tunable QoS-Aware Network Survivability  139--149
             Joao Luis Sobrinho   Correctness of Routing Vector Protocols
                                  as a Property of Network Cycles  . . . . 150--163
            Sharayu Moharir and   
     Subhashini Krishnasamy and   
              Sanjay Shakkottai   Scheduling in Densified Networks:
                                  Algorithms and Performance . . . . . . . 164--178
                     An Liu and   
              Vincent K. N. Lau   How Much Cache is Needed to Achieve
                                  Linear Capacity Scaling in
                                  Backhaul-Limited Dense Wireless
                                  Networks?  . . . . . . . . . . . . . . . 179--188
              Adiseshu Hari and   
                 Urs Niesen and   
                 Gordon Wilfong   On the Problem of Optimal Path Encoding
                                  for Software-Defined Networks  . . . . . 189--198
                Zizhong Cao and   
               Paul Claisse and   
        Rene-Jean Essiambre and   
            Murali Kodialam and   
                 T. V. Lakshman   Optimizing Throughput in Optical
                                  Networks: The Joint Routing and Power
                                  Control Problem  . . . . . . . . . . . . 199--209
                   Wei Dong and   
                     Yi Gao and   
                  Wenbin Wu and   
                  Jiajun Bu and   
                  Chun Chen and   
                  Xiang-Yang Li   Optimal Monitor Assignment for
                                  Preferential Link Tomography in
                                  Communication Networks . . . . . . . . . 210--223
                Xiulong Liu and   
                   Bin Xiao and   
                   Keqiu Li and   
                Alex X. Liu and   
                     Jie Wu and   
                    Xin Xie and   
                        Heng Qi   RFID Estimation With Blocker Tags  . . . 224--237
                   Fang Hao and   
            Murali Kodialam and   
             T. V. Lakshman and   
                Sarit Mukherjee   Online Allocation of Virtual Machines in
                                  a Distributed Cloud  . . . . . . . . . . 238--249
          Christina Vlachou and   
              Albert Banchs and   
              Julien Herzen and   
                 Patrick Thiran   How CSMA/CA With Deferral Affects
                                  Performance and Dynamics in Power-Line
                                  Communications . . . . . . . . . . . . . 250--263
                Xiulong Liu and   
                   Keqiu Li and   
                Alex X. Liu and   
                   Song Guo and   
           Muhammad Shahzad and   
                Ann L. Wang and   
                         Jie Wu   Multi-Category RFID Estimation . . . . . 264--277
                Xiulong Liu and   
                    Xin Xie and   
                   Keqiu Li and   
                   Bin Xiao and   
                     Jie Wu and   
                    Heng Qi and   
                       Dawei Lu   Fast Tracking the Population of Key Tags
                                  in Large-Scale Anonymous RFID Systems    278--291
           Jelena Marasevic and   
                   Jin Zhou and   
        Harish Krishnaswamy and   
                 Yuan Zhong and   
                    Gil Zussman   Resource Allocation and Rate Gains in
                                  Practical Full-Duplex Systems  . . . . . 292--305
           Rebecca Lovewell and   
                Qianwen Yin and   
             Tianrong Zhang and   
               Jasleen Kaur and   
           Frank Donelson Smith   Packet-Scale Congestion Control Paradigm 306--319
                  Ali Munir and   
               Ghufran Baig and   
       Syed Mohammad Irteza and   
           Ihsan Ayyub Qazi and   
                Alex X. Liu and   
            Fahad Rafique Dogar   PASE: Synthesizing Existing Transport
                                  Strategies for Near-Optimal Data Center
                                  Transport  . . . . . . . . . . . . . . . 320--334
              Changhyun Lee and   
              Chunjong Park and   
                  Keon Jang and   
                   Sue Moon and   
                     Dongsu Han   DX: Latency-Based Congestion Control for
                                  Datacenters  . . . . . . . . . . . . . . 335--348
           Stefano D'Aronco and   
                 Laura Toni and   
                Sergio Mena and   
               Xiaoqing Zhu and   
                Pascal Frossard   Improved Utility-Based Congestion
                                  Control for Delay-Constrained
                                  Communication  . . . . . . . . . . . . . 349--362
                Xiaoyong Li and   
          Daren B. H. Cline and   
                Dmitri Loguinov   Temporal Update Dynamics Under Blind
                                  Sampling . . . . . . . . . . . . . . . . 363--376
             Abhishek Sinha and   
           Georgios Paschos and   
               Chih-Ping Li and   
                  Eytan Modiano   Throughput-Optimal Multihop Broadcast on
                                  Directed Acyclic Wireless Networks . . . 377--391
               Qingjun Xiao and   
                   Bin Xiao and   
               Shigang Chen and   
                    Jiming Chen   Collision-Aware Churn Estimation in
                                  Large-Scale Dynamic RFID Systems . . . . 392--405
   Alireza Keshavarz-Haddad and   
              Ehsan Aryafar and   
               Michael Wang and   
                    Mung Chiang   HetNets Selection by Clients:
                                  Convergence, Efficiency, and
                                  Practicality . . . . . . . . . . . . . . 406--419
V. Sriram Siddhardh Nadendla and   
          Swastik K. Brahma and   
             Pramod K. Varshney   Optimal Spectrum Auction Design With
                                  $2$-D Truthful Revelations Under
                                  Uncertain Spectrum Availability  . . . . 420--433
                   Liang Ma and   
                    Ting He and   
            Ananthram Swami and   
                Don Towsley and   
                   Kin K. Leung   Network Capability in Localizing Node
                                  Failures via End-to-End Path
                                  Measurements . . . . . . . . . . . . . . 434--450
                Yongquan Fu and   
                    Xu Xiaoping   Self-Stabilized Distributed Network
                                  Distance Prediction  . . . . . . . . . . 451--464
              Wei-Cheng Kuo and   
                 Chih-Chun Wang   Robust and Optimal Opportunistic
                                  Scheduling for Downlink Two-Flow Network
                                  Coding With Varying Channel Quality and
                                  Rate Adaptation  . . . . . . . . . . . . 465--479
                     Yi Gao and   
                   Wei Dong and   
                  Chun Chen and   
               Xiaoyu Zhang and   
                  Jiajun Bu and   
                        Xue Liu   Accurate Per-Packet Delay Tomography in
                                  Wireless Ad Hoc Networks . . . . . . . . 480--491
        Luis Sanabria-Russo and   
              Jaume Barcelo and   
             Boris Bellalta and   
             Francesco Gringoli   A High Efficiency MAC Protocol for
                                  WLANs: Providing Fairness in Dense
                                  Scenarios  . . . . . . . . . . . . . . . 492--505
               Fangming Liu and   
                   Jian Guo and   
             Xiaomeng Huang and   
                 John C. S. Lui   eBA: Efficient Bandwidth Guarantee Under
                                  Traffic Variability in Datacenters . . . 506--519
                   Hao Zhou and   
                 Yusheng Ji and   
               Xiaoyan Wang and   
                 Shigeki Yamada   eICIC Configuration Algorithm with
                                  Service Scalability in Heterogeneous
                                  Cellular Networks  . . . . . . . . . . . 520--535
                    Xu Chen and   
               Xiaowen Gong and   
                   Lei Yang and   
                  Junshan Zhang   Amazon in the White Space: Social
                                  Recommendation Aided Distributed
                                  Spectrum Access  . . . . . . . . . . . . 536--549
              Fidan Mehmeti and   
       Thrasyvoulos Spyropoulos   Performance Modeling, Analysis, and
                                  Optimization of Delayed Mobile Data
                                  Offloading for Mobile Users  . . . . . . 550--564
             Wei Koong Chai and   
                  George Pavlou   Path-Based Epidemic Spreading in
                                  Networks . . . . . . . . . . . . . . . . 565--578
                 Hong Zhang and   
                   Kai Chen and   
                    Wei Bai and   
                 Dongsu Han and   
                  Chen Tian and   
                   Hao Wang and   
               Haibing Guan and   
                     Ming Zhang   Guaranteeing Deadlines for Inter-Data
                                  Center Transfers . . . . . . . . . . . . 579--595
          Longfei Shangguan and   
                 Zheng Yang and   
                Alex X. Liu and   
                  Zimu Zhou and   
                     Yunhao Liu   STPP: Spatial-Temporal Phase
                                  Profiling-Based Method for Relative RFID
                                  Tag Localization . . . . . . . . . . . . 596--609
         Giorgos Vasiliadis and   
          Lazaros Koromilas and   
     Michalis Polychronakis and   
              Sotiris Ioannidis   Design and Implementation of a Stateful
                                  Network Packet Processing Framework for
                                  GPUs . . . . . . . . . . . . . . . . . . 610--623
                Xiaohang Li and   
             Chih-Chun Wang and   
                    Xiaojun Lin   Inter-Session Network Coding Schemes for
                                  $1$-to-$2$ Downlink Access-Point
                                  Networks With Sequential Hard Deadline
                                  Constraints  . . . . . . . . . . . . . . 624--638

IEEE\slash ACM Transactions on Networking
Volume 25, Number 2, April, 2017

            YoungGyoun Moon and   
                Donghwi Kim and   
               Younghwan Go and   
               Yeongjin Kim and   
                    Yung Yi and   
                 Song Chong and   
                 KyoungSoo Park   Cedos: a Network Architecture and
                                  Programming Abstraction for
                                  Delay-Tolerant Mobile Apps . . . . . . . 646--661
                Qiaomin Xie and   
              Mayank Pundir and   
                      Yi Lu and   
           Cristina L. Abad and   
                Roy H. Campbell   Pandas: Robust Locality-Aware Scheduling
                                  With Stochastic Delay Optimality . . . . 662--675
                     Anh Le and   
        Arash Saber Tehrani and   
         Alexandros Dimakis and   
             Athina Markopoulou   Recovery of Packet Losses in Wireless
                                  Broadcast for Real-Time Applications . . 676--689
          Hamzeh Beyranvand and   
            Martin Levesque and   
               Martin Maier and   
            Jawad A. Salehi and   
        Christos Verikoukis and   
                   David Tipper   Toward 5G: FiWi Enhanced LTE-A HetNets
                                  With Reliable Low-Latency Fiber Backhaul
                                  Sharing and WiFi Offloading  . . . . . . 690--707
             Shaoquan Zhang and   
               Longbo Huang and   
               Minghua Chen and   
                        Xin Liu   Proactive Serving Decreases User Delay
                                  Exponentially: The Light-Tailed Service
                                  Time Case  . . . . . . . . . . . . . . . 708--723
                    Rui Zhu and   
                   Bang Liu and   
                     Di Niu and   
                Zongpeng Li and   
                Hong Vicky Zhao   Network Latency Estimation for Personal
                                  Devices: a Matrix Completion Approach    724--737
   Roland van Rijswijk-Deij and   
             Kaspar Hageman and   
              Anna Sperotto and   
                      Aiko Pras   The Performance Impact of Elliptic Curve
                                  Cryptography on DNSSEC Validation  . . . 738--750
                   Luoyi Fu and   
               Xinbing Wang and   
                    P. R. Kumar   Are We Connected? Optimal Determination
                                  of Source--Destination Connectivity in
                                  Random Networks  . . . . . . . . . . . . 751--764
                Benny Van Houdt   Explicit Back-Off Rates for Achieving
                                  Target Throughputs in CSMA/CA Networks   765--778
               Marco Chiesa and   
                Guy Kindler and   
               Michael Schapira   Traffic Engineering With
                                  Equal-Cost-MultiPath: an Algorithmic
                                  Perspective  . . . . . . . . . . . . . . 779--792
               Ruiting Zhou and   
                Zongpeng Li and   
                   Chuan Wu and   
                    Zhiyi Huang   An Efficient Cloud Market Mechanism for
                                  Computing Jobs With Soft Deadlines . . . 793--805
               Fangfang Yan and   
                Tony T. Lee and   
                    Weisheng Hu   Congestion-Aware Embedding of
                                  Heterogeneous Bandwidth Virtual Data
                                  Centers With Hose Model Abstraction  . . 806--819
                     Wan Du and   
    Jansen Christian Liando and   
               Huanle Zhang and   
                          Mo Li   Pando: Fountain-Enabled Fast Data
                                  Dissemination With Constructive
                                  Interference . . . . . . . . . . . . . . 820--833
                Ronghui Hou and   
                   Yu Cheng and   
                Jiandong Li and   
                  Min Sheng and